Hi [[ session.user.profile.firstName ]]
Sort by:
    • Take Control of Unsecure File Sharing with Workshare Take Control of Unsecure File Sharing with Workshare Dave Ewart, Sr Director of Product Marketing Recorded: Sep 3 2015 3:30 pm UTC 48 mins
    • Traditionally, most organizations have used email for sending files to colleagues or clients. However, as files increase in size and email attachment limits are an issue, employees are forced to either use old-fashioned FTP or circumvent company regulations by turning to insecure consumer-grade applications. 72% of the people we surveyed do! Let us tell you about a better way.

      Join us to learn 4 key best practices:
      1) Don’t mess with what users know – continue to use Microsoft Outlook to drive file transfers (just don’t leave it to Outlook to deliver them)
      2) Don’t leave it to users to decide when something is too big or too sensitive to send by email
      3) Do make the experience better and faster for users (as opposed to more complicated and slower)
      4) Have a policy (and protection) that covers email-based sharing even when mobile

      With Workshare, employees can email links to files, eliminating the need for attachments, while continuing to us the familiar Outlook to do it. Policy-enforcement means companies can secure, track, and expire file access and activity beyond the corporate firewall.

      Workshare also uses its customizable policy engine to ensure that the content that is shared is secured and removed of any sensitive information before it is shared.
      Intelligently scan and secure documents too large or too important to send by email. IT can set policies to determine when a file is too large to send, or critically when to block or clean a file if it contains sensitive hidden data that would expose the company to risk.

      Read more >
    • Peer To Peer Peril: How File Sharing Impacts Security Performance Peer To Peer Peril: How File Sharing Impacts Security Performance Mike Woodward, Program Director of Data Recorded: Jan 14 2016 6:00 pm UTC 39 mins
    • While many businesses these days have policies in place that prohibit employees from peer to peer file sharing in the office, this activity occurs on a significant percentage of company networks. Beyond the dangers of downloading copyrighted material and breaking corporate policies, employees that engage in peer to peer file sharing could be bringing malware onto corporate networks without their knowledge.

      BitSight recently observed the use of the BitTorrent protocol for over 37,000 entities and found that over 40% of torrented applications contain malicious software. Join Mike Woodward, Program Director of Data as he explains:

      - the correlation between BitTorrent activity and botnet infections
      - the percentage of torrented applications that contain malware
      - which industries face the greatest challenges with peer to peer file sharing

      Read more >
    • The Top Five Things to Know About File Sharing The Top Five Things to Know About File Sharing Michael Osterman, President, Osterman Research, Inc. Recorded: Sep 24 2015 3:00 pm UTC 40 mins
    • File sharing is the single most common activity on corporate networks and between companies, and email is still the most-used channel for file sharing. It’s easy, it’s ubiquitous, and it gets the information to its destination with a single click. So what’s the problem with sharing files via email?

      Register today to hear Michael Osterman, President of Osterman Research, and Peter Brown, Director of Product Marketing, Intralinks, review:

      •The drawbacks and costs of relying on email for file sharing
      •The problems organizations face when employees turn to consumer-grade file sharing tools as a solution
      •The steps that organizations should consider for enterprise collaboration

      All registrants will receive a complimentary copy of the Osterman Research report “The Critical Need for Enterprise-Grade File Sync and Share Solutions,” including data from an in-depth survey on file sharing practices.

      Read more >
    • 3 Steps to Secure Content Sharing 3 Steps to Secure Content Sharing Rob Koplowitz (Forrester), Ted Schadler (Forrester), Whitney Bouck (Box) Recorded: Jan 28 2014 4:00 pm UTC 60 mins
    • Consumer sync and share tools help people access and send personal files, but smart IT leaders know that businesses require more than just ease-of-use. Strong security, mobile support, and deployment architecture are just a few of the many important factors to consider when evaluating vendors for a company-wide solution. Where should you start?

      Join guest speakers Rob Koplowitz, VP and Principal Analyst at Forrester Research, Ted Schadler, VP and Principal Analyst at Forrester Research, and Whitney Bouck, SVP & GM of Enterprise at Box, for a complimentary webinar that will help you create a 3-step plan to select the right vendor for your business needs.

      In this webinar, you'll learn:

      -- The current landscape of the content sharing and collaboration market and gain insight into its future
      -- Criteria that Forrester Research uses to evaluate vendors, such as mobile support, security, and deployment architecture
      -- How to identify your unique requirements and create a shortlist of providers to pilot

      Read more >
    • New Trends & Essentials in Online File Sharing Deployment Models New Trends & Essentials in Online File Sharing Deployment Models Terri McClure, ESG Senior Analyst Recorded: May 29 2014 5:00 pm UTC 62 mins
    • Recent research shows that when it comes to Online File Sharing and Collaboration (OFS), a “one size fits all” deployment strategy isn't enough. Join ESG Senior Analyst Terri McClure and Syncplicity as we take a look at the drivers behind corporate OFS adoption, hurdles that need to be overcome, and emerging demand for hybrid solutions.

      In this webinar, Terri McClure will discuss findings from ESG’s latest analysis, Online File Sharing and Collaboration: Deployment Model Trends. She will shed light on issues that motivate many IT departments to implement OFS solutions and identify trends that are pushing vendors to provide more deployment options to customers.

      Jeff Schultz, Head of Marketing at Syncplicity, will discuss the value of Syncplicity StorageVaults, which provides enterprise customers with deployment flexibility, ensures data residency and compliance, and enables secure mobile collaboration across the enterprise.

      As a thank you for registering you’ll receive a free copy of the ESG Research Brief: The Demand for Hybrid Online File Sharing Solutions.

      Read more >
    • New Ponemon Institute Research: The Risk of Unsecure File Sharing New Ponemon Institute Research: The Risk of Unsecure File Sharing Dr. Larry Ponemon, Ph.D., Chairman and Founder, Ponemon Institute Recorded: Oct 23 2014 5:00 pm UTC 39 mins
    • File sharing enables work and is proliferating in the enterprise environment. The unsecure and unsanctioned deployment of file sharing technologies poses significant risk to organizations. Protecting information must be an essential requirement of any sharing solution.

      Extensive new research conducted by Ponemon Institute in North America and Europe reveals that individuals are behaving badly, organizations are addressing the challenges inadequately, and IT professionals feel a loss of control.

      - Half of all respondents lack the confidence to deal with risky file sharing practices
      - 62% of respondents accidentally sent files to unauthorized individuals outside the organization
      - 70% of organizations do not conduct regular audits to determine if file sharing activities are in compliance with regulations

      Learn more. Register now for this informative webinar with Dr. Larry Ponemon in which he will discuss:

      - Extent of the risk associated with unsecure file sharing
      - Individual behaviors driving and organizational responses to information loss
      - Key considerations for securing information in the collaborative enterprise

      And, receive a free copy of the research report from the Ponemon Institute.

      Read more >