An article in CIO reminds us all of the importance of information sharing and collaboration in successful organizations. The need to share and collaborate is not new at all. We can go back to 1620 when a boat filled with more than one hundred people sailed across the Atlantic to settle the New World.
The first winter for the Pilgrims was very difficult because they had arrived too late to plant crops. However, next spring Native Americans shared valuable information about native crops. In the autumn of 1621, the colonists harvested plentiful crops of corn, barley, beans and pumpkins. The colonists had much to be thankful for, and a feast was planned. The local Indians brought deer to roast with turkey and other wild game. This spirit of sharing and collaboration between the Pilgrims and Indians made it possible for the early settlers to prosper in the New World.
In this season of sharing, Accellion has a few tips for sharing corporate information securely with colleagues, customers, partners, and vendors in order to create more productive enterprises.
1. Choose a secure file sharing solution that is simple enough for employees to use, but secure enough for IT. When secure file sharing is easy, employees make it as part of their daily routine and organizations encourage it.
2. Find a mobile file sharing solution that integrates with your existing enterprise IT infrastructure, including SharePoint, iManage, active directory, archiving systems, mobile device management and data loss prevention (DLP) systems. When secure file sharing works along-side existing applications, no one loses out. Investments are not wasted.
3.Implement a solution that enables secure file sharing across corporate boundaries. When both internal and external users securely collaborate on projects, information shared among partners, vendors, and suppliers is protected.
4. Select a solution that provides native applications for iOS, Android and BlackBerry devices to securely view, share and edit content on-the-go. When mobile file sharing is ubiquitous, there is no excuse for using unsecure workarounds.
5. Select a solution that provides the audit trails and reporting required to demonstrate compliance with industry and government regulations such as PCI, SOX, and HIPAA. When organizations need to not only protect sensitive data, but also demonstrate compliance, sophisticated reporting is a must have feature.
Happy Thanksgiving from the Accellion Team!