Skip to content
Accellion

Accellion

Enterprise Content Firewall

Free Trial Get A Demo
  • English
  • Contact Us
  • Platform
    • Enterprise Content FirewallUnified Security and Compliance for Third Party Communications
    • CISO Dashboard
    • Secure Email
    • Secure File Sharing
    • Secure Mobile Sharing
    • Secure Web Forms
    • Secure Managed File Transfer
    • Remote Work Security
    • Secure Content Access
    • SFTP Server Governance
    • Virtual Data Rooms
    • FTA UpgradeUpgrade Now for Broader Protection and Control
  • Solutions
    • Industries
      • Government
      • Healthcare
      • Financial Services
      • Legal
      • Manufacturing & Engineering
      • Higher Education
    • Roles
      • CISO
      • Sales
      • Customer Support
      • R&D
      • Corporate Finance
      • Corporate Legal
    • Compliance
      • HIPAA
      • GDPR
      • FedRAMP
      • SOC 2
      • FIPS
      • CMMC
      • Data Sovereignty
      • eDiscovery
  • Resources
    • Resource Center
    • Blog
    • Case Studies
    • Customers
    • Customer Success
    • Developer
    • Events
    • eBooks
    • Infographics
    • Product Briefs
    • Videos
    • Webinars (Upcoming)
    • Webinars (Archived)
    • Whitepapers
  • Partners
    • Reseller Locator
    • Technology Partners
    • Channel Partners
  • Company
    • About Us
    • Contact Us
    • Management
    • Investors
    • Press & News
    • Careers
    • Technical Support
  • Reseller Portal
  • Pricing

Blog

Accellion Data Security and Governance Blog

Eleven Requirements for Secure Managed File Transfer

by Bob Ertl September 17, 2020September 17, 2020 | Secure File Sharing
Today’s modern enterprise requires a secure managed file transfer solution. Managed file transfer (MFT) solutions have surprisingly demonstrated great staying power within the enterprise, despite the emergence and commoditization of...
Read More right-arrow
CISOs Must Help, Not Hinder, Business Success Jay Gonzales, CISO, Samsung Semiconductor

CISOs Must Help, Not Hinder, Business Success

by Laureen Smith
April 23, 2019 | CISO Perspectives
Six Principles for Securing Sensitive Enterprise Content in a Hyper-Connected World Protect Sensitive Content but Make it Easy to Share

Six Principles for Securing Sensitive Enterprise Content in a Hyper-Connected World

by Cliff White
March 21, 2019 | Cyber Security
Visualize Everyday Workflow Threats to Prevent Data Breaches Visualize Workflow Threats to Avoid Data Breaches

Visualize Everyday Workflow Threats to Prevent Data Breaches

by Cliff White
December 5, 2018 | Cyber Security
Develop Heuristics to Detect Anomalous Activity

Detect Anomalous Activity Ahead of a Data Breach With Heuristics

by Cliff White May 11, 2020May 11, 2020 | Cyber Security
No one knows your business better than you. You know when it looks normal or when it looks strange. If you don’t have an office in Shanghai, then why are...
Read More right-arrow

Working from Home Now? Here’s How to Do it Securely

by Bob Ertl March 23, 2020April 2, 2020 | Secure File Sharing
Most employees work from home only occasionally. The Coronavirus outbreak, however, has recently relegated millions of employees to home offices, kitchen tables, and living room couches. We do our part...
Read More right-arrow
Futurecon - Dallas

CISOs Enable Business Growth With This Strategy

by Laureen Smith March 19, 2020March 19, 2020 | CISO Perspectives
Can you blame the CISO who wants to quash any tool, system, or process that invites risk into the organization? CISOs face embarrassing data breaches and unceremonious terminations when employees...
Read More right-arrow
FutureCon Dallas

Why a Telephone Might Be the Best Tool to Stem Third Party Cyber Risk

by Laureen Smith March 12, 2020March 18, 2020 | CISO Perspectives
Compliance checklists and attestations only go so far in mitigating cyber risk. They demonstrate a partner’s commitment to cybersecurity awareness however they only capture a snapshot in time. A vendor,...
Read More right-arrow
Protect Third Party Workflows With Security Infrastructure Integrations

Protect Your Third Party Workflows With Security Infrastructure Integrations

by Cliff White March 3, 2020September 30, 2020 | Cyber Security
CISOs must use every tool at their disposal to protect their PII, PHI, and IP. Most security-first organizations spend millions of dollars on security tools from firewalls and hardened networks...
Read More right-arrow
Strengthen Security and Governance with Metadata

Strengthen Data Security and Governance with Metadata

by Cliff White February 5, 2020February 5, 2020 | Cyber Security
If you want to protect the sensitive data you share with third parties, you need to know everything you can about that data. What data is being shared? Who’s sharing...
Read More right-arrow
Lock Down Your Sensitive Data With Powerful Data Encryption

Lock Down Your Sensitive Data With Powerful Data Encryption

by Cliff White January 7, 2020February 5, 2020 | Cyber Security
If you owned a big, expensive diamond ring, would you leave it on the dashboard in an unlocked car or would you keep it locked in a safe and insure...
Read More right-arrow
Chicago cybersecurity leaders

Successful CISOs Use This Essential Tool Sparingly

by Joel York December 16, 2019December 16, 2019 | CISO Perspectives
If you think looking for a needle in a hay stack would be tough, imagine looking for a needle in a needle stack. Not just any needle, but a very...
Read More right-arrow
Maintain control of your sensitive content with a private or on-premises cloud

Maintain Control of Your Most Sensitive Content With a Private or On-Premises Cloud

by Cliff White December 12, 2019February 5, 2020 | Cyber Security
Anyone who has ever manufactured and sold a product in a competitive market will attest to Benjamin Franklin’s truism, “the bitterness of poor quality remains long after the sweetness of low price...
Read More right-arrow
Alan Levine, CISO for Alcoa (retired)

Want to Be a CISO? Know This First.

by Joel York December 9, 2019December 9, 2019 | CISO Perspectives
From the outside looking in, the CISO career appears pretty glamorous: lots of responsibility, lots of influence, and lots of technology. The reality unfortunately is quite different. Sure, there’s lots...
Read More right-arrow
Unify Access to All Your Enterprise Content Repositories

Protect Your Digital Assets with Unified Access to Enterprise Content Repositories

by Cliff White December 4, 2019February 5, 2020 | Cyber Security
A highly secure downtown office building has multiple layers of security. Employees must show identification in order to get through the front door and their badges only grant them access...
Read More right-arrow
Claude Schanet, CISO, GovSat Luxembourg

For CISOs, a Zero Trust Security Model Won’t Work Until You Do This First

by Jerome Bei December 2, 2019December 2, 2019 | CISO Perspectives
When it comes to safeguarding organizations and the valuable digital assets they produce, hold, and share, a Zero Trust security model is considered par-excellence. But zero trust comes at a...
Read More right-arrow
Jay Gonzales, CISO, Samsung Semiconductor

CISOs: Focus On These Fundamentals For Long-Term Success

by Laureen Smith November 20, 2019November 20, 2019 | CISO Perspectives
CISO’s clearly have an appetite for complexity. They secure and monitor an expansive ecosystem filled with sanctioned and unsanctioned systems, solutions, and devices. Most of these technologies generate, store or...
Read More right-arrow
Larry Whiteside, Veteran CISO and Cybersecurity Thought Leader

For Healthcare CISOs, There’s No Risk Quite Like This Risk

by Laureen Smith November 11, 2019November 11, 2019 | CISO Perspectives
On one hand, smart devices are a blessing to healthcare, producing valuable data that fuels healthy lifestyles and improves patient care. On the other hand, these devices are a nightmare,...
Read More right-arrow
Secure and Empower Employee Workflows With Enterprise Application Plugins

Secure and Empower Employee Workflows With Enterprise Application Plugins

by Cliff White November 5, 2019February 5, 2020 | Cyber Security
There’s a fine line between protecting sensitive information from data leaks and making that information easy to share with trusted partners. Make the process too difficult for employees, and they...
Read More right-arrow

Posts navigation

Next Page

Search

Browse Posts

  • CISO Perspectives37
  • Cyber Security68
  • Compliance12
  • Secure File Sharing23
  • Financial Services5
  • Government4
  • Healthcare5
  • Customer Stories4
  • Accellion News7

Subscribe

Get email updates with our latest blogs news

Popular Posts

  • Accellion’s New Mobile App Provides Senior Executives Enhanced Productivity and SecurityACCELLION NEWS
  • Achieve GDPR Compliance to Comply With EU’s New Data Privacy LawCOMPLIANCE
  • DLP Integration and its Role in Secure File SharingSECURE FILE SHARING
  • Lost and Stolen Mobile Devices Are Leading Cause of Healthcare Data BreachesCYBER SECURITY
  • NIST 800-171 Compliant File Sharing – What You Need to Know and How Accellion Can HelpCOMPLIANCE
Sign up for the latest blog posts and news

Contact Us

Sales

  • +1-650-687-3130
  • sales@accellion.com

Support

  • +1-888-654-3778
  • support@accellion.com

Stay Connected

  • LinkedIn
  • Facebook
  • Twitter

Platform

  • Platform Overview
  • Communication Consolidation
  • Unified Visibility
  • Unified Security
  • Unified Compliance

Industry

  • Government
  • Healthcare
  • Financial Services
  • Legal
  • Manufacturing and Engineering
  • Higher Education

Capabilities

  • CISO Dashboard
  • Secure File Sharing
  • Secure Email
  • Secure Mobile
  • Remote Work Security
  • Enterprise App Sharing
  • Secure Web Forms
  • Secure Collaboration
  • Virtual Data Rooms
  • Boardroom Communications
  • Secure Managed File Transfer
  • SFTP Server
  • Secure Content Access

Compliance

  • HIPAA
  • GDPR
  • FedRAMP
  • FIPS
  • SOC 2
  • CMMC
  • Data Sovereignty
  • eDiscovery

Resources

  • Resource Center
  • Case Studies
  • Customers
  • eBooks
  • Product Briefs
  • Webinars
  • Whitepapers
  • Developer
  • Blog

Company

  • About Us
  • Contact Us
  • Management Team
  • Investors
  • Partners
  • Press & Media
  • Events
  • Careers
  • Pricing
© 2021

ACCELLION. All rights reserved.

  • Privacy Policy
  • Legal
  • Platform
    • Enterprise Content FirewallUnified Security and Compliance for Third Party Communications
    • CISO Dashboard
    • Secure Email
    • Secure File Sharing
    • Secure Mobile Sharing
    • Secure Web Forms
    • Secure Managed File Transfer
    • Remote Work Security
    • Secure Content Access
    • SFTP Server Governance
    • Virtual Data Rooms
    • FTA UpgradeUpgrade Now for Broader Protection and Control
  • Solutions
    • Industries
      • Government
      • Healthcare
      • Financial Services
      • Legal
      • Manufacturing & Engineering
      • Higher Education
    • Roles
      • CISO
      • Sales
      • Customer Support
      • R&D
      • Corporate Finance
      • Corporate Legal
    • Compliance
      • HIPAA
      • GDPR
      • FedRAMP
      • SOC 2
      • FIPS
      • CMMC
      • Data Sovereignty
      • eDiscovery
  • Resources
    • Resource Center
    • Blog
    • Case Studies
    • Customers
    • Customer Success
    • Developer
    • Events
    • eBooks
    • Infographics
    • Product Briefs
    • Videos
    • Webinars (Upcoming)
    • Webinars (Archived)
    • Whitepapers
  • Partners
    • Reseller Locator
    • Technology Partners
    • Channel Partners
  • Company
    • About Us
    • Contact Us
    • Management
    • Investors
    • Press & News
    • Careers
    • Technical Support
Free Trial Get A Demo
  • English
  • +1-650-763-0741
  • Contact Us
  • Pricing
  • Blog
  • Support
  • Reseller Login