White papers

Consultez une analyse approfondie des dernières questions, tendances et opportunités associées au partage de fichiers mobiles, à la synchronisation, à la productivité, à BYOD, à la consumérisation informatique et au stockage et au partage sur le cloud dans cette sélection de white papers d’Accellion.



Universal Content Access

5 Best Practices for Secure Enterprise Content Mobility
The proliferation of mobile devices and IT management’s increasing acceptance of Bring Your Own Device (BYOD) are creating new security challenges for enterprises. While Mobile Device Management (MDM) provides a useful framework for provisioning mobile devices and Mobile Application Management (MAM) provides a useful framework for provisioning and managing apps, neither MDM nor MAM address the file sharing and collaboration needs of mobile users. Such a solution —Mobile Content Management (MCM)— protects content itself, regardless of which devices are being used, enabling users to share that content securely across mobile devices and with other authorized users.
Download White Paper >>
Managing Growth and Driving Down Costs for Microsoft SharePoint
Osterman Research: This white paper presents the results of a market research survey conducted with organizations that have already deployed SharePoint. Results show that SharePoint is not fully optimized in many organizations. Learn more about how to manage growth and drive down costs for Sharepoint.
Download White Paper >>



Enterprise IT and Security

Accellion vs Box: 5 Key Reasons Enterprises Select Accellion
Mobile file sharing has become a necessity for today’s enterprises–nearly all workers are mobile. To stay productive, workers need access to all their files on all their devices. They also need to share files selectively and securely with other employees, partners, customers, and other users outside the enterprise. To protect confidential data, any file sharing and sync solution must be secure, monitored, and tightly controlled. Read this whitepaper to learn how the Accellion private cloud solution answers the need for a mobile, scalable, flexible file sharing solution that extends and reinforces enterprise security policies and controls.
Download White Paper >>
Mobilize SharePoint Securely: Top 5 Enterprise Requirements
To stay productive, mobile users want continuous access to business data—including data stored in Enterprise Content Management (ECM) systems such as Microsoft® SharePoint – and they want to collaborate on and share that information with co-workers, business partners, vendors and customers. When they discover how difficult it is to access SharePoint files on smartphones and tablets, they often do an end run around corporate IT and post files to cloud-based file-sharing services like Dropbox. Copies of SharePoint files then spread from device to device, unmonitored and uncontrolled by IT. Read this whitepaper learn how to mobilize SharePoint securely by meeting the five requirements enterprises should look for a solution:
Download White Paper >>
kiteworks - Security Overview
This whitepaper provides a technical overview of the kiteworks product architecture and illustrates key security features designed to ensure protection of enterprise content. It details how a three-tier architecture provides increased enterprise security and agility. This whitepaper also covers all key security capabilities essential for enterprise deployments including on-premise private cloud deployment, data encryption, application security policies, audit and reporting, mobile security features, integration with enterprise authentication, single sign-on, and more.
Download White Paper >>
10 Mobile Security Requirements for BYOD
Enterprises need to ensure that mobile workers always have the information they need at their fingertips and can share it with business partners and customers, while also ensuring that confidential data remains secure and that data security regulations and policies are never violated.
Download White Paper >>
Secure File Sharing for HIPAA Compliance: Protecting PHI
Healthcare organizations (HCOs) and their partners make themselves vulnerable to data breaches by sharing confidential files through physical media such as CDs and USB sticks and over online and mobile channels such as personal, dropbox-type applications, FTP or email. Learn how secure file sharing solutions help HCOs reduce the risk of data breaches and improve their compliance with industry regulations such as HIPAA.
Download White Paper >>
Survey Report: Mobile Content Security and Productivity
This report provides the key findings taken from a survey conducted by AIIM (an advocate and supporter of information professionals) between June and July 2013. Learn how important mobile access is to users, how likely they are to by-pass authorized systems, how compliant current collaboration practices are, and what collaboration functionality user expect on their mobile devices.
Download White Paper >>



Online File Sharing

Economic Value Analysis: Enterprise File Sync and Share, kiteworks by Accellion
This report provides key findings of a detailed Economic Value Validation (EVV) analysis from the Enterprise Strategy Group for the kiteworks solution. Results show that kiteworks offers higher ROI with the opportunity for enterprise organizations to drastically increase their IT and user productivity at a significantly lower total cost of ownership (TCO) compared with EFSS alternatives.
Download White Paper >>
Enterprise Strategy Group: Evaluating Cloud File Sharing and Collaboration Solutions
This whitepaper, written by Industry Analyst Terri McClure with The Enterprise Strategy Group, explores criteria for evaluating enterprise mobile cloud file sharing and collaboration solutions. Specifically, questions organizations need to ask when reviewing infrastructure choices, service and support, administration and control capabilities, as well as security and availability features.
Download White Paper >>
Evaluating Enterprise File Sharing Solutions: A Buyers Guide
Today’s workforce is mobile and enterprise organizations require secure file sharing solutions that enable employees to access the files they need from any source at any location, while ensuring that all file access and file sharing complies with the organization’s policies and industry regulations. Download this whitepaper to learn which features buyers should consider when evaluating an enterprise file sharing solution for today’s mobile workforce.
Download White Paper >>
Osterman Research: The Need for Enterprise-Grade File Sharing and Synchronization
Cloud-based file-sharing and synchronization (FSS) tools are among the hottest applications used in the workplace. These tools, which broadly can be classified as “consumer-focused” because they are typically deployed by individual users and not as part of a coordinated IT plan, offer tremendous usability. This white paper discusses how departments should deploy enterprise-grade replacements for these tools that will provide the same benefits of everywhere-access to files but that put IT in control.
Download White Paper >>
Beyond Dropbox: Requirements for Enterprise File Sharing and File Synchronization
Free file synchronization apps promise a hassle-free solution to many, but prove to be an immense challenge to those in charge of IT and security. These consumer-class services put enterprises at risk for data leaks, security attacks, and regulatory compliance violations.
Download White Paper >>



Mobile Enablement

BYOD File Sharing – Go Private Cloud to Mitigate Data Risks
The consumerization of IT and the popularity of BYOD (Bring Your Own Device) are jeopardizing the security and integrity of business data. Seeking an easy way to share files across smartphones, tablets, and desktops, employees are signing up for free public cloud file sharing services that lack rigorous security and audit controls. Download this whitepaper to learn the benefits of adopting private cloud solution for file sharing and synchronization.
Download White Paper >>
2013 Survey Results: Mobile Security Strategies
How are Organizations Tackling Today’s Top Mobile Security Challenges? This report details results of a recent survey Information Security Media Group (ISMG) conducted with senior IT leaders in healthcare, financial services and government. Sponsored by Accellion, the report also offers expert commentary and analysis by Tom Field, vice president of Editorial for ISMG as well as input by Malcolm Harkins, chief information security and privacy officer at Intel, and Elayne Starkey, CISO for the State of Delaware.
Download White Paper >>
Mobile Data Security: Best Practices for Securing Your Mobile Workforce
The typical mobile worker is carrying three or more mobile devices, at least one of which is a personal device brought from home. Organizations need to protect their data on every mobile device it resides. Unfortunately, enterprise mobile security falls short too much of the time. Download this whitepaper to learn 14 steps to reduce the risk of mobile data breaches while keeping mobile workers productive.
Download White Paper >>
Data Security for Mobile Users: One Size Does Not Fit All
Mobile computing is ubiquitous, but security solutions for mobile workers are not. For mobile security to be effective, tools and policies often need to be customized for specific users, roles, departments; or technologies. Rather than investing in solutions and enforcing security policies that treat all mobile users alike, IT should recognize the diversity of employee roles and requirements. Read this whitepaper to learn the key criteria for customizing a mobile security policy for your users.
Download White Paper >>
Enterprise Mobility Management: A Data Security Checklist
Secure file sharing, syncing and associated productivity requirements impose pressing technical and operational challenges on organizations.This document presents a checklist of features organizations should review when evaluating a data security solution as part of an enterprise mobility management strategy.
Download White Paper >>