Subscribe to Recent Blogs feed
Updated: 33 min 47 sec ago

Creating The Best Fantasy Sharing Team of 2014

September 16, 2014 - 9:24am
Blog Image: 

 

The sight of trees turning golden red, and the sounds of grown men screaming at the TV can only mean one thing – its football season. But why accept only the players your team’s coaching staff has chosen? Why not go the extra yard, go beyond what Harbaugh was able to do, and create the best team of 2014?

And that is why fantasy football was invented.  So those of us obsessed with creating football perfection had an outlet for our overwhelming knowledge of player stats and competitive line-ups. Because even if the abysmal performance of the Cowboys’ Tony Romo was dragging down your score in week 1, you could have had the Seahawk’s Marshawn Lynch to pick up a slew of points and balance it all out.

This same pick-and-choose mentality should be applied to content storage, management and access. No one wants to be locked into one silo for content, we want to pick and choose those solutions that work best for us, for each type of content we work with. This way we can get to job done, as quickly and easily, as we need.

That mentality is why we here at Accellion are launching our kiteworks cloud content connectors to Box and Dropbox. Mobile employees have content stored in multiple content repositories, both inside the corporate firewall in solutions like Microsoft SharePoint, and in external cloud storage silos like Box. End users need a way to access all of their content from one common management tool, while IT teams want visibility into all sharing and activity for compliance requirements.

The new cloud connectors will provide both end-users and IT teams with what they want. kiteworks now offers seamless integration with Box and Dropbox, making mobile file sharing a breeze, while honoring existing security settings and access controls to ensure data stays secure.

These cloud connectors join other storage favorites in Accellion’s connector roster, including Microsoft SharePoint, Documentum, OpenText, Google Drive and OneDrive. With Accellion you no longer have to choose one team, you can pick your favorite storage players, and make sure that your content sharing and management is customized for your needs.

Learn more about both of these connectors here

Tags:  Data Security and Compliance, Enterprise Content

Taking kiteworks Global with our New Partner Program

September 9, 2014 - 9:50am
Blog Image: 

 

Disruptive technology advancements will always drive shifts in channel sales behavior, as both vendors and solution providers move towards new requirements and solutions. We’re seeing this in the market now, as mobile solutions continue to evolve and enterprises struggle to deploy the right kinds of technologies to support business benefits and assist in transformation of their old business models to new ones.

That’s why we’ve launched a new global kiteworks channel partner program, to make it easier for partners to create new recurring revenue streams while enjoying increased margins selling the Accellion kiteworks solution. It will create a new recurring revenue model for partners, with low overhead costs, that will increase channel margins year-over-year. A services add-on business based on partner-led installs, implementations and value-added applications consulting will also support channel partner growth.

In conjunction with the new program, Accellion is launching an online Partner Portal, where channel partners can efficiently access marketing content, track leads and register deals while receiving real-time support from the Accellion team. From within the portal, partners can find collateral and ready-to-go content, such as program guides, use cases and solution briefs to leverage in their sales cycles, as well as technical and business knowledge transfer, to help improve their bottom line.

The program is built around our kiteworks solution, an enterprise mobile content solution with broad customer appeal in horizontal and vertical market segments and attractive product margins, which was recently named a Leader in Gartner’s 2014 EFSS Magic Quadrant. We at Accellion aren’t religious about channels, but instead are very pragmatic – kiteworks is best delivered through a partner network that adds value in these different ways.

The key to a successful channel program is to create a long-term sustainable vision that can be shared between partners and the vendor. It’s a vital piece of having sustainable growth in the enterprise world, and Accellion is looking forward to growing our channel through this new partner program.

 

 

Tags:  Mobile Productivity, Technology

Healthcare Organizations Suffering Data Breaches from Stolen Devices

September 5, 2014 - 10:18am
Blog Image: 

 

There have been so many news stories of sophisticated data breaches lately that it’s easy to overlook more mundane ways that confidential data can be lost or stolen.

Unfortunately, ordinary data breaches still occur. For example, earlier this year two healthcare organizations cumulatively lost tens of thousands of data records earlier this year because of lost USB flash drives or data sticks. The data breaches were large enough to trigger the HIPAA requirement that they be listed on the data breach Web site of the Department of Health and Human Services.

As the U-T San Diego (formerly the San Diego Union-Tribune) reported about Palomar Health’s data disclosure affecting 5,000 patients:

About 5,000 patients of Palomar Health had personal information — including medical diagnoses — stolen last month when someone swiped a company laptop and two flash drives from an employee’s SUV, a company official announced Friday. The laptop was encrypted, but the two flash drives were not. . . .

The flash drives contained the personal information of more than 5,000 patients, including their names, dates of birth, and information related to their diagnoses, treatments and insurance. It also included 36 Medicare identification numbers. Neither medical records nor financial information were on the stolen flash drives, according to a Palomar Health spokesperson.

Employees taking laptops, tablets, and smartphones home is one of the leading factors in the productivity boost associated with BYOD policies and mobile computing. But as this story shows, taking mobile devices home can be risky, especially when the data on those devices isn’t encrypted.

Of course, mobile devices and data storage peripherals can be stolen from offices, too. That’s what happened in a data breach affecting nearly 34,000 patients in Northern California. As the North Bay Business Journal reported:

Santa Rosa Memorial Hospital said data on about 33,000 patients were stolen during an early June burglary. A computer “thumb drive” with information on patients X-ray went missing from an outpatient imaging center.

The following day, hospital officials learned the drive was missing from the locker of a staff member who had backed up X-ray records on the drive in preparation for a data migration to Santa Rosa Memorial’s electronic medical records system.

The drive contained references to 33,702 patients who received services at the site from Feb. 2, 2009, through May 13, 2014. That information included the patient’s first and last names, gender, medical record number, date of birth, date and time of service, area of the body imaged, the X-ray technologist’s name and the radiation level required to produce the X-ray, in compliance with patient-safety standards.

Unencrypted flash drives and data sticks are simply too risky to be used for storing confidential data such as Patient Health Information (PHI). A better approach is to store confidential data in secured clouds (preferably private clouds) where it can be accessed only by authorized devices. If data is encrypted and access controls always enforced, data will be safe whether devices are at home or in the office. Then organizations can benefit from the employees 24/7 access to their devices without the risk of data loss.

Tags:  Data Security and Compliance, Healthcare, HIPAA

Balancing the Longer Hours of a BYOD Worker with Greater Security Risks

September 3, 2014 - 9:22am
Blog Image: 

 

Three out of four managers surveyed recently by BMC Software say BYOD is a big productivity boost.

There’s a very good reason for this - at the end of the day, employees bring those same devices home, where they use them for additional work late in the evening and early in the morning. That extra work would be difficult or impossible to accomplish if the only computers employees had were desktop systems that stayed in the office.

As CIO reported in its summary of BMC Software’s findings: “The average BYOD-carrying employee works an extra two hours and sends 20 more emails every day. One out of three BYOD employees checks work email before the official start of their work day, between 6 a.m. and 7 a.m.” The employee who checks email at 7 already has a head-start on the day when he or she arrives in the office at 8 or 9.

Enterprises are clearly benefitting from this extra productivity, but the BYOD revolution brings risks as well as benefits. The survey found that enterprises are not adequately addressing the security risks of BYOD. The survey reported that:

  • 72% of enterprises offer no security training for BYOD workers.
  • 43% of companies have no official BYOD policy and allow any kind of mobile device.
  • 42% have already experienced a serious data breach.

Enterprises surely appreciate the extra hours that BYOD workers are putting in, but IT departments should make sure that those workers had adequate security training and security tools, so that BYOD work habits do not lead to data breaches, mobile malware infections, or other types of security threats. If a BYOD data breach were to lead to lost competitive advantage or a hefty regulatory fine, those 20 extra emails a day will hardly be worth the price.

Tags:  BYOD, Data Security and Compliance, Mobile Productivity

Only You Can Prevent Data Leaks

August 29, 2014 - 10:08am
Blog Image: 

 

A staggering 822 million records were exposed by data breaches in 2013, according to research firm Risk Based Security. Data breaches compel organizations to look at their network infrastructure and security processes, and shore up areas where inadvertent data leaks are taking place.

The use of free online file sharing and syncing solutions is an overlooked area that leaves organizations vulnerable to unintentional data leaks. While most employees would not consider using a non-corporate sponsored email system, those same employees often readily collaborate through a free file-sharing service, because it is often easier to use than what is available from their employer.

Unfortunately, IT departments are often unaware or turn a blind eye to ad-hoc unmanaged and controlled file sharing activity Compounding the problem, many of these ad-hoc file sharing solutions offer little user authentication, encryption, tracking or audit controls. As a result sensitive data can be shared with unauthorized users without being screened by data leak prevention (DLP) or other security solutions often deployed for corporate tools such email.

Instead of ignoring the issue at hand, IT departments and senior managers should accept that employees need an easy way to collaborate without putting the company at risk. Ask these key questions to determine which solution ensures your organization's data security:

  1. Will employees be sharing sensitive or confidential information? If the material is sensitive or confidentially, there is definitely a need for encryption both at rest and in transit, no matter what deice is being used to share the content.
  2. Will employees collaborate on files and get input from multiple parties inside and outside of the company, on a variety of platforms and devices? If yes, then the solution must be extensible inside and outside of the corporate firewall, be device and platform agnostic, as well as have features for version control and data backup.
  3. Do you need to be concerned with the location of stored information? If this is a concern, the solution must be able to host content in specific geographic regions for data sovereignty, or in an on-premise private cloud that complies with international regulations.
  4. Do you have compliance controls and authentication policies in place for email or other content management solutions? If so, you'll need the same level of control for your file sharing and sync solution, including user authentication, integration with content filtering solutions, and tracking access logs.

The days of turning a blind eye and ignoring ad hoc, BYOD solutions are over.  You should answer these four questions to set your company practices around sharing information to avoid the worst-case scenario of sensitive data leaking outside the company.

 

 

Tags:  Data Security and Compliance, Enterprise Content

Bringing More Transparency to our Industry

August 26, 2014 - 8:50am
Blog Image: 

 

As anyone who follows the EFSS market can tell you, it's an insanely crowded and competitive space to operate within. In order to stay ahead, you need to make sure potential customers understand exactly what benefits they're getting from your solution.

More and more often IT departments need to go past the "operationally desirable" statements from vendors, and quantitatively prove the ROI of potential investments their team is making in hardware or software. After hearing this from our customers, we wanted to step up and provide the type of transparency they're requesting.

That's why we worked with the Enterprise Strategy Group (ESG) to create an economic value analysis calculator, to provide transparency into the benefits we're providing to customers, as well as break out the costs of our solution compared to pure public cloud vendors. IT teams want to understand real advantages and financial models of solutions, not be offered generalization of potential benefits they could see in the future.

I want our industry to be more like the automotive industry, where consumer or company purchases can be based on a number of comparative factors from third-party agencies like Edmunds or Consumer Reports. Whether buyers are looking for luxury, fuel economy, or industrial strength, they're able to choose the right vehicle to fit their personal or professional requirements, because the ROI is easily understandable. This kind of accountability and transparency is even more crucial in our ever shifting mobile and cloud computing enabled world and should be better implemented across all technology verticals.  

EFSS solutions are a critical part of how all enterprises get work accomplished, as content is shared, created, synced and edited day-in and day-out. Companies should be able to evaluate the true ROI that we an dither vendors are offering, and make an informed decision about what solution is best for the bottom line of their business.

To learn more about the ESG economic value analysis of EFSS, click here

Tags:  File Sharing, File Sync, UX

Gartner Predicts Rise of the Digital Risk Officer

August 22, 2014 - 11:12am
Blog Image: 

 

The number of devices connected to enterprise networks is skyrocketing. One reason is mobile computing. Mobile workers in the US now carry on average 3 mobile devices, according to a recent survey by Sophos. Fifteen years ago, each of those workers would have connected to the network through a single desktop computer. The number of devices storing business data and connected to the network per employee has tripled (or quadrupled for those employees who still have desktop computers in addition to their mobile devices). And unlike the devices of a decade or more ago, many of these devices have been selected and configured by employees themselves, regardless of whether or not the organization has officially adopted a Bring Your Own Device (BYOD) policy.

Another reason for the increase in devices is the ongoing rapid adoption of special-purpose networked devices, a trend that Gartner and others now refer to as the Internet of Things (IoT). Gartner defines the IoT as “the network of physical objects that contain embedded technology to communicate and sense or interact with their internal states or the external environment.” Examples include surveillance cameras, environmental monitoring systems, and factory automation systems. Gartner says that there were 0.9 billion of these devices in 2009, but by 2020 there will be 26 billion—a 30-fold increase.

All those devices and connections create risk for data confidentiality and integrity, which is why Gartner is now predicting the rise of a new executive role, the Digital Risk Officer. According to Gartner:

More than half of CEOs will have a senior "digital" leader role in their staff by the end of 2015, according to the 2014 CEO and Senior Executive Survey by Gartner, Inc. Gartner said that by 2017, one-third of large enterprises engaging in digital business models and activities will also have a digital risk officer (DRO) role or equivalent.

By 2020, 60 percent of digital businesses will suffer major service failures due to the inability of the IT security team to manage digital risk in new technology and use cases. IT, operational technology (OT), the Internet of Things (IoT) and physical security technologies will have interdependencies that require a risk-based approach to governance and management. Digital risk management is the next evolution in enterprise risk and security for digital businesses that are expanding the scope of technologies requiring protection. . . .

The advent of the Digital Risk Officer is another sign of just how vast are the changes taking in place in enterprise IT. Connected corporations are becoming hyperconnected as the number of devices multiplies. Services are moving to the cloud, and access is moving from cubicle-tethered desktops to smartphones and tablets. Networks, many now running at speeds of 10G or faster, are supporting more devices and more types of data than ever before.

As Gartner points out, when access is everywhere, risk is everywhere. BYOD and the IoT can make enterprises more agile and productive, but they also introduce new vulnerabilities and security hazards. The next data breach could come from a smartphone, tablet, or networked sensor (many of which were designed without security in mind).

But risk management isn’t the only challenge facing enterprise management teams grappling with the implications of their hyperconnected infrastructures. Keeping security in mind, they should look for ways to re-engineer services and processes to take full advantage of the connectivity and agility enabled by BYOD and IoT. The goal should be to create not only IT services that are more extensive and secure, but also a workforce that is more productive and enthusiastic.

Tags:  BYOD, Data Security and Compliance

The Lesson from Shadow IT? Workers Want Easy-to-Use Services for Getting Work Done

August 19, 2014 - 10:22am
Blog Image: 

 

The phrase “Shadow IT” refers to products and services used by employees without the knowledge or approval of the IT department.

Shadow IT is everywhere: it can be found in just about any department of any organization. When Frost & Sullivan surveyed line of business (LOB) and IT managers, they found that 80% of respondents admitted using non-approved SaaS applications for their work. Moreover, the survey found:

Non-approved applications represent a sizable proportion of all SaaS apps used in a company. According to respondents, the average company utilizes around 20 SaaS applications; of these, more than 7 are non-approved. That means you can expect that upwards of 35 percent of all SaaS apps in your company are purchased and used without oversight.

Popular categories of shadow IT applications include business productivity, social media, file sharing, storage, and backup, according to the survey.

Why are employees using shadow IT? Frost & Sullivan found that these employees just want to get their jobs done. Many shadow IT users felt that the applications they selected met their needs better than those selected by the IT department. In some cases, the employees were already familiar with the applications they selected, and they felt further swayed when the applications were free. In many organizations, there was confusion about who had the authority to select an application: was it the department or IT? Lacking clear guidance from management, employees decided to act for themselves.

If this ad hoc provisioning seems to be meeting employees’ needs, why not just let it continue? Unfortunately, enterprises must stop shadow IT, because it creates enormous security risks and can lead to data breaches and regulatory fines.

How can an enterprise—especially an enterprise in a highly regulated industry such as financial services or healthcare—possibly keep track of all its confidential files if employees are posting files to an ad hoc collection of unmonitored public-cloud file sharing services? How can the finance department of any public company claim it is complying with Sarbanes-Oxley requirements for managing the distribution of financial data, if it has no idea how its files are being distributed?

Files leaked through shadow IT can make the shadow itself especially long, dark, and gloomy, once data breaches are publicized and regulatory penalties accrue.

Enterprises need to take action.

First, they should establish clear policies about who can select which type of application. If IT is in charge, this should be made clear. If departments have leeway to select certain types of applications, that, too, should be made clear. Next, enterprises should educate employees about the risks of public-cloud services that might leak files or admit malware to the network.

Finally, enterprises should select and provision SaaS services that are as powerful and easy-to-use as those being used in shadow IT. Employees are turning to applications to get their work done. Enterprises would be wise to select applications and services that let their employees do just that.

Tags:  Data Security and Compliance, Financial Services, Private Cloud File Sharing

In-house Counsel Should Take BYOD Risks Seriously

August 14, 2014 - 8:50am
Blog Image: 

 

In many organizations, decisions about mobile technology are made primarily or exclusively by the IT and IT security departments working together.

All too often, there’s one department that’s left out of these discussions:  the organization’s own legal team, and In-house Counsel. This omission is unfortunate. Legal counsel is familiar with laws, including the latest rulings about electronic discovery and data privacy, and others issues pertaining to liability and risks. Enterprises would be wise to consult in-house counsel when establishing employee policies about data confidentiality, BYOD, and use of mobile devices. There’s another reason, too, for consulting in-house counsel when mobile security policies are being formulated. In the unfortunate case that mobile technology leads to a data breach or regulatory violation, in-house counsel will likely end up spearheading the response. If the company’s legal team has the opportunity to offer guidance before a possible breach or violation occurs, then the opportunity for legal surprises is minimized.

In a series of articles for InsideCounsel Magazine (here and here), attorney and legal security expert Matt Nelson explains why inside counsel should be involved in mobile security decisions from the start. He makes the following points about legal issues and a mobile workforce:

  • Whether a company adopts a BYOD policy and allows employees to use personal devices for work or rejects BYOD requests and issues all employees company-sanctioned mobile devices, the legal liability is roughly the same. Employees are going to mix personal data and business data on their mobile devices regardless. Enterprise IT organizations should plan accordingly and deploy security solutions that protect business data, regardless of who owns the device.
  • Data stored on mobile devices may be discoverable (that is, required by a court to be presented as evidence by a specific deadline). The IT organization may need to have technology for tracking and retrieving material information stored on mobile devices, including devices owned by employees. Nelson cites a recent case from Illinois: For example, in In re Pradaxa Product Liability Litigation, the Southern District of Illinois recently fined defendants $931,000 to encourage them “to respect this court and comply with its orders.” Central to the order was defendants’ failure to preserve text messages on employees’ mobile phones.
  • Data on mobile devices is at risk. Mobile malware is proliferating, and lost devices usually compromised. Nelson describes an experiment in which Symantec left 50 mobile phones in public locations in 5 different cities to see how the phones would fare when discovered by strangers. In 96% of the cases, people who found phones tried to access their data. Only half of the people who found the phones attempted to return them. The experiment demonstrated that enterprises cannot assume that lost devices will be returned or left untampered with. On the contrary, a lost device is likely going to result in a data breach, even if it’s only a minor one.

Nelson’s advice for enterprises? IT teams should bring their In-house Counsel and legal teams to the table when defining security policies. Also any mobile security solutions should provide IT administrators and legal counsel with the ability to monitor, track, and retrieve data on mobile devices. In addition, mobile security solutions should guard against mobile malware and protect data on devices that are lost or stolen.

In my judgment, Nelson makes a solid case.

 

 

Tags:  Data Security and Compliance, Legal, Mobile Productivity

Can't All of Your Enterprise Content Just Get Along?

August 12, 2014 - 10:59am
Blog Image: 

 

In how many different places does your enterprise data reside? Think about what’s stored on-premise versus in the cloud. Are you using SharePoint and other ECM systems? What about Google Drive and Microsoft OneDrive? Have you lost count?

If you’re like the majority of organizations, your enterprise information is taking on a life of its own. A survey by AIIM, “Get More from On-Premise ECM,” found that 40% of enterprises say they are looking to put some of their active documents in the cloud, while leaving static documents or historical records on-premise. Plus, more than 50 % of companies already have three or more storage solutions in place.

Therefore, it should come as no surprise that employee productivity is taking a hit, with users struggling to find the information they need when they need it. This is particularly true when trying to share information with customers, prospects or others outside of the company. A separate AIIM survey, “Content Collaboration and Processing in a Cloud and Mobile World,” revealed that 71% of users believe their organization has shortfalls in technical support for external collaboration.

The last thing you want is a complex, tangled web of content that frustrates users, hinders mobile access and potentially compromises security. Yet, here you are.

Wouldn’t it be nice to have one solution that enables collaboration regardless of where content is stored? One solution that provides a consistent user interface for accessing, reviewing, editing and sharing information on the go? One solution that supports your company’s security and auditing policies across numerous storage systems? Are you nodding your head yes?

To address this issue, we created our kiteworks content connectors, which allow you to accomplish exactly that and more. And today we’ve announced our new cloud connect connectors (LINK to release), enabling enterprises to access data stored in Google Drive for Work and Microsoft OneDrive for Business. We bridge the gaps between your existing content and your users – connecting and unifying data located in the cloud and on-premise.

Whether your information is stored in Google Drive, Microsoft SharePoint, Microsoft OneDrive, Windows File Shares, Documentum, OpenText or Distributed File Systems, your users gain ubiquitous mobile access, easy file sharing and secure collaboration. Learn more about how simple it is to connect your content

Tags:  Enterprise Content, UX

New Study Finds Enterprises Struggling with BYOD

August 7, 2014 - 9:26am
Blog Image: 

CompTIA, a non-profit trade organization for the IT industry, recently released its Third Annual Trends in Enterprise Mobility study, surveying 400 business and IT executives responsible for mobility policies and processes. The study might have been expected to find widespread enthusiasm for BYOD and a nice smattering of success stories, but it didn’t. Instead it found that U.S. companies of all sizes are having difficulty managing their mobile deployments and realizing all the benefits of mobility promised by BYOD enthusiasts.

Specifically, the study found:

  • Over 70% of organizations “have made some level of investment to build out mobility” solutions.
  • 55% of organizations have implemented some form of BYOD—a figure much lower than the 95% cited in a recent study by Cisco.
  • Just 30% of companies put formal mobility policies in place.
  • Just 8% have adjusted workflow to account for mobile technology.

The top investment is mobile devices. BYOD hype notwithstanding, many companies are providing employees with smartphones and tablets, rather than counting on or requiring employees to provide their own devices.

  • Small companies are struggling to support and integrate mobile devices and mobile services.
  • Mid-sized companies are struggling to balance end user needs with those of the IT department.
  • Large companies are struggling to support and integrate a large number of devices.

What can one conclude from these findings? Here are several thoughts.

First, mobility is being added to, rather than integrated with, legacy infrastructure. Why? Integration has been difficult. Mobile Device Management (MDM) solutions are designed for managing, provisioning, and tracking mobile devices. They do nothing to make it easier for a mobile worker in the field to be productive, including quick, easy, and secure access to important files stored behind the corporate firewall in enterprise content management systems such as Documentum or SharePoint. Employees might be carrying multiple mobile devices, but the IT infrastructure and file access controls are still centered on the desktop. For now, enterprises are desktop-first, mobile-second.

The other conclusion follows from the finding that only 8% of organizations had adjusted their workflow to account for mobile devices—that even now, many years into the BYOD revolution and 7 years after the iPhone was introduced, business processes still assume that employees are sitting at their desks, staring into big screens and typing on full keyboards.

Until mobile services are more fully integrated into legacy systems, it is going to be difficult for companies to reshape their workflows to take advantage of mobile devices. Think about it: How can you streamline a workflow if a mobile user still has to struggle with a VPN on a smartphone to access a Web form that’s still hosted behind the firewall and designed for desktop users? Mobile workflow optimization depends on integration, and integration—for too many enterprises—has been a struggle.

However impressive the ROI and productivity gains are that enterprises have achieved with mobile technology so far, they’re only a fraction of what will be achieved once enterprises adopt a mobile-first infrastructure.

We know that employees are spending most of their online time now on smartphones and tablets. When IT services are available—with convenience and without compromise—on those same small, portable devices, the real revolution will begin.

Tags:  BYOD, Enterprise Content, Mobile Productivity

What Every Marketing Leader Needs to Know About Mobile

August 5, 2014 - 2:36pm
Blog Image: 

Mobile technology represents not only a revolution in how buyers research and purchase goods and services, but also represents a revolution in how marketing teams are able to create, and deliver, marketing messages and tools. However, for most marketing organizations the benefits of mobile as an enhancer of productivity are mostly untapped. Marketing leaders need to wake up and realize that mobile technology offers the opportunity for dramatic improvements in productivity through faster collaboration and information sharing both internally and externally. 

  • A recent survey by Polycom found that 35% of respondents find it hard to share content with others in a remote meeting, much less find a way to collaborate during it.
  • 86% of marketers lack coordination with other teams within the company and 85% lack coordination within their own team, according to a recent Marketo survey.
  • 28% of marketers believe that marketing investments should focus on collaboration tools, according to a survey by The Economist Intelligence Unit.

So what are the four key mobile technology capabilities that every marketing leader needs to put in place for the mobile marketing magic to happen?

  1. Secure mobile collaboration tools that work across any smartphone, tablet, laptop and desktop so that work can keep moving forward wherever the marketing team members find themselves.
  2. Easy, secure sharing of marketing content with internal and external parties from any device, since marketing often involves both internal team members and many outside vendors.
  3. Secure access to marketing materials from any device that allows everyone on the marketing team to stay in sync with the latest versions and keep projects moving forward inside and outside the office.
  4. Mobile protection of confidential marketing materials to ensure that the latest product release or SuperBowl video doesn't appear on YouTube prior to launch.

Just ask Chris – a marketing director at a major retailer. Last November, he turned a potential marketing disaster into a marketing victory because he had access to these mobile productivity capabilities. Just prior to launching a huge promotional campaign for Black Friday, one of the key suppliers faced serious production issues, meaning that a highly anticipated product would no longer be available to sell. Chris had to re-do the advertisements and related collateral to remove the highlighted product and substitute another – and fast!

Because Chris had the four key capabilities for mobile magic immediately available, he averted an impending disaster and turned it into a marketing success. Even though Chris was outside of the office he was alerted on his iPhone of the product delivery problems. Using kiteworks by Accellion, Chris was able to easily collaborate and share content with his internal team and the external Webmaster and designer. Updates of redesigned ads and web pages were reviewed and approved as quickly as they were produced, with edit and review cycles conducted while on-the-go. The end result was record-breaking Black Friday sales and a marketer who proved the value of having the four key critical mobile capabilities available and at hand.  

Learn more about how your marketing team can benefit from mobile file sharing and collaboration here http://www.accellion.com/kiteworks-for-marketing-teams.

Tags:  BYOD, UX

Legal Teams Working Faster and Smarter: Mobile Technology Boosts Attorney Productivity

July 31, 2014 - 10:20am
Blog Image: 

Most legal organizations are saying "yes" to mobile as a vehicle to help legal teams work faster and smarter. Corporate Counsel’s “2013 In-house Tech Survey” revealed that 76% of firms allow legal staff to bring their own devices to work.

The survey also revealed that 60% of legal departments report that mobile devices are being used in lieu of laptops when legal professionals are traveling away from the office. Sounds like a recipe for improved productivity on the road, but Corporate Counsel’s survey went on to reveal that these devices aren’t necessarily well integrated into the corporate IT and security environment or legal workflow:

  • Most mobile users only use mobile devices for messaging or document viewing, with more sophisticated uses going untapped.
  • 23% of legal departments have no formal security policy for mobile devices.

This is a little concerning since law firms are not only missing opportunities to boost the performance of legal staff, but are also potentially jeopardizing the confidentiality of client documents. Signing off on a BYOD program can deliver huge benefits, but only if organizations have a secure mobile solution in place to allow staff to productively use their mobile devices for more than checking email.

At Accellion we designed kiteworks Team Starter to help introduce legal professionals, corporate counsel and attorneys to the productivity gains that can be achieved with mobile capabilities to:

  1. Securely create, edit, view, share and print documents right from tablets and smartphones
  2. Easily collaborate with team members, clients and partners on case information
  3. Universally access content no matter where information is stored

Being able to work securely from anywhere translates into improvements in business productivity.

Here’s an example of how:  

Anne is the in-house counsel at OpenSource Software, which makes accounting software. Tax season is approaching which typically means the biggest quarter of the year for the sales team. Tony, one of the sales managers, is just about to close a million dollar deal with a large corporation.

The problem is that the customer is asking for edits to the standard purchase agreement.  The deal is still moving forward but Anne needs to revise the purchase agreement based on input from the customer’s attorney and have all parties sign-off before the quarter closes – in 48 hours.

With kiteworks by Accellion, the deal goes from slow to “go” just in the nick of time:

  • Tony creates a shared folder on kiteworks, granting access to Anne and the customer’s attorney.
  • Anne updates the purchase agreement and uploads it to the folder.
  • The customer’s attorney is alerted that the agreement is ready for review, providing redline comments via kiteworks’ built-in PDF annotator.
  • Anne sees the edits and revises the agreement accordingly.
  • She then assigns a task to the attorney to sign the document.
  • Tony closes the million-dollar deal – with a few hours to spare.

Mobile technology yields real business results by enabling employees to keep business moving forward 24x7.  Learn more about how kiteworks Team Starter helps increase mobile productivity for legal and other teams http://www.accellion.com/kiteworks-for-your-team

Tags:  Collaboration, Legal, Mobile Productivity

Field Work is No Picnic without Mobile Technology

July 29, 2014 - 9:43am
Blog Image: 

Today’s field operations teams face increasing pressure from customers to deliver exceptional services. And if field teams don’t deliver, customers aren't shy about finding another vendor who will. The 2013 Field Service Management Benchmark Survey found that while less than half of organizations (43%) are currently attaining as high as a 90% customer satisfaction rating, most are striving to do better. 

Many organizations are reporting that they are looking to mobile technology to help them improve field operation performance.  Over the next 12 months, more than three-quarters (77%) of field service organizations will have invested in mobile tools to support field technicians and more than 70% will have integrated new technologies into existing field service operations – showing a clear commitment to boosting those satisfaction ratings via mobile.

Here's a typical example of how mobile technology is helping improve field performance.  Paul, a field technician, has detected serious issues with equipment recently installed in the field at a power plant. He cannot begin the reinstall process without the latest version of the equipment manual. If plant operations are halted – whether due to faulty equipment or extended maintenance downtime – business performance suffers and customer satisfaction goes down.

Fortunately Paul is equipped with kiteworks by Accellion, and has real-time mobile access to the necessary data and information in the field to complete the equipment reinstallation rapidly. This means that Paul can keep equipment downtime at a minimum, and deliver superior customer service.

Secure mobile content access enables field operations staff to improve customer service, reduce unexpected downtime and boost productivity.  With kiteworks for Field Operations teams can 

  • Access the complete knowledge base, including reference materials and customer documentation, stored across all enterprise content sources.
  • Take field inspection notes via a mobile device, which in turn can be easily accessed by operations managers and other team members.
  • Collaborate on-demand with expert field office staff and external contractors to more quickly resolve on-site issues and boost overall productivity.

Learn how kiteworks Team Starter increases employee productivity, improves internal and external collaboration and boosts service efficiencies, allowing field operations staff to go well beyond meeting customer expectations.

Tags:  BYOD, Collaboration, Mobile Productivity

Cloud Storage Wars: Ready for the Next Episode?

July 23, 2014 - 9:47am
Blog Image: 

Recently Google, Microsoft, Amazon, Box and Dropbox have all been slashing prices on cloud storage in an attempt to lure customers to their cloud platforms. In the latest round, Box is now offering unlimited (infinite) storage with its Enterprise and Business offerings, essentially driving the price/GB of storage to $0, or at least approaching $0 at infinity. Given this latest offer by Box, what will be the next move by the cloud storage giants to convince individuals and business to park information in their cloud? Additionally, given that cloud storage is essentially being offered for free, how would someone decide between storing information in Google, Microsoft, Amazon, Box or Dropbox? And why should one decide? 

The cloud storage giants are betting on individuals and organizations picking "a" cloud to store their information in, and creating stickiness for services that come with that platform, such as email, a calendar, productivity tools, and collaboration tools.  What's in it for the cloud storage giants? Everything, since as is becoming increasingly obvious once you start using a cloud service, the cloud provider knows a lot about you and this information can be used for targeted marketing.

While for individuals, choosing "a" cloud and storing all your information there, may be a reasonable objective since it can simplify life, for organizations this seems a lot less likely. Currently organizations have information strewn across any number of content silos including SharePoint, Windows File Shares, OpenText, and Documentum to name just a few. Few enterprise organizations have the stomach for embarking on finding all that information and then copying all that information into a single "chosen" cloud.

The reality is that enterprise information isn’t all stored in one place for end users or IT managers. It’s often stored in different systems, which use different access structures, making it difficult for employees to get to all of the information they need, in particular from a mobile device. At Accellion our goal is to streamline that process, providing a single point of access to all content, no matter where it is stored. This makes employees more productive, because they have one view into all content, from any device.

At Accellion we recognize and embrace the idea that enterprise information is and will continue to be stored in a number of locations both inside the firewall and outside the firewall in the cloud.  While cloud storage giants may be creating destination clouds, they really are just one more place to store information, not necessarily "the" place to store information. At Accellion we focused on providing a unified mobile interface into enterprise information, wherever it's stored. With kiteworks by Accellion employees can access this information on a mobile device, edit it, and share it securely under the watchful eye of IT, and that's a good thing.

As we wait for the next episode of cloud storage wars to unfold, at Accellion we continue to focus on maintaining our position as the leader in mobile file sharing and collaboration. Because we know it’s not where you store information, but how readily it's accessed, used and shared by your organization, each and every day, that generates business results. 

Tags:  BYOD, Enterprise Content, Mobile Productivity

Accellion a Leader in Gartner’s Enterprise File Sync & Share Magic Quadrant

July 22, 2014 - 9:19am
Blog Image: 

The enterprise file synchronization and sharing (EFSS) market is maturing, which will benefit IT leaders planning for mobile and collaboration initiatives. 

Gartner recently published the 2014 “Magic Quadrant for Enterprise File Synchronization and Sharing” report, detailing the top 19 players in a field that has nearly 100 vendors, and Accellion is positioned as 1 of only 4 vendors in the Leader quadrant.

According to the Gartner Magic Quadrant report, “Accellion is a good fit for organizations prioritizing their EFSS initiatives for mobile experiences, while ensuring data protection and compliance, particularly those operating in regulated markets such financial services, healthcare, and government.”

We consider our position in the “Leader” quadrant to be confirmation of our vision to enable today’s mobile workforce to securely share and access business information wherever works takes them. We will continue to create innovative products that combine enterprise-grade security with the ease of use required by today’s employees, enabling enterprise organizations to realize productivity gains without jeopardizing information security.

I invite you to download your own copy of the report here.

Tags:  File Sharing, File Sync, Mobile Productivity

Real-Time Medical Diagnoses: Mobile Technology Improves Patient Care

July 21, 2014 - 3:39pm
Blog Image: 

The Association of American Medical Colleges (AAMA) predicts that the U.S. will face a shortage of more than 91,000 physicians by 2020.  The good news is that mobile technology is transforming the delivery of medical care, streamlining collaboration and making it easier to get a high level of patient care and expert medical diagnoses even given the projected shortage of doctors.

For example, Michael is a doctor at a clinic in rural Minnesota. Carol, a local resident, fell down a flight of stairs and is in his office with severe back pain. Concerned that she may have suffered a spinal injury, Michael wants to consult a spine specialist at a large hospital 250 miles away.

Luckily for Carol, the clinic uses kiteworks by Accellion, allowing the lab technician at the clinic to instantly upload and share Carol’s test results and back images with the specialist. On the receiving end, the specialist is notified that the files are ready to review, analyzes each and determines that Carol requires surgery. Within the span of 30 minutes, Carol has received a diagnosis from one of the leading spinal experts – located more than four hours away. Additionally, all of the data shared was compliant with HIPAA and HITECH regulations, ensuring the security of Carol’s personal health information (PHI).

Thankfully, many hospitals are well on their way to leveraging the power that mobile devices have on improving medical staff’s productivity. The third annual HIMSS Analytics Mobile Survey results revealed that:

  • Nearly all of the survey respondents supply mobile technology to clinicians, most often laptops (87%), workstations on wheels (81%) and smartphones (69%).
  • 69% of physicians use mobile technology to view patient data, such as a lab result or digital image.
  • 64% used mobile technology to look up non-PHI health information, such as clinical guidelines.

This is all great news, but there is definitely room for expanded mobile use, as the survey went on to show that:

  • A mere 21% use mobile technology to analyze patient data.
  • Only 36% use it to collect data at the bedside.
  • Clinicians are most likely to access key clinical systems via a mobile device through the Internet using VPN.

For most medical teams, the mobile devices are in place, as are the recommended security measures. The HIMSS survey revealed that 94% of respondents have implemented password protection (94%) for mobile devices; 71% use encryption and 69% have remote wipe capabilities.

Now, it’s time to take patient care, physician collaboration and mobile productivity to the next level by enabling medical teams to connect in real-time with staff in other locations; record notes on any type of device; and access and analyze patient health information for faster diagnoses. Imagine the possibilities. We invite you to learn more about how kiteworks Team Starter is leading the way for medical teams to deliver improved patient care through the use of mobile file sharing and collaboration http://www.accellion.com/kiteworks-for-medical-teams

Tags:  Collaboration, Healthcare, Mobile Productivity

The Power Lunch: Mobile Technology Boosts Sales Performance

July 16, 2014 - 4:17pm
Blog Image: 

Spending time with customers is one of the key attributes of high performing sales teams and a mobilized salesforce is able to take the power lunch to a whole new level. Equipped with mobile technology today's sales teams take on super powers, transforming every lunch to a sales opportunity.

Consider this fairly typical situation: In one hour, sales account manager Amy will be meeting customer John for lunch. The goal of the lunch meeting is to not only allow Amy and John to bond over seared sea scallops with pesto aioli, but also provide Amy the opportunity to share information on the soon-to-be released new product and get John signed up as an early adopter.  However, Amy is en route to lunch and gets an update that the engineering team has made recent tweaks to the product, which have not yet made it into Amy's product demo or slide deck. Amy needs help to get the most up-to-date information onto her iPad to share with John over lunch.  

Not to worry. Amy and Mona, the product marketing manager, use kiteworks Team Starter so they can share content in real-time on any device  – regardless of where each are located – even if the content is a little hush hush. Mona uploads the new slides, and when Amy fires up her iPad to show off the new product details to John, in between the arugula salad and the sea scallops, the new up-to-date information is available, and by coffee John and Amy are discussing pricing.  Lunch is a success and by the end of the week, John has the new product installed and under evaluation.   

Real-time mobile collaboration and content access when and where you need it are just some of the benefits that kiteworks delivers. Whether you’re a start-up organization with a handful of employees or an established market leader with a global sales force, kiteworks makes it easy for teams to work together, giving sales teams what they need to impress prospects and customers at every step of the sales cycle and boost sales performance.   

Learn more on how kiteworks Team Starter helps sales team close deals faster by visiting our team pages  http://www.accellion.com/kiteworks-for-sales-teams or contact us to discuss over lunch.

Bon Appetit!

Tags:  Collaboration, Mobile Productivity

Work - It's What's for Breakfast in the Mobile World

July 14, 2014 - 11:05am
Blog Image: 

How many of us now check email at breakfast or after dinner or while waiting for our lunch sandwich to arrive?  Don't worry it's normal in fact it's becoming the new norm. The adoption of mobile devices in the workplace is transforming the way people work as they become untethered from offices and regular work schedules.  

The development of the new mobile workforce is as much a social transformation as a technology transformation. Employees are adopting new work patterns as they experiment with how mobile devices can make them more productive, more efficient and better at their jobs.

At Accellion we've been working on ways to help organizations get mobile teams up and running and collaborating faster, providing ways for people to securely connect and share content with internal and external teams and get business done.

What we came up with was kiteworks Team Starter. Pre-configured for quick deployment, it gets mobile teams up and running fast for secure mobile collaboration and file sharing across organizational boundaries, and delivers immediate increases in team productivity, whether it’s a sales, marketing or legal team within a larger organization.

With kiteworks Team Starter, team leaders, department heads or managers can have their team moving business forward with secure mobile file sharing, collaboration and editing in just minutes. It was designed with a mobile-first perspective, so that the user experience is seamless across all devices, from smartphone to tablet to laptop to desktop. It includes innovative, industry-first features such as the kiteworks Move Tray, which streamlines the way people share files via mobile devices, as well as an Activity Stream that lets users see at-a-glance which files have been shared, edited or downloaded.

In addition to the content capabilities, the kiteworks Team Starter solution provides a simple administrative dashboard that lets team leaders add users as needed. Team Starter comes pre-configured with Accellion’s enterprise-grade security controls, so that data remains secure and private and IT is happy.

So what are you waiting for? Check out kiteworks Team Starter, and get your team up and collaborating before breakfast today!

Tags:  Mobile Productivity

When Intranets and SharePoint Aren’t Mobile-Ready, Users Fall Back on Email

July 9, 2014 - 1:04pm
Blog Image: 

Enterprises have invested heavily in SharePoint and intranets, but in too many organizations these services are not ready to support mobile users. As a result, mobile workers are falling back on email for sharing and transferring files.

That’s one of the revelations found in a recent survey of U.S. workers by theCOMMSapp, a New York-based technology company. The survey found that SharePoint and intranets remain inaccessible to many mobile workers:

“82% of those with corporate Intranets said they either have never tried to access this channel via their mobile device or have a difficult time doing so. Similarly, with regard to social collaboration networks, 78% of those who have such networks have either never tried to access them or have a difficult time doing so via the mobile device.”

The same survey found that 96% of employees had mobile devices, 58% had purchased mobile devices themselves, and of those, 66% used them for work. Across industries, workers are increasingly mobile: only about half still spend 75% or more of their time at their desks.

If these mobile workers are not connecting to intranets or social collaboration networks for data, how are they getting the files and other information they need for their everyday work? Mostly through email. The survey found that employees prefer email as a way of learning company news, but employees are receiving so much email, important messages are being overlooked.

Overlooking a message with important files is just one of the risks of relying on email. Relying on email for file-sharing poses other risks, as well, including security risks. Email undermines the access controls configured in SharePoint and other ECMs to limit access to data to authorized users. And accidents happen: employees sometimes accidentally forward emails with confidential data to unauthorized users. IT administrators and compliance officers often have difficulty tracking the distribution of files through email, especially when users working remotely use personal email accounts such as Gmail.

Email is likely to remain an important communication channel for businesses—and that’s fine. But enterprises need to extend their intranets, SharePoint, and other Enterprise Content Management (ECM) systems to be more readily available to their increasingly mobile workforce, while at the same time improving the efficiency and security of file sharing and collaboration with external users.

At Accellion we're helping enterprise organizations extend their investments in SharePoint, intranets and other ECM systems to embrace mobile users.  Our mobile file sharing solution, called kiteworks, enables mobile workers to securely access and share files directly from SharePoint and other ECMs on their preferred mobile device. Think of it as a universal secure connection to enterprise content, from any mobile device.  

So if you want to avoid having users reverting back to email for sharing files, there is an easy way to extend SharePoint and intranets to your mobile users - and it's called kiteworks.  

Tags:  BYOD, Enterprise Content, Mobile Productivity

Pages