x Close

Take a Tour

Secure File Sharing Blog

B2B File Sharing Blog

Secure file sharing software information, file sharing trends and announcements.

Blog Feature

Government Compliance

Protecting Controlled Unclassified Information: NIST 800-171

The U.S. government is reliant on contractors and subcontractors for special projects. As such, unclassified defense information, or Controlled Unclassified Information (CUI), is often shared with these partners. Though this information is not classified, it will still be sensitive information that should only be accessed by approved parties. This is where NIST (National Institute of Standards and Technology) 800-171 comes in. These are a set of guidelines for secure handling of CUI, especially as it pertains to where this information is stored. Contractors may not use federal data storage systems, but it’s still essential that the solutions they do use align with NIST standards.

Read More

Blog Feature

Government Compliance

DFARS Compliance: Steps to Consider for FTP Hosting Services

Does your organization need to comply with DFARS (Defense Federal Acquisition Regulation Supplement) regulations? The objective of DFARS is to prevent the United States military from being too dependent on raw materials from foreign countries. And complying with these regulations can seem like a major burden, especially when you’re trying to select contractors and subcontractors.

Read More
Secure File Sharing

Get the answers to your secure file sharing questions!

Are you trying to select a new file sharing solution, but you have a few questions first? Explore these common questions about file sharing solutions and find out their answers.

Blog Feature

Government Compliance

How Cloud-Based File Sharing Fits in the CJIS Compliant Security Policy

Maintaining CJIS (Criminal Justice Information Services) compliance might seem like a heavy burden for some law enforcement organizations. But with the right tools in place – like  cloud-based file sharing – you can turn your attention from compliance back to your job.

Read More

Blog Feature

Government Compliance

What Is CJIS Compliance?

Criminal Justice Information Services (CJIS) protects private or sensitive information gathered by local, state, and federal law enforcement agencies. This could include fingerprints, criminal background information, copies of private documents, or anything else that could be classified as sensitive.

Read More

Blog Feature

Government Compliance

ITAR Requirements for Your Employees: Who's at Risk?

ITAR (International Traffic in Arms Regulations) compliance isn’t just an initiative that’s only a concern for those at the top. Every employee plays a role in protecting your data. And, it’s imperative that you know which employees are approved to handle ITAR-related materials. To ensure you’re meeting ITAR requirements for your employees, learn more about how ITAR applies to the people in your company.

Read More

Blog Feature

Government Compliance

What Are ITAR Certification Requirements?

Many people in your industry or others impacted by ITAR (International Traffic in Arms Regulations) are probably asking themselves, “Do we really need to be ITAR compliant?” or “Do we need ITAR certification?” Explore this article on how to be ITAR compliant and what ITAR certification means for your company.

Read More