Hi [[ session.user.profile.firstName ]]

Intralinks

  • Date
  • Rating
  • Views
  • Information is the New Currency: Maximizing Value Information is the New Currency: Maximizing Value Vanessa Thompson, Research Director, IDC Recorded: Dec 3 2015 48 mins
    The amount of information generated by organizations and individual employees will only continue to grow. A workspace tool can be critical in helping users understand and manage the "right" information at the right time, and can help streamline interactions between different users across business units. But how can organizations, especially with heightened data privacy concerns, determine which collaboration solutions are user-friendly and secure?

    Register today to hear Vanessa Thompson, Research Director for IDC's Enterprise Social Networks and Collaborative Technologies program, talk about how organizations can enable team collaboration:
    •What are the most challenging tasks for users today?
    •How do I measure the business impact of team collaboration solutions?
    •What security requirements should I look for in a solution?
    Plus, all registrants will receive a complimentary copy of the IDC report “Worldwide Team Collaborative Applications Market Shares, 2014: The Year Personal Productivity Becomes Paramount.”
  • Enabling Data Security at the Employee Level Enabling Data Security at the Employee Level Graham Williamson, Director and Senior Analyst, KuppingerCole Recorded: Oct 29 2015 49 mins
    Business professionals are faced with an overwhelming amount of information that needs to be shared, both inside the organization and with external partners. The increasing need to share data efficiently must be balanced against the need to keep that data secure, and adopting the right new technology to meet those needs can be daunting: which solution is right for you?

    Join KuppingerCole Senior Analyst Graham Williamson as he discusses how organizations can create a ‘culture of protection’ by providing employees with user-friendly tools that make it easy to share information securely.

    You’ll hear:
    •What technologies and tools can enable the most granular data protection
    •How ease of use can make security second-nature for employees sharing information
    •Where to start when it comes to determining your organization’s data sharing environment

    Plus, all registrants will receive a complimentary copy of the KuppingerCole Leadership Compass, a multi-dimensional view of the overall leaders in the secure file sharing market.
  • The Top Five Things to Know About File Sharing The Top Five Things to Know About File Sharing Michael Osterman, President, Osterman Research, Inc. Recorded: Sep 24 2015 40 mins
    File sharing is the single most common activity on corporate networks and between companies, and email is still the most-used channel for file sharing. It’s easy, it’s ubiquitous, and it gets the information to its destination with a single click. So what’s the problem with sharing files via email?

    Register today to hear Michael Osterman, President of Osterman Research, and Peter Brown, Director of Product Marketing, Intralinks, review:

    •The drawbacks and costs of relying on email for file sharing
    •The problems organizations face when employees turn to consumer-grade file sharing tools as a solution
    •The steps that organizations should consider for enterprise collaboration

    All registrants will receive a complimentary copy of the Osterman Research report “The Critical Need for Enterprise-Grade File Sync and Share Solutions,” including data from an in-depth survey on file sharing practices.
  • Don’t go rogue: Take control of your file sharing Don’t go rogue: Take control of your file sharing Rajneesh Chopra, VP of Product Management, Netskope and Todd Partridge, Director of Product Marketing, Intralinks Recorded: Aug 25 2015 47 mins
    Be honest: you don’t know how your employees are sharing sensitive information outside the company.

    You’re not alone. Half of respondents to a recent Ponemon Research survey acknowledged they don’t have visibility into how employees are using file sharing applications. Cloud collaboration solutions make your business more productive, but without proper controls they can quickly lead to data loss, security breaches, and regulatory failures.

    Join Intralinks, a leader in secure content collaboration solutions, and Netskope, a pioneer and leader in safe cloud enablement, as they discuss:

    · How to uncover and secure file sharing applications being used in the organization
    · Ways of enforcing regulatory compliance and governance across the enterprise, to ensure that information is always within your control
    · Approaches that will help support pending data privacy legislation
  • Data Security in 2015: Is it getting better? Data Security in 2015: Is it getting better? Graham Cluley Recorded: Jul 29 2015 49 mins
    Join data security expert Graham Cluley as he presents a mid-year review of the information security stories that have made news so far in 2015, and how the predictions he made in our January webinar have fared.

    With over 300,000 new pieces of malware created every day, company data has never been at greater risk. Hear from Graham about the vulnerabilities and risks that remain, and what organizations can do to address them.

    All webinar registrants will receive a copy of Graham’s report “Information Security in 2015: Just how much worse can things get?” on 2015 threats and keeping your data safe.
  • From Chaos to Control: Collaborating Securely in the Cloud From Chaos to Control: Collaborating Securely in the Cloud Garrett Bekker, Senior Security Analyst, 451 Research and Alan Pelz-Sharpe, Research Director, Social Business, 451 Research Recorded: Jun 18 2015 45 mins
    Organizations today are struggling to balance the needs of their employees to share information freely against the increasingly complex demands of security and compliance requirements they must abide by.

    In this point/counterpoint webinar, Alan and Garrett will review and debate the key trends that are playing out in today’s workplace that are driving inevitably to the cloud for enterprise collaboration. But how can a fluffy cloud with no physical borders be truly secure?

    They will explore the answers to key questions:

    • What security options should organizations be considering?
    • Which are the best practices to keep in mind when migrating information and processes to the cloud?
    • When every supplier says their system is secure - who can you believe?
  • 5 Habits of Highly Compliant Marketers: 5 Habits of Highly Compliant Marketers: Thor Johnson, CMO Intralinks and Lisa Cannon, Content Strategist and Writer Recorded: May 28 2015 28 mins
    The need to share content -- securely, collaboratively, immediately -- is critical to your job. You’re working with outside agencies and business partners, sharing documents that contain sensitive data like product designs, ad campaigns and customer data, to name just a few.

    According to research from the Ponemon Institute, more than six out of ten people report having accidentally forwarded files to individuals not authorized to see them. It’s time to create some good habits that will allow you to collaborate with internal and external resources and be 100% compliant with the regulations that govern your industry.

    Please join us for an interactive presentation about how new habits and tools can make it easy for you to be efficient and compliant, without sacrificing speed or creativity.
  • Data Sovereignty and the Cloud Data Sovereignty and the Cloud Holger Mueller, VP & Principal Analyst, Constellation Research and Todd Partridge, Director of Product Marketing, Intralinks Recorded: May 21 2015 48 mins
    Cloud computing has broken down traditional geographic borders, and defining data ‘location’ has become more complex. Global enterprises embracing the cloud must deal with the compliance and risk challenges that arise when information is distributed across multiple physical, logical, and legal locations.

    Join our guest Holger Mueller, Vice President and Principal Analyst, Constellation Research, and Todd Partridge, Product Marketing Director, as they explore the challenges of information governance in the cloud:

    - The critical emerging topic of data sovereignty and jurisdiction
    - How governments are responding in different ways to the questions of data privacy and ownership
    - What organizations must do to address the varying requirements and regulatory environments
  • Content is Still King – How to Choose a Secure Collaboration Castle Content is Still King – How to Choose a Secure Collaboration Castle TJ Keitt, Senior Analyst, Forrester Research and Peter Brown, Director, Product Marketing, Intralinks Recorded: Mar 25 2015 48 mins
    The continued growth of the business networks that employees, partners and customers use to share information is driving the need for collaboration tools that are available beyond firewalls, on any device. With the cloud emerging as the preferred place for these technologies, and a crowded landscape of potential vendors, how can your organization make the right choice?

    Join Forrester Research Analyst TJ Keitt and Product Marketing Director Peter Brown of Intralinks as they review:

    - The emerging types of cloud collaboration technologies and the key considerations to think through
    - The inherent value in having a collaboration platform that connects people to information
    - How to align the organizational need to collaborate while keeping information secure at every touchpoint
  • Data Security in 2014: Will 2015 be even worse? Data Security in 2014: Will 2015 be even worse? Data Security Expert Graham Cluley Recorded: Jan 21 2015 48 mins
    Register today to join independent data security expert Graham Cluley as he reviews the biggest computer security stories of the last 12 months, and hear his predictions of the threats in 2015 that may make headlines.

    With over 300,000 new pieces of malware created every day, your company's data has never been at greater risk.  If it wasn't bad enough staying on top of new zero-day vulnerabilities, targeted attacks, and revelations of state-sponsored espionage, employees are potentially exposing your organization’s information by using consumer-grade cloud services that don’t employ enterprise-level security.

    Hear Graham’s review of 2014, and give his predictions about 2015 and the impact of:

    - The explosive growth of file sync and share providers and tools
    - The increased reliance on cloud storage by the enterprise
    - New technologies that protect information at the document level

    All webinar registrants will receive a copy of Graham’s upcoming report on 2015 threats and keeping your data safe.