Product: ShareFile

  1. What’s safe to put in the cloud?

    Photo_SafetoPutinCloudBlog

    Data protection is a key concern for organizations seeking to leverage the cloud—and rightly so. It’s no small matter to send sensitive business data like customer information, financial records, legal documents or intellectual property outside your on-premise infrastructure. But security concerns don’t have to pose a barrier to the benefits of the cloud. “With the right measures and best practices,” Stan Black, Citrix Chief Security ...

    Read More

  2. Health IT: Quietly advancing medicine and the U.S. care delivery system – Part 2

    NHIT image

    Putting information at a clinician’s fingertips to accelerate life-altering decisions – and reduce provider inefficiencies Johnny Brister of Franciscan Missionaries of Our Lady Health System (FMOLHS) in Baton Rouge, LA, always seems surprised by how much I love their story. In his Southern drawl, he once said to me something like, “I suppose that when you’re too close to the action, you often don’t have enough ...

    Read More

  3. Health IT: Quietly advancing medicine and the U.S. care delivery system – Part 1

    NHIT

    National Health IT week kicks off on September 15th. The goal of the week is to recognize how health IT is advancing medicine and to promote “One Voice. One Vision.” for our industry. With a chance to acknowledge a market that profoundly impacts each of us personally, I recalled a recent experience. This encounter reminded me that the industry is moving towards a shared vision, ...

    Read More

  4. XenMobile and iOS 8

    ios8

    Apple recently announced that their newest devices (iPhone 6 and 6+) will be available for purchase from Sep 19, 2014 and their newest operating system, iOS 8 will be generally available on existing, supported iOS devices, starting Sep 17, 2014.  iOS 8 builds upon and extends a number of great enterprise-centric features delivered with iOS 7 last year.  One example is Touch ID, which can now be incorporated into ...

    Read More

  5. Start-ups: innovative Unternehmen – auch im Hinblick auf den Einsatz intelligenter Technologien

    Viele Start-ups sind trotz innovativer Ideen und einem ausgeklügelten Business-Plan von Anfang an mit vielen Herausforderungen konfrontiert. Das Startkapital will klug investiert sein und ein häufig sehr schlank aufgestelltes Team muss alles geben, um schnellstmöglich profitabel zu arbeiten. Neben der Kundenakquise für ihr Produkt sind Start-ups kontinuierlich auf der Suche nach neuen Investoren, um die nächste Finanzierungsrunde zu sichern und schwarze Zahlen zu schreiben. Ein ...

    Read More

  6. Citrix zapewnia pełną mobilność

    Jak podaje firma analityczna Gartner do 2017 roku, 25 procent firm będzie korzystało z własnych witryn z aplikacjami (inaczej nazywanych sklepami z aplikacjami). Z kolei 43 procent decydentów, odpowiedzialnych za oprogramowanie zakupiło lub opracowało od 1 do 5 aplikacji mobilnych dla swoich pracowników w ciągu ostatniego roku (źródło: Forrester 2013).   Korzyści wynikające ze zwiększenia mobilności przedsiębiorstwa mogą być ogromne, a zaspokojenie rosnącego zapotrzebowania na dostęp do szerokiej ...

    Read More

  7. Demystifying the ShareFile user provisioning process through XenMobile App Controller

    User Provisioning Process

    ShareFile and XenMobile are undoubtedly the industry leaders in the EMM and the EFSS space and together they enable any enterprise to truly mobilize their workforce. At Citrix, we are working hard not only to make these products great individually, but also to ensure integrations that make these products a natural fit for each other and seamlessly harness each other capabilities. Read the blog here to ...

    Read More

  8. Quad-Bypass: The Enterprise Mobility Worst-Case Security Scenario [VIDEO]

    Quadbypass_photo

    At Citrix, our definition of a quadruple bypass is a BYOD user on a consumer-grade device using sensitive enterprise data and going directly to the cloud. It truly represents the worst-case scenario for securing enterprise mobility. This approach completely bypasses the control and visibility of IT—and it’s alarmingly common in today’s organizations. There are good reasons for this, of course. Consumer devices are popular and ...

    Read More

  9. Mobility Master Class: Securing Data for EMM with XenMobile and ShareFile

    XenMobileShareFileMasterClass

    To successfully implement a secure enterprise mobility solution it is crucial to allow users to access, sync and securely share files from any device, both inside and outside the organization yet give IT full control of that data on any device whether it is online or offline. Most EMM solutions are not designed to address the requirements for the business, users and IT. Before you select ...

    Read More

  10. What Business Leaders and IT Managers Need to Know about Enterprise File Sync and Sharing

    EFSS_ShareFile

    Two key market trends are driving the adoption of enterprise file sync and sharing solutions. First is enterprise mobility. As of 2013, 61 percent of information workers work outside of the office, and the number of telecommuters will increase by nearly two-thirds over the next five years. Second is the proliferation of personal devices and/or BYOD programs in the enterprise. These two trends have driven ...

    Read More