On November 12th, Accellion announced a significant upgrade to its Mobile File Sharing platform that solves many of the major issues surrounding BYOD and ad-hoc file sharing platforms such as Dropbox and Skydrive.  

Accellion launched the first products in its class to bring together enterprise content silos to make it much easier to find and use content spread across multiple systems.

The new product also delivers secure mobile file sharing and collaboration that takes advantage of enterprise systems such as Microsoft SharePoint, Windows File Servers and NFS without the need for separate VPN’s.

In addition, the new product allows organisations to collaborate with individuals outside the firewall while retaining security, audit and control.

Accellion would like to brief press on the new products and the wider mobile collaboration space. Accellion will provide both technical and market information on how the new Accellion platform delivers real benefits to organisations struggling with the growth of mobile IT and the inherent security concerns that accompany the BYOD revolution.

Understand how AI can transform business security strategies with our insights and analysis on AI in security.

In case you missed it

What are emerging applications for physical security in transportation?
What are emerging applications for physical security in transportation?

Transportation systems need robust physical security to protect human life, to ensure economic stability, and to maintain national security. Because transportation involves moving...

Gallagher & Fortified enhance perimeter security solutions
Gallagher & Fortified enhance perimeter security solutions

Global security manufacturer - Gallagher Security is proud to announce a strategic partnership with Fortified Security, a pioneering perimeter systems integrator with over 30 years...

Genetec: Data sovereignty in physical security
Genetec: Data sovereignty in physical security

Genetec Inc., the global pioneer in enterprise physical security software, highlights why data sovereignty has become a central concern for physical security leaders as more survei...