You are here

Share
Posted by Accellion Team
How many of us now check email at breakfast or after dinner or while waiting for our lunch sandwich to arrive? Don't worry it's normal in fact it's becoming the new norm. The adoption of mobile devices in the workplace is transforming the way people work as they become untethered from...
Posted by Hormazd Romer
Enterprises have invested heavily in SharePoint and intranets, but in too many organizations these services are not ready to support mobile users. As a result, mobile workers are falling back on email for sharing and transferring files. That’s one of the revelations found in a recent survey...
Posted by Hormazd Romer
How many mobile apps are installed on BYOD devices? The answer varies from employee to employee, but broadly speaking, the answer seems to be, “lots.” IBM company Fiberlink recently surveyed mobile workers and tallied the mobiles apps installed on their devices. As reported on Dark...
Posted by Accellion Team
Electronic data is growing at a furious rate and has quickly become unmanageable for many. Unfortunately, the data isn’t going anywhere anytime soon. The 2014 IDG Enterprise Big Data study found that the amount of data being managed per organization will increase by an average of 76% in the...
Posted by Hormazd Romer
A new Accenture study of 1,500 IT leaders finds enterprises are committed to mobile strategies, but less than half have achieved break-even ROI and many are struggling to achieve their mobile-computing goals. According to the study, enterprises recognize the strategic importance of mobile computing...
Posted by Hormazd Romer
Global IT leaders are increasingly concerned about where and how their data is stored, and the cloud services they’re implementing, according to a new survey from NTT Communications . This so-called ‘Snowden Effect’ has started to shift perceptions of IT professionals around the...
Posted by Hormazd Romer
A new study by the Ponemon Institute, The Insider Threat of Bring Your Own Cloud (BYOC) , analyzes the risks of enterprise employees using cloud services without the permission or oversight of the IT department—a practice that the study’s author calls “Bring Your Own Cloud (BYOC...
Posted by Yorgen Edholm
Are consumer solutions revolutionizing the way that enterprise software is created? Quentin Hardy of The New York Times says yes , and points to the increasingly short time period between product updates on newer solutions like Workday, as compared to product updates from traditional enterprise...
Posted by Accellion Team
A new report from SkyHigh Networks – a company that tracks the use of cloud services for corporate customers – found that cloud services are growing exponentially within enterprises. The findings in the report were based on traffic generated in the cloud by more than 8.3 million users...
Posted by Accellion Team
Are consumers better off putting everything in the cloud? A recent article in the Wall Street Journal asked that question and presented answers by two industry pundits: Frank Gillett of Forrester Research and Triona Guidry of Guidry Consulting, Inc. Before considering their answers, it’s...
Posted by Accellion Team
According to Good Technology’s “Q1 2014 Good Mobility Index Report” , more companies than ever are taking steps to mitigate security risks by leveraging secure mobile apps. The report found that secure enterprise app activations among its customer base grew 57 percent from Q4 2013...
Posted by Accellion Team
I have yet to see a CTO job description that highlights gymnastics as a pre-requisite. Yet, much of the role’s strategic planning and day-to-day operations are an ongoing balancing act. CTOs need to meet users’ 24x7 mobile computing needs, giving them everything needed to be successful...
Posted by Accellion Team
SharePoint is in use in 78% of the Fortune 500, and competitors Documentum and OpenText boast their own impressive adoption rates. These enterprise content management (ECM) platforms not only provide secure on-premises storage for files and business data but also document collaboration...
Posted by Accellion Team
Both Box and Dropbox began as consumer services for file sync and sharing, and are now focused on moving into the business of selling their services to enterprise organizations. With their nearly identical names, it is not surprising that many customers confuse the two companies. To clear up that...
Posted by Accellion Team
One of the biggest complaints we hear around digital rights management (DRM) is how complex it makes even the most basic of actions. While its intentions are pure – securing confidential data – it’s often considered too unwieldy to use in day-to-day activities. Enterprise...
Posted by Hormazd Romer
Security questions stemming from Edward Snowden’s NSA revelations are continuing to concern IT leaders, who are now looking at just how much control they have over data housed in public cloud solutions. This is causing them to look more seriously at private cloud solutions for mobile file...
Posted by Caitlin Ridge
When traveling for work – whether to a sales meeting two hours away or a product development meeting across the country – your employees aren’t just thinking about work, they are actually being productive. At least that’s what every organization hopes is happening. A survey...
Posted by Accellion Team
When enterprises go mobile, email usage increases. That’s just one finding in a new survey by Solar Winds about email usage and management in mid-size and large enterprises in the U.S. and Canada. Mobile workers are not just accessing more of their email remotely (though they’re doing...
Posted by Accellion Team
Considering the risks that BYOD mobile activity can pose to enterprises, CIOs have a right to be dismayed by two recent surveys showing just how little some employees care about protecting data on mobile devices. A recent survey by Centrify found that: 43% have accessed sensitive corporate data on...
Posted by Accellion Team
New data breaches make headlines every week, and most IT departments are concerned, if not outright alarmed, about the security risks of BYOD. They cite data loss, illicit data access, and malware as top security concerns for their network and mobile users. So how are enterprises doing when it...

Pages