Onboarding: How to Capture Your ROI After the Deployment

by: John Applegate So you’ve done sufficient due diligence during the software acquisition to have confidence that the solution will meet your technical requirements and the solution has been deployed.  Now what?  Job #1 is to focus on meeting business objectives.  Here are three motivating factors that should drive your focus. Focus on Business Objectives [...]

By | November 14th, 2013|

BYOD Is Not Going Away—in fact, it’s going to explode.

Bring Your Own Device (BYOD) is basically an official, unofficial or unwanted policy of employees bringing their own mobile devices to work to use for work purposes. They use their devices to access confidential company applications, data and files. BYOD exposes companies to significant risk. But it also offers companies significant opportunities. As far as [...]

By | October 17th, 2013|

Taming TCO in the financial services industry

File transfer is more than a given at the average financial institution. The Financial Services Industry (FSI) thrives on information and devours it. In one day you might send and receive files in and out of the office, down the street and across the globe, and back and forth with agents, clients, brokers and more. [...]

By | October 10th, 2013|

Online security in the financial services sector is a risky business

Imagine hundreds of billions of dollars vanishing right before your eyes. Well that’s exactly what happened yesterday when someone caused the stock market to temporarily crash by hacking into AP’s Twitter feed and tweeting about a White House bombing that never happened. Unfortunately, hacking, intrusions, phishing and Internet fraud are just some of the malicious [...]

By | September 26th, 2013|

Protecting financial services industry data—from the inside

It’s often said that we are our own worst enemies. According to a Ponemon Institute report, employee or contractor negligence is the root cause of almost half of all data breaches. This is important to note in the financial services and insurancesector—where data breaches can be downright catastrophic. According to the report, the majority of [...]

By | September 12th, 2013|

How did you learn to swim?

Hopefully you had a swim coach rather than a quick shove into the deep end of the pool. Just like learning how to swim, bridging the gap between what employees know about data security and what they do about it during the course of a normal day requires guidance. That guidance must be interesting and [...]

By | August 22nd, 2013|

5 Major Risks of Operating with a Legacy IT Infrastructure

Many companies run a mix of point solutions acquired on a piecemeal basis for EDI, B2B integration and file transfer. These applications are expensive and complex to manage and lack advanced capabilities such as visibility enabled by integration with enterprise applications. Other risks and downsides of running legacy B2B and file transfer solutions:  A lack [...]

By | August 15th, 2013|

How File Transfer Solutions are Like a Car

In a way, finding the perfect file transfer solution is like finding the perfect car. Like a Lamborghini, some technology is just way out of your budget. Like a Hyundai, some solutions (like email, Dropbox and FTP) seem amazing because they’re super inexpensive. Then there is the reliable BMW, that’s safe, intelligent and full of [...]

By | July 25th, 2013|

Email and Data Security — Not a match made in heaven

Alas, some things just aren’t meant to be—Ashton and Demi, Michael Bolton and long hair, dogs and cats, email and sensitive corporate information. Yet most people today use email to send anything without even thinking about data security. The problem is that even though email seems way more advanced than licking a stamp and dropping [...]

By | June 20th, 2013|