x Close

Take a Tour

B2B File Sharing Blog

Secure file sharing software information, file sharing trends and announcements.

Blog Feature

Government Compliance

NIST 800-171 Questionnaire: Are You Complying With These Access Control Factors?

Are you complying with NIST (National Institute of Standards and Technology) SP 800-171? Because there are so many security controls you must have in place, it can be difficult to determine if you are in total compliance.

Read More

Blog Feature

Government Compliance

14 Questions to Answer on Meeting CUI Security Requirements

Are you looking for clarification on the CUI (Controlled Unclassified Information) security measures recommended in National Institute of Standards and Technology Special Publication (NIST SP) 800-171? These government guidelines can often seem complex, and it can be a challenge to determine the extent to which you have aligned with their policies. Parsing through the business requirements and risk assessments associated with appropriate CUI security protections can be a drain on your time and resources.

Read More
Secure File Sharing

Get the answers to your secure file sharing questions!

Are you trying to select a new file sharing solution, but you have a few questions first? Explore these common questions about file sharing solutions and find out their answers.

Blog Feature

Government Compliance

NIST Security Controls Assessment Guide

Does your organization have security controls in place, but you’re unsure if they’re effective or align with NIST (National Institute of Standards and Technology) guidelines? NIST Special Publication 800-53 was created by NIST as a benchmark for successful security control assessments.

Read More

Blog Feature

Government Compliance

How to Comply with NIST 800-171

The National Institute of Standards and Technology (NIST) Special Publication 800-171 provides organizations with guides on how to store, share, and protect controlled unclassified information (CUI). To meet NIST 800-171 requirements, there are four areas where you should focus your efforts – access controls, activity monitoring and management, user behaviors, and data security measures. These are the areas where mistakes could open the door for a data breach.

Read More

Blog Feature

Government Compliance

6 Steps to Implement NIST 800-171 Requirements

Has your company taken steps to be compliant with NIST 800-171 regulations? December 31, 2017 was the deadline for companies to be compliant and implement NIST 800-171 requirements. However, many companies may have missed the deadline or have only met some of the compliance requirements, but not all.

Read More

Blog Feature

Government Compliance

2019 ITAR Compliance Regulations You Need to Know

ITAR, or the International Traffic in Arms Regulations, is a set of regulations drafted to ensure the protection of government defense data, including articles and services on the United States Munitions List (USML) and all related technical data. Only companies that have registered with the Directorate of Defense Trade Controls (DDTC) are permitted to import and export defense data. Each year companies are required to renew their registration with DDTC and recommit to maintaining ITAR compliance.

Read More

Blog Feature

Government Compliance

FedRAMP vs. FISMA: Similarities and Differences

For federal agencies and the contractors they work with, compliance is a daily objective and concern. With so many compliance regulations – especially ones pertaining to data security – it can be a challenge to keep up with every security control that needs to be implemented and updated.

Read More

Blog Feature

Government Compliance

NIST Cybersecurity Framework Explained

Is your organization working to align with NIST (National Institute of Standards and Technology) Cybersecurity Framework? The objective of the NIST Cybersecurity Framework is to identify “a prioritized, flexible, repeatable, performance-based, and cost-effective approach” to keeping data secure. This includes “information security measures and controls that may be voluntarily adopted by owners and operators of critical infrastructure to help them identify, assess, and manage cyber risks.” To put it simply, the NIST framework is a set of guidelines to help you protect sensitive government data.

Read More

Blog Feature

Government Compliance

FISMA Compliance Requirements for File Sharing

In 2002, the United States government took steps to address a relatively new and growing concern – data security in the 21st century. The passage of The E-Government Act (Public Law 107-347) brought security into the internet age, and as a result, FISMA was created. FISMA, or Federal Information Security Management Act, was drafted in 2003 and later updated in 2014 to the Federal Information Security Modernization Act. If you’re subject to FISMA requirements, you may be wondering what steps you should take to comply with these regulations. Continue reading to learn more about FISMA compliance and the actions you can take to align with the standards.

Read More

Blog Feature

Government Compliance

Protecting Controlled Unclassified Information: NIST 800-171

The U.S. government is reliant on contractors and subcontractors for special projects. As such, unclassified defense information, or Controlled Unclassified Information (CUI), is often shared with these partners. Though this information is not classified, it will still be sensitive information that should only be accessed by approved parties. This is where NIST (National Institute of Standards and Technology) 800-171 comes in. These are a set of guidelines for secure handling of CUI, especially as it pertains to where this information is stored. Contractors may not use federal data storage systems, but it’s still essential that the solutions they do use align with NIST standards.

Read More