You are here

Share
Posted by Yorgen Edholm
The mobile revolution, while firmly embedded in the consumer world, is now beginning to hit its stride in the enterprise world. This can be seen in the recent announcement from Apple and IBM , whose strategic alliance to develop joint solutions leveraging Apple devices and IBM software is an...
Posted by Paula Skokowski
The theft of celebrity photos from Apple iCloud is a stark reminder of the need to think twice before storing data. For many people using a Mac the default behavior is to automatically back up and save data to iCloud. It's wonderfully appealing and convenient and seamlessly integrates into...
Posted by Yorgen Edholm
The sight of trees turning golden red, and the sounds of grown men screaming at the TV can only mean one thing – its football season. But why accept only the players your team’s coaching staff has chosen? Why not go the extra yard, go beyond what Harbaugh was able to do, and create the...
Posted by Accellion Team
Disruptive technology advancements will always drive shifts in channel sales behavior, as both vendors and solution providers move towards new requirements and solutions. We’re seeing this in the market now, as mobile solutions continue to evolve and enterprises struggle to deploy the right...
Posted by Hormazd Romer
There have been so many news stories of sophisticated data breaches lately that it’s easy to overlook more mundane ways that confidential data can be lost or stolen. Unfortunately, ordinary data breaches still occur. For example, earlier this year two healthcare organizations cumulatively...
Posted by Accellion Team
Three out of four managers surveyed recently by BMC Software say BYOD is a big productivity boost. There’s a very good reason for this - at the end of the day, employees bring those same devices home, where they use them for additional work late in the evening and early in the morning. That...
Posted by Accellion Team
A staggering 822 million records were exposed by data breaches in 2013, according to research firm Risk Based Security. Data breaches compel organizations to look at their network infrastructure and security processes, and shore up areas where inadvertent data leaks are taking place. The use of...
Posted by Accellion Team
The number of devices connected to enterprise networks is skyrocketing. One reason is mobile computing. Mobile workers in the US now carry on average 3 mobile devices, according to a recent survey by Sophos. Fifteen years ago, each of those workers would have connected to the network through a...
Posted by Hormazd Romer
The phrase “Shadow IT” refers to products and services used by employees without the knowledge or approval of the IT department. Shadow IT is everywhere: it can be found in just about any department of any organization. When Frost & Sullivan surveyed line of business (LOB) and IT...
Posted by Accellion Team
In many organizations, decisions about mobile technology are made primarily or exclusively by the IT and IT security departments working together. All too often, there’s one department that’s left out of these discussions: the organization’s own legal team, and In-house Counsel...
Posted by Accellion Team
In how many different places does your enterprise data reside? Think about what’s stored on-premise versus in the cloud. Are you using SharePoint and other ECM systems? What about Google Drive and Microsoft OneDrive? Have you lost count? If you’re like the majority of organizations,...
Posted by Hormazd Romer
CompTIA , a non-profit trade organization for the IT industry, recently released its Third Annual Trends in Enterprise Mobility study, surveying 400 business and IT executives responsible for mobility policies and processes. The study might have been expected to find widespread enthusiasm for BYOD...
Posted by Accellion Team
Dan Tynan, a reporter, is playing the role of umpire. No, he hasn’t been on the field for the Red Sox/Cardinals world series games, but he is calling the shots when it comes to security & compliance and storing personal data in the cloud. Here’s his play by play : 1) He tried to...
Posted by Accellion Team
In the first installment of our employee spotlight, we chat with Evan, one of our engineers at Accellion. Evan is not only a savvy engineer who has worked on a few open source projects (most prominently JRuby and Cshellsynth ), but is also a critic and a writer. 1) What do you do at Accellion? I...
Posted by Accellion Team
It’s been a whirl-wind couple of weeks here at Accellion. Last week we launched our latest product – the Accellion iManage Plug-in, and this week we are showing it to Law Firm CIOs during LegalTech in New York. As a product marketing manager, nothing is more exciting than seeing a...
Posted by Accellion Team
I just read the recent "Opinion" from the European Data Protection Supervisor on the communication from the Commission to the European Parliament, the Council, the Economic and Social Committee and the Committee of the Regions. Are you still with me? Hang in there, because it's easy...
Posted by Accellion Team
We've had an ongoing debate at Accellion on what is the largest size of file that can be sent via Accellion file transfer. Yesterday's WSJ article entitled "Fastest Growing PR Stunt: Get Into Guinness Records" settles the discussion - we're going for the record. Of course...

Pages