<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=1678611822423757&amp;ev=PageView&amp;noscript=1">

Posted on 09.10.20 by Gwen Luscombe

Cyber Security Insurance and Minimizing Risk in the Cloud

There’s a lot of misconceptions around the cloud and liability. Organizations often assume risk is transferred when data moves to a third party.

Posted on 09.09.20 by Greg Mooney

What Is FERPA and What Are the Necessary Security Controls?

The right to privacy for individuals impacts just about every industry, and education is no different.

Posted on 09.03.20 by Andrew Sanders

5 Data Security and Compliance Issues in Higher Education

Cyberattacks versus colleges and universities are undeniably lucrative for attackers. 

Posted on 09.01.20 by Greg Mooney

What Is Non-Repudiation and How Can Managed File Transfer Help?

Talk about an awkward situation—you and a customer collaborate online, sharing a view of a contract and trying to agree on the payment schedule.

Posted on 08.27.20 by Arun Vishwanath

Data Security In The Cloud: Part 2

Vulnerabilities in cloud-sharing services stem from the usage of multiple cloud services because of which users need to keep adapting and adjusting their exceptions.

Posted on 08.25.20 by Greg Mooney

Managed File Transfer As SaaS Vs. On-Prem

Keeping files and data secure when more users are working remotely is, of course, a concern. That's why a SaaS managed file transfer solution is critical.

Posted on 08.24.20 by Jeff Edwards

Why IT Automation is the Backbone of Every DevOps Transformation

DevOps! Over the past half-decade, the illustrious marriage between Development and Operations has simultaneously become the biggest buzzword in tech since ~The Cloud~, and a critical piece of software engineering and delivery methodology. But to many, the DevOps...

Posted on 08.20.20 by Arun Vishwanath

Data Security in the Cloud: Part 1

The adoption of public cloud computing makes user data less secure. And it's not for the reasons most in IT realize.

Posted on 08.12.20 by Michael O'Dwyer

Ensuring Secure File Transfers from Mobile Devices

Like it or not, today’s world is a connected one, and data is shared at an alarming rate between mobile device users, company networks, and cloud services (including social networks).

Posted on 08.10.20 by Karen Coleman

Using Hybrid IT to Transform How You Operate

Manufacturers are under increased pressure to reinvent themselves digitally.

Free Trials

Getting started has never been easier. Download a trial today.

Download Free Trials

Contact Us

Let us know how we can help you. Focus on what matters.

Send Us a Note

Subscribe to our Blog

Let’s stay in touch! Register to receive our blog updates.