You are here

Share
Efficient and secure file sharing from mobile devices
Posted by Accellion Team
Accellion is pleased to announce the release of its new mobile app . While a new mobile app may not sound like the most exciting news, it’s what the mobile app does that’s truly exciting. Before we get into that, let’s look at a day in the life of a senior executive, say a VP,...
Content Visibility and Its Role in Demonstrating Compliance
Posted by Izak Bovee
Is your organization’s data secure? If so, can you clearly demonstrate your security practices to auditors? In a previous post , we identified four feature sets or “pillars” required for an effective data governance framework. We discussed: Security Governance and compliance Ease...
NIST 800-171 Compliance – What You Need to Know and How Accellion Can Help
Posted by Harvey Morrison
In response to intensifying security threats from nation states, hacktivists, and other malicious parties, the U.S. Department of Defense (DoD) has been raising the bar on its cybersecurity standards. An amendment to DFARS 252.204-7012 , a regulation addressing “Safeguarding Covered Defense...
Understanding GDPR’s Security and Compliance Requirements
Posted by Izak Bovee
The General Data Protection Regulation, or GDPR, was developed to bring legal unification and clarity to the protection of EU citizens' personal data. The GDPR’s definition of ‘personal data’, however, is incredibly broad. Home addresses, names, birthdays, photos and even...
Zero-Day Malware Threat
Posted by Accellion Team
“If you know the enemy and know yourself, you need not fear the result of a hundred battles,” wrote Sun Tzu in his classic Art of War . In cyber defense, knowing the enemy has become increasingly difficult. CISOs and security analysts might know who the attackers are—criminal...
Control customer data for GDPR compliance
Posted by Accellion Team
If you’re impacted by GDPR (most everybody is), then your organization is probably rushing to have systems and processes in place that will ensure it is compliant by the May 24 th 2018 deadline. If you’re responsible for making this happen, you’ve got a lot on your plate. As a...
FedRAMP-Authorization Benefits Commercial Businesses Too
Posted by Harvey Morrison
If you think FedRAMP-authorized cloud solutions are just for Government agencies, you aren’t alone. As part its “Cloud First” initiative to drive cloud adoption across the Federal Government, the Federal Risk and Authorization Management Program, or FedRAMP, was created to enable...
Improve Quality of Care and Clinical and Administrative Workflows During Patient Transfers
Posted by Marianna Prodan
In the course of receiving care, patients often travel from one provider to another. It’s critical that their protected health information (PHI) travel along with them. But too often, PHI is not transferred quickly or reliably. Incompatible IT systems, rigid compliance procedures, and...
Six must-haves for a secure enterprise file-sharing solution
Posted by Bob Ertl
This article originally appeared on GCN. Facilitating file sharing between government employees and their external stakeholders like partners and constituents can get complicated if the information being shared is of a sensitive nature. Ultimately, information can be categorized into three...
Share files securely
Posted by Izak Bovee
Enterprises are becoming more technologically diverse and that means they’re generating more data. Enterprises are also becoming more dependent on third-party service providers and that means it’s harder to keep track of sensitive information, namely where it sits, who has access to it...
Three Practices for Secure and Convenient Collaboration
Posted by Harvey Morrison
This article originally appeared on Carahsoft's website. Carahsoft is a valued Accellion partner. In a recent survey by Dimensional Research, one issue became abundantly clear: employees perceive an exclusive divide between secure communication and convenient communication. Of the surveyed team...
Now announcing kiteworks 3
Posted by Bob Ertl
Enterprises run on content, and today that content is everywhere: on Enterprise Content Management (ECM) platforms like Microsoft SharePoint and OpenText Documentum, on cloud services such as Office 365, and on public-cloud services like Box, Dropbox and Google Drive. When organizations share...
Transforming Care with Governance Over External File Sharing
Posted by Marianna Prodan
It is becoming increasingly critical for providers to have full control and visibility into patient information and how it is shared externally with specialists, researchers, other facilities or insurers. The ramifications of not knowing where patient information is stored, who has access to it, or...
governance of external file sharing
Posted by Accellion Team
Enterprises today are moving faster than ever before. Product development cycles are shorter, supply chains are more connected and nimble, and with more and more data being generated, information is delivered more quickly than ever before. As a result, IT organizations find themselves scrambling...
 How to collaborate with external stakeholders while remaining compliant
Posted by Andy Feit
This article originally appeared on CMSWire. Whenever organizations bring external partners into their business processes, it raises security questions. How will those partners impact your company’s governance, risk and compliance policies? It’s one thing to enable a business partner or...
Protecting patient data
Posted by Marianna Prodan
“What happens with the information I share with others?” That’s a pressing question for information security professionals at hospitals and other acute care organizations. When the 2017 HIMSS Cybersecurity Survey asked these security experts for their top concerns about...
A bank's partners can be one of its biggest security threats
Posted by Bob Ertl
According to a recent survey, bank executives feel they have a pretty good handle on their cybersecurity program. Their confidence falters however when asked about the security readiness of their partners. Bank Director's 2017 Technology Survey , conducted this summer, surveyed 145 US banking...
How to Protect Workflows When They Cross Enterprise Boundaries
Posted by Andy Feit
This article originally appeared on CMSWire. Back in the day, content-driven workflows were easy. Your collaborators were all part of your organization and editing rights were determined by a user’s application credentials or LDAP profile. The people involved in your business workflow had a...
The Linde Group
Posted by Accellion Team
The Linde Group is a leading global supplier of industrial, process and specialty gases and is one of the world’s most profitable engineering companies. Linde products and services can be found in nearly every industry, in more than 100 countries. With approximately 60,000 employees worldwide...
Share patient info securely and efficiently with Accellion kiteworks
Posted by Accellion Team
NYC Health + Hospitals is the largest public health care system in the nation—a network of 11 hospitals, trauma centers, neighborhood health centers, nursing homes, and post-acute care centers. The integrated health care system provides essential services to more than one million New Yorkers...

Pages