You are here

Share
Image depicting the cosolidation of data into a cloud container.
Posted by Ajay Nigam
Enterprises are increasingly moving their data to the cloud. In fact, the typical enterprise hosts over 1,100 cloud services on average. With respect to enterprise content management (ECM) systems, it’s not uncommon for an organization to have data stored in: SharePoint, SharePoint Online,...
Entertainment Technology
Posted by Hormazd Romer
When we speak with prospective customers about their technology pain points, a lot of them mention FTP. Most of these prospective customers acknowledge the fact that FTP isn’t a perfect file sharing solution but justify using it because it’s a familiar solution. As a result, they...
Access all of your content from one location
Posted by Hormazd Romer
Mobile devices and cloud computing were supposed to simplify life for enterprise employees. But there’s at least one area of IT where life has become more complex: file access. A decade ago, the files an employee accessed might have been distributed across just a few content systems, such as...
Security features
Posted by Hormazd Romer
Enterprises continue to leak data either through carelessness or falling victim to hackers who have become increasingly sophisticated and effective. Unfortunately, there is no silver bullet that will protect an organization’s data. Rather, organizations have to set up many barriers to thwart...
Accellion and Microsoft Office 365
Posted by Dee Dee Kato
Accellion recently announced a number of key integrations with Microsoft Office Online that enhance productivity for enterprise employees editing, sharing and collaborating on Word, Excel and PowerPoint files, whether they are stored on-premises or in the cloud. The end result? Employees are more...
fedRAMP
Posted by Dee Dee Kato
kiteworks by Accellion is in the process of becoming FedRAMP-certified. What is FedRAMP ? It’s a rigorous security assessment and authorization framework developed by cybersecurity and cloud experts from many government agencies, including the General Services Administration (GSA), National...
Forrester Wave for EFSS Hybrid Solutions
Posted by Amy Chu
We are delighted to share that we have been named a Leader in the recently released report: The Forrester Wave™: Enterprise File Sync and Share, Hybrid Solutions, Q2 2016. This report evaluates the ten most significant hybrid cloud solution providers in EFSS in an effort to assist Enterprise...
kiteworks and Microsoft Office 365
Posted by Dee Dee Kato
How awesome would it be to have a secure, single point of access to find, edit and share all Microsoft files stored in an enterprise’s many on-premises and cloud content systems from any device? Sounds too good to be true? Well, this isn’t a pipe dream. In fact, secure file access,...
How safe is your healthcare organization?
Posted by Marianna Prodan
MedStar Health, 21 st Century Oncology, Hollywood Presbyterian Hospital. The list of cyber attacks targeting the healthcare industry goes on and on. The ten largest healthcare data breaches in 2015 compromised the personal health information (PHI) of almost 110 million Americans. That’s...
Crypto wars
Posted by Yorgen Edholm
Should technology companies undermine their own security features to help government agencies read encrypted data? The answer might depend on whose encrypted data is being read. Should encryption be purposely broken to facilitate mass surveillance? Most American would say “no,” judging...
Privacy Shield
Posted by Yorgen Edholm
In October 2015, the European Court of Justice (ECJ), the highest court in the European Union (EU), struck down the EU-U.S. Safe Harbor Agreement which had allowed U.S. companies to certify that they complied with the EU’s stringent data privacy regulations. Through this certification, U.S...
data breaches are board level issue
Posted by Yorgen Edholm
When it comes to data breaches and the professional longevity of CEOs and boards of directors, one can't help but say: “How times have changed!” Compare the reaction to almost any recent headline-grabbing data breach—Anthem, Ashley Madison, Sony, Wyndham Resorts—to the...
Decrypting Encryption
Posted by Hormazd Romer
There has been a heated debate over the last several months about encryption. Most consumers and corporations want it. Government agencies, particularly those in intelligence and law enforcement, don’t. Who is the rightful owner of your data? It depends on who you ask and what country you...
A data breach requires a thorough analysis of your data transfer practices
Posted by Hormazd Romer
A lot is written these days about best practices for preventing data breaches—practices such as keeping critical systems up to date with patches, ensuring firewalls and AV scanners are updated with signature files, educating employees about the risks of phishing attacks, and so on. These...
Safe Harbor and Data Sovereignty
Posted by Yorgen Edholm
For U.S. companies handling data belonging to EU citizens, the clock is ticking. From 2000 to 2015, U.S. companies could join the U.S.-EU Safe Harbor Program and self-certify that they met all the requirements of the EU data privacy regulations. Self-certification under Safe Harbor was both...
real time secure file access - even in the field
Posted by Hormazd Romer
Much of the discussion about Bring Your Own Device (BYOD) policies focuses on employee productivity and IT security . This makes sense: BYOD is certainly delivering on its promise to increase productivity, while also creating some challenging problems in the area of IT security and compliance. What...
international data sovereignty
Posted by Paula Skokowski
Real estate isn’t the only kind of business where location matters. Since Edward Snowden revealed the extent of the U.S. government’s spying on private citizens, location has been a hot topic in data security and IT management, especially for global companies. The location of data now...
Posted by Paula Skokowski
“Data privacy” is a term bandied about by governments, courts, law enforcement agencies and advocacy groups. Each has their own interpretation of the laws that impact a person’s data but what are an individual’s rights when it comes to their data? The EU’s Data...
Posted by Paula Skokowski
If you want to appreciate the promise and the challenge of applying new technology to healthcare, look no further than the Healthcare Information and Management Systems Society (HIMSS). For over fifty years, HIMSS has sought to improve healthcare with information technology. Healthcare facilities...
Posted by Hormazd Romer
eDiscovery – the collection, identification, archivi ng , and delivery of Electronically Stored Information (ESI) requested by legal teams and courts as part of an investigation, litigation, audit, industry compliance or other activity – is an ongoing challenge for organizations,...

Pages