August 10, 2018
Ultimately, IT must ensure secure file sharing and governance without creating obstacles for employees using OneDrive. But if CISOs don’t know what’s happening in OneDrive, they’re hesitant to let employees use it. CISOs are better served making OneDrive safer and more compliant with their internal policies and external regulations. With the proper governance controls applied to OneDrive, CISOs now have this option.
July 17, 2018
Value-based care goes beyond reducing or eliminating unnecessary tests, drugs, and procedures. Healthcare IT professionals contribute to value-based care initiatives when they strike a balance between efficient and secure file sharing of patient records.
June 14, 2018
The variety of laws and regulations governing how organizations manage and share sensitive information can look like a bowl of alphabet soup: HIPAA, GDPR, SOX, PCI and GLBA. But there are a manageable number of precautions you can take to secure customer data that will tick the boxes for many different regulations.
May 8, 2018
Accellion, a private cloud solutions provider, now offers one-click compliance reports designed to significantly streamline how companies demonstrate compliance with regulators. A single click generates detailed compliance reports that provide visibility into a system’s configurations and security settings and flag any issues impacting compliance.
May 7, 2018
Laureen joined Accellion as VP of Worldwide Business Development in early 2017 and is responsible for the company’s channel sales and strategic partnerships. She brings over 25 years of experience in enterprise software sales and marketing, and strategic partnership development with expertise in Enterprise File Sync and Sharing, Collaboration, and Content Management.
May 4, 2018
The deadline for defense contractors and subcontractors to implement the information security requirements listed in the National Institute of Standards and Technology (NIST) Special Publication (SP) 800-171 has come and gone. There are more than 100 information security requirements in NIST 800-171, and it is a good bet that many smaller companies without ample IT resources fall into the category of: “We missed the deadline… what now?”
April 17, 2018
While CISOs have long labored under the directive “do more with less,” it has often and unfortunately come at the expense of cybersecurity and data governance. CISOs and their organizations therefore must identify systems, solutions, and processes that enable their employees to share sensitive information securely and efficiently.
April 2, 2018
While the process for getting the FedRAMP seal of approval is complex, it can ultimately be lucrative for companies that are certified, not least because it signals a commitment to security to non-government customers as well.
March 16, 2018
Recent surveys reveal businesses around the world don’t know if they’re compliant with the EU’s General Data Protection Regulation (GDPR), regardless of the fact that the deadline is less than two months away. If this continues, there will be no shortage of GDPR compliance violations and fines. If your organization would like to avoid being on the GDPR naughty list, you must avoid these six pitfalls.
March 8, 2018
The companies we have chosen for our 2018 list of 100 Companies That Matter in Knowledge Management have proven their stuff. We are impressed and sometimes bowled over by what they offer.
March 5, 2018
Accellion today announced key enhancements to its mobile application that further enable senior executives to access and share sensitive content securely and in compliance with industry regulations.
March 2, 2018
Accessing and sharing sensitive documents from a smart phone or tablet must be efficient while meeting security standards to maintain compliance with industry regulations, even when on the road.
February 24, 2018
Cybersecurity expert, Scott Schober discusses the past, present and future of password security with Izak Bovee, Director of Product Management at Accellion.
February 22, 2018
Achieving the data visibility to ensure you can provide auditors with the information they need after a breach, and do so in just a few days, has never been more difficult.
February 12, 2018
The banking industry is walking a narrow line between providing advanced digital solutions, while at the same time building a level personal relationship that doesn't expose an organization to increased cybersecurity threats.
January 31, 2018
Chief data officers (CDOs), originally hired to oversee data governance, data quality, and regulatory matters, are now finding themselves on the frontlines of the analytics revolution, showing their organizations how data gathered from a rapidly multiplying number of endpoints can boost both growth and revenue.
January 18, 2018
Accellion and Check Point Software Technologies recently announced a joint partnership to deliver an integrated solution that enables organizations to protect sensitive content as it enters and leaves the enterprise.
December 18, 2017
Healthcare organizations need to be able to secure patient information. Patient privacy is at risk when PHI is stored in the network, transferred with a patient to another facility, and shared with external doctors, researchers, and insurance providers. If a healthcare organization can provide its staff with the tools to access and share patient information securely and efficiently, it’s possible to protect patient privacy and demonstrate compliance with HIPAA.
December 14, 2017
Each November and December, cybersecurity companies and professionals put on their prognosticator’s hat and predict the security issues that we should expect to see in the coming year. IT and security decision makers can use these predictions to dictate their security priorities in the coming year, which allows for better allocation of security budgets.
November 28, 2017
Facilitating file sharing between government employees and their external stakeholders like partners and constituents can get complicated if the information being shared is of a sensitive nature. Here are some key capabilities agencies should keep in mind when evaluating a file-sharing solution that meets both security and efficiency requirements.