<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=1678611822423757&amp;ev=PageView&amp;noscript=1">

Posted on 09.24.20 by Mark Towler

Introducing the MOVEit Customer Validation Program

Make your voice heard and influence the future of MOVEit with our CVP program! Read on for the full details about this program and information on how can get involved.

Posted on 09.22.20 by Adam Bertram

What is an AD FS Server?

Setting up an AD FS server can be difficult, as there are many options and configurations that you need to be aware of.

Posted on 09.18.20 by Kelly Fitzgerald

Podcast: Managing a Corporate Merger and Acquisition (M&A)

In the podcast show Defrag This, host Greg Mooney interviews Chris Hickman on how IT should approach mergers and acquisitions (M&As).

Posted on 09.15.20 by Michael O'Dwyer

4 Ways IT Can Prepare for Employees Returning to the Office

As some companies are considering reopening, the traditional office setup is required again as employees cease working from home. How will IT handle it? What will the office look like post-COVID?

Posted on 09.14.20 by Kelly Fitzgerald

Podcast: Cybersecurity in the Automotive Industry

It is no secret that with rising digitalization, the risks of hacking, spying, and stealing data online went up—a focus point of the development of cybersecurity in the automotive industry.

Posted on 09.10.20 by Gwen Luscombe

Cyber Security Insurance and Minimizing Risk in the Cloud

There’s a lot of misconceptions around the cloud and liability. Organizations often assume risk is transferred when data moves to a third party.

Posted on 09.09.20 by Greg Mooney

What Is FERPA and What Are the Necessary Security Controls?

The right to privacy for individuals impacts just about every industry, and education is no different.

Posted on 09.03.20 by Andrew Sanders

5 Data Security and Compliance Issues in Higher Education

Cyberattacks versus colleges and universities are undeniably lucrative for attackers. 

Posted on 09.01.20 by Greg Mooney

What Is Non-Repudiation and How Can Managed File Transfer Help?

Talk about an awkward situation—you and a customer collaborate online, sharing a view of a contract and trying to agree on the payment schedule.

Posted on 08.27.20 by Arun Vishwanath

Data Security In The Cloud: Part 2

Vulnerabilities in cloud-sharing services stem from the usage of multiple cloud services because of which users need to keep adapting and adjusting their exceptions.

Free Trials

Getting started has never been easier. Download a trial today.

Download Free Trials

Contact Us

Let us know how we can help you. Focus on what matters.

Send Us a Note

Subscribe to our Blog

Let’s stay in touch! Register to receive our blog updates.