Subscribe       Feed   All Posts     Search by Topic:
       

How Much Protection Do My Documents Need?

I recently had an opportunity to watch race car driving live at Infineon Raceway in Sonoma. If you’re a car enthusiast like me, nothing is more exciting than seeing hot sports cars driving fast on a track. Drivers are continually trying to outmaneuver each other to gain position and push their own driving abilities to the limit.

Forget the iPod, who wants a cassette deck?

Last weekend marked the 40th anniversary of the introduction of the File Transfer Protocol (FTP). While FTP certainly isn’t pretty to use, it has served a purpose.  Originally designed to enable programmers to move files between systems, FTP has continued to serve that purpose nobly for the past 40 years.

However IT departments who have used FTP as the basis for employees to share files across the enterprise, have had less successful results.

If a tree falls in a forest, and no one hears it, does it make a sound?

If a tree falls in a forest, and no one hears it, does it make a sound?  Or the file sharing equivalent – if an employee uses a free personal file sharing account, and IT doesn’t know about it, does it still present a security risk?  You bet it does.

The Data Breach that Keeps on Giving

The Epsilon data breach of last week keeps on giving, with millions of email notifications being sent out from the companies affected, informing recipients of the incident.  The New York Times has weighed in and made recommendations for Congress to address this type of failure for consumers with an editorial “Who Really Sent That E-Mail?”

Let's Not Forget - Individuals Collaborate, Not Enterprises

We should all thank Corinne Schmid at CMSWire for reminding us of the central role that employees play in Enterprise Collaboration. Far too often articles on collaboration focus on business benefits derived from collaboration, rather than the efficiencies gained by individuals. But the fact remains that if:

Enterprise Collaboration is a journey, it is used to reach a destination by its drivers – Employees.”

Top Ten Reasons You Need Secure Collaboration

10.  Your company has already had a data breach. Don’t make the same mistake twice.  According to a recent survey by McAfee, only half of the companies who have had a data breach or attempted data breach, have taken steps to remediate and protect systems for the future.

"Forget telling execs they can't use their new shiny iPad"

Thanks Mike Rothman, analyst and president at security research firm Securosis, for pointing out in this week's CSO article by George Hulme, that denying execs the use of their shiny new iPads is not going to make anyone popular. We agree with you Mike, "You have to try to find a way to secure these devices the best you can."

GigaOm’s Take on an Antidote for Un-Secure File Sharing

I’m a certified news junkie. I read at least half a dozen online publications every day and one of my favorite sites is GigaOM, in particular their WebWorkerDaily articles. I enjoy reading their articles on how social media is disrupting information flows in the enterprise, and the impact of the increasing use of consumer technologies in the workplace.

Observations from Gartner Portals, Content and Collaboration Summit - Part I

Accellion is participating at the Gartner Portals, Content and Collaboration (PCC) Summit this week as part of the launch of our new Secure Collaboration Solution.

A couple of interesting takeaways from the first day of the Gartner Summit:

Secure Collaboration for the Enterprise

Today Accellion announced the introduction of Accellion Secure Collaboration with Mobile Apps for the enterprise.

We understand that collaboration means many things to many people.  Accellion approaches collaboration from a file sharing perspective and is geared toward securely sharing enterprise information.

Accellion Secure Collaboration extends the award-winning file transfer capabilities our customers already enjoy and also:

Pages

Subscribe to RSS - blogs