Skip to content
Accellion

Accellion

Kiteworks Content Firewall

Free Trial Get A Demo
  • English
  • Contact Us
  • Platform
    • Kiteworks® Content FirewallUnified Security and Compliance for Third Party Communications
    • CISO Dashboard
    • Secure Email
    • Secure File Sharing
    • Secure Mobile Sharing
    • Secure Web Forms
    • Secure Managed File Transfer
    • Secure Office 365 for 3rd Parties
    • Remote Work Security
    • Secure Content Access
    • SFTP Server Governance
    • Virtual Data Rooms
    • FTA UpgradeUpgrade Now for Broader Protection and Control
  • Solutions
    • Industries
      • Government
      • Healthcare
      • Financial Services
      • Legal
      • Manufacturing & Engineering
      • Higher Education
    • Roles
      • CISO
      • Sales
      • Customer Support
      • R&D
      • Corporate Finance
      • Corporate Legal
    • Compliance
      • HIPAA
      • GDPR
      • FedRAMP
      • SOC 2
      • FIPS
      • CMMC
      • Data Sovereignty
      • eDiscovery
  • Resources
    • Resource Center
    • Blog
    • Case Studies
    • Customers
    • Customer Success
    • Developer
    • Events
    • eBooks
    • Infographics
    • Product Briefs
    • Videos
    • Webinars (Upcoming)
    • Webinars (Archived)
    • Whitepapers
  • Partners
    • Reseller Locator
    • Technology Partners
    • Channel Partners
  • Company
    • About Us
    • Contact Us
    • Management
    • Investors
    • Press & News
    • Careers
    • Technical Support
    • Trust Center
  • Reseller Portal
  • Pricing

Cyber Security

Control Third Party Communication Apps to Protect Your Third Party Workflows

Control Third Party Communication Apps to Protect Your Third Party Workflows

by Cliff White October 23, 2019February 5, 2020 | Cyber Security
Much like a busy office building with employees and guests coming and going, it’s impossible to monitor all information leaving and entering your organization. Everyday third party communication apps, such...
Read More right-arrow
Aaron Blackstone, CISO for Texas Department of Public Safety

If Good Help is So Hard to Find, CISOs Find This Next Part Even Harder

by Joel York October 21, 2019October 21, 2019 | CISO Perspectives
Cyber attacks, data breaches and compliance violations are just some of the challenges keeping CISOs up at night. While daunting, these threats are manageable, if you have the budget to...
Read More right-arrow
Jake Margolis, CISO, Metro Water District for So. Cal

For CISOs Who Want to Leave a Lasting Legacy, Take This Advice from William Shakespeare

by Laureen Smith October 14, 2019October 14, 2019 | CISO Perspectives
It’s human nature to model the behavior of those we admire. We dress like them, copy their mannerisms, and subscribe to their philosophies. After all, imitation is the sincerest form...
Read More right-arrow
Shine a Light on Third Party Threats With a CISO Dashboard

Shine a Light on Third Party Threats With a CISO Dashboard

by Cliff White October 8, 2019February 5, 2020 | Cyber Security
If you’ve ever fumbled around in a dark room, looking for the light switch, you know what it’s like trying to protect an organization’s sensitive content. If you had a...
Read More right-arrow
Dave Snyder, CISO, Independence Blue Cross

The Secret to CISO Success? Do This One Thing Extremely Well

by Joel York October 2, 2019October 2, 2019 | CISO Perspectives
For CISOs who desire the proverbial seat at the table, they must do more than protect the business. They must intimately know the business; how it functions, what are its...
Read More right-arrow
Protect Your Sensitive Content With These Ten Best Practices

Protect Your Sensitive Content With These Ten Best Practices

by Cliff White September 30, 2019February 5, 2020 | Cyber Security
Organizations are under constant attack by bad actors trying to access sensitive information like PII, PHI, and IP. Your third party workflows, the channels your employees use to share confidential...
Read More right-arrow
Chicago cybersecurity leaders

CISOs Add Value to the Business By Doing This

by Joel York September 25, 2019September 25, 2019 | CISO Perspectives
If cutting costs is a business imperative, it’s a mystery why CISOs get any budget at all. Yes, the CISO role has long been synonymous with cost. Some might even...
Read More right-arrow
Claude Schanet, CISO, GovSat Luxembourg

CISOs Achieve a Holistic Cybersecurity Program Once They Address This Risk

by Jerome Bei September 18, 2019September 18, 2019 | CISO Perspectives
The rules have changed. Anti-virus software and strong passwords were previously sufficient for protecting intellectual property but not anymore. A more holistic approach is necessary, meaning organizations must exercise extreme...
Read More right-arrow
Laura Whitt-Winyard, Global CISO, DLL

Successful CISOs Spend Lots of Time Doing this One Essential Activity

by Joel York September 11, 2019September 11, 2019 | CISO Perspectives
Knowledge is power. Knowing is half the battle. The way of success is the way of continuous pursuit of knowledge. There are hundreds of inspirational quotes about knowledge, presumably because...
Read More right-arrow
Dallas Cybersecurity Leaders

There’s No Stress Like CISO Stress. Here’s How Some CISOs Cope.

by Joel York August 28, 2019August 28, 2019 | CISO Perspectives
CISO stress is a special kind of stress. It makes sense when you consider all that’s at stake: company revenue, profits, reputation, and customer loyalty. If a company suffers a...
Read More right-arrow
Frank Gillman, CISO, Lewis Brisbois

Until Hackers Give Up, CISOs Must Always Do This

by Laureen Smith August 21, 2019September 9, 2019 | CISO Perspectives
In the early 2000’s, UPS advertised that they moved “at the speed of business.” The implication was business moves quickly and UPS accommodated businesses by moving quickly too. Logistics experts...
Read More right-arrow

Prevent Compliance Failures With Complete Content Auditability

by Cliff White August 15, 2019February 5, 2020 | Cyber Security
The main goal of your secure content sharing channel is to protect your IP, PII, PHI, and other sensitive information. It is critical that you have complete confidence in this...
Read More right-arrow
Larry Whiteside, Veteran CISO and Cybersecurity Thought Leader

Modern CISO’s Don’t Say This Word Anymore

by Laureen Smith August 14, 2019August 14, 2019 | CISO Perspectives
When it’s your job to limit risk, it’s understandable to be wary of anything new. It’s much easier to stick to the formula because it’s safe and predictable. In a...
Read More right-arrow
Avoid data breaches with a secure inner perimeter around your most valuable digital assets

Avoid Data Breaches With a Secure Inner Perimeter Around Your Digital Assets

by Cliff White August 8, 2019February 5, 2020 | Cyber Security
Your secure content communication channel must control every file saved and retrieved from every enterprise content repository to provide complete protection against a breach. Global data security, governance, and visibility...
Read More right-arrow
Philadelphia cybersecurity leaders

Need Help With Sales? Put Your CISO in Front of Customers

by Joel York August 7, 2019August 12, 2019 | CISO Perspectives
If you buy a pair of shoes online, you assume the company will not only ship the exact model and size you ordered in a timely manner, but also protect...
Read More right-arrow

Posts navigation

Next Page
Previous Page

Search

Browse Posts

  • CISO Perspectives37
  • Cyber Security68
  • Compliance12
  • Secure File Sharing23
  • Financial Services5
  • Government4
  • Healthcare5
  • Customer Stories4
  • Accellion News7

Subscribe

Get email updates with our latest blogs news

Popular Posts

  • Accellion’s New Mobile App Provides Senior Executives Enhanced Productivity and SecurityACCELLION NEWS
  • Achieve GDPR Compliance to Comply With EU’s New Data Privacy LawCOMPLIANCE
  • DLP Integration and its Role in Secure File SharingSECURE FILE SHARING
  • Lost and Stolen Mobile Devices Are Leading Cause of Healthcare Data BreachesCYBER SECURITY
  • NIST 800-171 Compliant File Sharing – What You Need to Know and How Accellion Can HelpCOMPLIANCE
Sign up for the latest blog posts and news

Contact Us

Sales

  • +1-650-687-3130
  • [email protected]

Support

  • +1-888-654-3778
  • [email protected]

Stay Connected

  • LinkedIn
  • Facebook
  • Twitter

Platform

  • Platform Overview
  • Communication Consolidation
  • Unified Visibility
  • Unified Security
  • Unified Compliance

Industry

  • Government
  • Healthcare
  • Financial Services
  • Legal
  • Manufacturing and Engineering
  • Higher Education

Capabilities

  • CISO Dashboard
  • Secure File Sharing
  • Secure Email
  • Secure Mobile
  • Remote Work Security
  • Enterprise App Sharing
  • Secure Web Forms
  • Secure Collaboration
  • Virtual Data Rooms
  • Boardroom Communications
  • Secure Managed File Transfer
  • SFTP Server
  • Secure Content Access
  • Microsoft Office 365 Plugins

Compliance

  • HIPAA
  • GDPR
  • FedRAMP
  • FIPS
  • SOC 2
  • CMMC
  • Data Sovereignty
  • eDiscovery

Resources

  • Resource Center
  • Case Studies
  • Customers
  • eBooks
  • Product Briefs
  • Webinars
  • Whitepapers
  • Developer
  • Blog

Company

  • About Us
  • Contact Us
  • Management Team
  • Investors
  • Partners
  • Press & Media
  • Events
  • Careers
  • Pricing
© 2021

ACCELLION. All rights reserved.

  • Privacy Policy
  • Legal
  • Platform
    • Kiteworks® Content FirewallUnified Security and Compliance for Third Party Communications
    • CISO Dashboard
    • Secure Email
    • Secure File Sharing
    • Secure Mobile Sharing
    • Secure Web Forms
    • Secure Managed File Transfer
    • Secure Office 365 for 3rd Parties
    • Remote Work Security
    • Secure Content Access
    • SFTP Server Governance
    • Virtual Data Rooms
    • FTA UpgradeUpgrade Now for Broader Protection and Control
  • Solutions
    • Industries
      • Government
      • Healthcare
      • Financial Services
      • Legal
      • Manufacturing & Engineering
      • Higher Education
    • Roles
      • CISO
      • Sales
      • Customer Support
      • R&D
      • Corporate Finance
      • Corporate Legal
    • Compliance
      • HIPAA
      • GDPR
      • FedRAMP
      • SOC 2
      • FIPS
      • CMMC
      • Data Sovereignty
      • eDiscovery
  • Resources
    • Resource Center
    • Blog
    • Case Studies
    • Customers
    • Customer Success
    • Developer
    • Events
    • eBooks
    • Infographics
    • Product Briefs
    • Videos
    • Webinars (Upcoming)
    • Webinars (Archived)
    • Whitepapers
  • Partners
    • Reseller Locator
    • Technology Partners
    • Channel Partners
  • Company
    • About Us
    • Contact Us
    • Management
    • Investors
    • Press & News
    • Careers
    • Technical Support
    • Trust Center
Free Trial Get A Demo
  • English
  • +1-650-763-0741
  • Contact Us
  • Pricing
  • Blog
  • Support
  • Reseller Login