Subscribe       Feed   All Posts     Search by Topic:

Customer Spotlight: Pepperdine University Gives Accellion Top Marks

Accellion In Action: Pepperdine Secures Copier Files

When Pepperdine decided to implement a university-wide copier replacement program, the mission was to make staff and students’ lives easier. With 90 copiers across four campuses, individuals could scan documents as needed, convert files to PDFs, and send them to an email account. Sounds great, right? But, the big question facing IT was – just how secure is the process?

What I Don't Love About SharePoint

A recent article in Fierce Content Management entitled “Survey finds many users blow by SharePoint security” reveals how cavalier some Microsoft SharePoint users are about maintaining security within the widely used Enterprise collaboration and content management solution.

Accellion in Action: Accellion Powers Design and Engineering Projects for Halsall

For so many businesses, timely, proactive, and personalized communications is the secret ingredient that keeps clients coming back for more. So, what’s a company to do when “communications” goes well beyond daily email and phone check-ins, involving the need to not only send, but also collaborate on, extremely large documents, such as CAD drawings, contracts, and floor plans?

Come and Join the Accellion Team!

Accellion had a tremendous year in 2012. It was awesome to watch the amount of worldwide growth that took place, especially in the last six months.  Accellion’s management team of successful startup veterans have created an atmosphere that rewards innovation, offers opportunities for growth, and encourages a healthy work/life balance.

MegaUpload: What You Need to Know

Recently, federal authorities took action to shut down the Web site of MegaUpload, accusing its operators, who could face 20 years in prison, of copyright infringement.

2011 Data Breach Rewind

361 million >> 144 million >> 4 million that’s the total number of records compromised each year from 2008 – 2010 as a result of data breaches, according to a joint Verizon and United States Secret Service report. After years of increasing losses climaxing in 2008 with a record-setting 361 million records compromised, it was not clear if the 2009 drop to 144 million was an aberration or a sign of things to come. The 2010 total of four million compromised records seems to suggest it was a sign. But of what?

Deck your iPad with Accellion for the Holidays

At this point I don’t think Charles Dickens’s character Ebenezer Scrooge would say "Bah, humbug!" to an iPad for the holidays. A recent Nielsen survey shows that our appetite for Apple devices is growing – with the iPad leading the pack.

Your iPad Is Not Your iPhone: Get Secure

Over the past year, we've seen the iPad become more prevalent in the corporate world – and why not? Its portability is ideal for employees on the go and users are able to blend work and personal use on a single device. Yet, it’s these two benefits that have introduced new security concerns for IT, with the iPad often treated more like a grown up iPhone than a corporate computer.

Tablet Security in the Enterprise: Risk and Remedies

Today, malicious apps and malware continue to be the number one security threat in tablets, followed by public Wi-Fi eavesdropping. Tablets can easily be infected by clicking on a malicious link or by entering company credentials into a phishing page mimicking itself as a challenge page.

Buried Alive by Consumer Applications in the Workspace

An article in GigaOM citing new research by Unisys on the consumerization of IT recently piqued my interest.   According to the research, IT pros underestimate the use of consumer technologies in the workplace by a whopping 50%.  In fact, IT decision-makers gave themselves a rating of only 2.9 for overall support of employee owned mobile devices, social appli


Subscribe to RSS - blogs