You are here

Share
Connecting City of Pleasanton employees to their content
Posted by Hormazd Romer
Pleasanton is a city of 78,000 people in the Tri-Valley area of the San Francisco Bay Area. The City is also home to about 4,000 businesses, including offices for companies such as Clorox, Oracle, Safeway, and Workday. It’s a full service city, meaning that it has its own police department,...
Removable media are malware time bombs
Posted by Bob Ertl
A recent data leak at the FDIC provides a cautionary tale about the risks removable media creates for data security. Friday, February 26 was an FDIC employee’s last day at the agency. As she packed up her office, she downloaded what she thought were her own personal files such as family...
Randa Accessories
Posted by Hormazd Romer
High fashion is big business. Ask Randa Accessories. Established in 1910, Randa is the world’s leading men’s accessories company, creating and marketing soft goods including ties, belts, hats, gloves and much more. The Company has operations in 11 countries on five continents—and...
Aerospace & Defense Company
Posted by Hormazd Romer
When we talk about security, we mean securing content and keeping enterprise data safe from malware and other forms of data loss. One of our customers (they asked that their name be withheld) also talks about security but they secure US troops, civilians, military installations and critical...
Brexit and trans-Channel data transferring
Posted by Yorgen Edholm
The United Kingdom’s (UK) exit from the European Union (EU), more popularly known as “ Brexit ,” will have broad ramifications for IT organizations on either side of the Channel. Among those ramifications are new challenges regarding data sovereignty and data privacy involving the...
A leader in digital security needs a secure collaboration solution
Posted by Claire Galbois
People by and large like having options. If you’re buying a car, you want to be able to choose which make and model, which color, and which options. While having a number of options to choose from is always preferable, having too many choices can be problematic. In the case of Gemalto, a...
Image depicting the cosolidation of data into a cloud container.
Posted by Ajay Nigam
Enterprises are increasingly moving their data to the cloud. In fact, the typical enterprise hosts over 1,100 cloud services on average. With respect to enterprise content management (ECM) systems, it’s not uncommon for an organization to have data stored in: SharePoint, SharePoint Online,...
Entertainment Technology
Posted by Hormazd Romer
When we speak with prospective customers about their technology pain points, a lot of them mention FTP. Most of these prospective customers acknowledge the fact that FTP isn’t a perfect file sharing solution but justify using it because it’s a familiar solution. As a result, they...
Access all of your content from one location
Posted by Hormazd Romer
Mobile devices and cloud computing were supposed to simplify life for enterprise employees. But there’s at least one area of IT where life has become more complex: file access. A decade ago, the files an employee accessed might have been distributed across just a few content systems, such as...
Security features
Posted by Hormazd Romer
Enterprises continue to leak data either through carelessness or falling victim to hackers who have become increasingly sophisticated and effective. Unfortunately, there is no silver bullet that will protect an organization’s data. Rather, organizations have to set up many barriers to thwart...
Accellion and Microsoft Office 365
Posted by Dee Dee Kato
Accellion recently announced a number of key integrations with Microsoft Office Online that enhance productivity for enterprise employees editing, sharing and collaborating on Word, Excel and PowerPoint files, whether they are stored on-premises or in the cloud. The end result? Employees are more...
fedRAMP
Posted by Dee Dee Kato
kiteworks by Accellion is in the process of becoming FedRAMP-certified. What is FedRAMP ? It’s a rigorous security assessment and authorization framework developed by cybersecurity and cloud experts from many government agencies, including the General Services Administration (GSA), National...
Forrester Wave for EFSS Hybrid Solutions
Posted by Amy Chu
We are delighted to share that we have been named a Leader in the recently released report: The Forrester Wave™: Enterprise File Sync and Share, Hybrid Solutions, Q2 2016. This report evaluates the ten most significant hybrid cloud solution providers in EFSS in an effort to assist Enterprise...
kiteworks and Microsoft Office 365
Posted by Dee Dee Kato
How awesome would it be to have a secure, single point of access to find, edit and share all Microsoft files stored in an enterprise’s many on-premises and cloud content systems from any device? Sounds too good to be true? Well, this isn’t a pipe dream. In fact, secure file access,...
How safe is your healthcare organization?
Posted by Marianna Prodan
MedStar Health, 21 st Century Oncology, Hollywood Presbyterian Hospital. The list of cyber attacks targeting the healthcare industry goes on and on. The ten largest healthcare data breaches in 2015 compromised the personal health information (PHI) of almost 110 million Americans. That’s...
Crypto wars
Posted by Yorgen Edholm
Should technology companies undermine their own security features to help government agencies read encrypted data? The answer might depend on whose encrypted data is being read. Should encryption be purposely broken to facilitate mass surveillance? Most American would say “no,” judging...
Privacy Shield
Posted by Yorgen Edholm
In October 2015, the European Court of Justice (ECJ), the highest court in the European Union (EU), struck down the EU-U.S. Safe Harbor Agreement which had allowed U.S. companies to certify that they complied with the EU’s stringent data privacy regulations. Through this certification, U.S...
data breaches are board level issue
Posted by Yorgen Edholm
When it comes to data breaches and the professional longevity of CEOs and boards of directors, one can't help but say: “How times have changed!” Compare the reaction to almost any recent headline-grabbing data breach—Anthem, Ashley Madison, Sony, Wyndham Resorts—to the...
Decrypting Encryption
Posted by Hormazd Romer
There has been a heated debate over the last several months about encryption. Most consumers and corporations want it. Government agencies, particularly those in intelligence and law enforcement, don’t. Who is the rightful owner of your data? It depends on who you ask and what country you...
A data breach requires a thorough analysis of your data transfer practices
Posted by Hormazd Romer
A lot is written these days about best practices for preventing data breaches—practices such as keeping critical systems up to date with patches, ensuring firewalls and AV scanners are updated with signature files, educating employees about the risks of phishing attacks, and so on. These...

Pages