You are here

Share

Accellion is an industry leader in providing the world’s leading corporations and government agencies with mobile solutions that increase employee productivity while ensuring data security and compliance. 

Ultimately, IT must ensure secure file sharing and governance without creating obstacles for employees using OneDrive. But if CISOs don’t know what’s happening in OneDrive, they’re hesitant to let employees use it. CISOs are better served making OneDrive safer and more compliant with their internal policies and external regulations. With the proper governance controls applied to OneDrive, CISOs now have this option.
Value-based care goes beyond reducing or eliminating unnecessary tests, drugs, and procedures. Healthcare IT professionals contribute to value-based care initiatives when they strike a balance between efficient and secure file sharing of patient records.
The variety of laws and regulations governing how organizations manage and share sensitive information can look like a bowl of alphabet soup: HIPAA, GDPR, SOX, PCI and GLBA. But there are a manageable number of precautions you can take to secure customer data that will tick the boxes for many different regulations.
Accellion, a private cloud solutions provider, now offers one-click compliance reports designed to significantly streamline how companies demonstrate compliance with regulators. A single click generates detailed compliance reports that provide visibility into a system’s configurations and security settings and flag any issues impacting compliance.
Laureen joined Accellion as VP of Worldwide Business Development in early 2017 and is responsible for the company’s channel sales and strategic partnerships. She brings over 25 years of experience in enterprise software sales and marketing, and strategic partnership development with expertise in Enterprise File Sync and Sharing, Collaboration, and Content Management.
The deadline for defense contractors and subcontractors to implement the information security requirements listed in the National Institute of Standards and Technology (NIST) Special Publication (SP) 800-171 has come and gone. There are more than 100 information security requirements in NIST 800-171, and it is a good bet that many smaller companies without ample IT resources fall into the category of: “We missed the deadline… what now?”
While CISOs have long labored under the directive “do more with less,” it has often and unfortunately come at the expense of cybersecurity and data governance. CISOs and their organizations therefore must identify systems, solutions, and processes that enable their employees to share sensitive information securely and efficiently.
While the process for getting the FedRAMP seal of approval is complex, it can ultimately be lucrative for companies that are certified, not least because it signals a commitment to security to non-government customers as well.
Recent surveys reveal businesses around the world don’t know if they’re compliant with the EU’s General Data Protection Regulation (GDPR), regardless of the fact that the deadline is less than two months away. If this continues, there will be no shortage of GDPR compliance violations and fines. If your organization would like to avoid being on the GDPR naughty list, you must avoid these six pitfalls.
The companies we have chosen for our 2018 list of 100 Companies That Matter in Knowledge Management have proven their stuff. We are impressed and sometimes bowled over by what they offer.
Accellion today announced key enhancements to its mobile application that further enable senior executives to access and share sensitive content securely and in compliance with industry regulations.
Accessing and sharing sensitive documents from a smart phone or tablet must be efficient while meeting security standards to maintain compliance with industry regulations, even when on the road.
Cybersecurity expert, Scott Schober discusses the past, present and future of password security with Izak Bovee, Director of Product Management at Accellion.
Achieving the data visibility to ensure you can provide auditors with the information they need after a breach, and do so in just a few days, has never been more difficult.
The banking industry is walking a narrow line between providing advanced digital solutions, while at the same time building a level personal relationship that doesn't expose an organization to increased cybersecurity threats.
Chief data officers (CDOs), originally hired to oversee data governance, data quality, and regulatory matters, are now finding themselves on the frontlines of the analytics revolution, showing their organizations how data gathered from a rapidly multiplying number of endpoints can boost both growth and revenue.
Accellion and Check Point Software Technologies recently announced a joint partnership to deliver an integrated solution that enables organizations to protect sensitive content as it enters and leaves the enterprise.
Healthcare organizations need to be able to secure patient information. Patient privacy is at risk when PHI is stored in the network, transferred with a patient to another facility, and shared with external doctors, researchers, and insurance providers. If a healthcare organization can provide its staff with the tools to access and share patient information securely and efficiently, it’s possible to protect patient privacy and demonstrate compliance with HIPAA.
Each November and December, cybersecurity companies and professionals put on their prognosticator’s hat and predict the security issues that we should expect to see in the coming year. IT and security decision makers can use these predictions to dictate their security priorities in the coming year, which allows for better allocation of security budgets.
Facilitating file sharing between government employees and their external stakeholders like partners and constituents can get complicated if the information being shared is of a sensitive nature. Here are some key capabilities agencies should keep in mind when evaluating a file-sharing solution that meets both security and efficiency requirements.

Pages