April 20, 2018

Dell Technologies World.  We’ll Be There, Will You?

Join us at Dell Technologies World in Las Vegas to discuss how to modernize your IT infrastructure with our secure content collaboration platform.

As a Dell partner, we are looking forward to participating in the upcoming Dell Technologies World in Las Vegas - a conference where IT professionals & business decisions makers can see, touch and discover products and solutions to enable digital transformation from the edge to the core to the cloud.

During the event, we will be discussing following topics:

·         How to mobilize Dell EMC storage with Axway Syncplicity
·         How to replace file shares to modernize infrastructure and reduce costs
·         How to gain anytime, anywhere access to all of your data from any device

To schedule your meeting with Axway click here

Our customers benefit from the significant ROI that a modern content collaboration platform brings to their organizations by increasing efficiency and agility -- work anytime and anywhere – while reducing costs.

Because Syncplicity does not restrict where data is stored, Dell storage customers can keep their data on-premises, in the cloud, or hybrid.  With Syncplicity  IT regains control and security over corporate data while providing employees with full and seamless access to information from anywhere, any times, and from any device.

Watch this video and find out why users love and IT trusts Syncplicity!

Make sure you visit Axway, booth #1650 to learn how we can help you modernize and mobilize your workplace with Syncplicity.  Schedule a meeting today or stop by our booth and get one of our statement t-shirts! 

To learn more about Syncplicity capabilities read: To compose your digital workplace, go modern.

April 18, 2018   |   by Kristie Conner

Spring Release 2018: What’s New

What’s new with Syncplicity? 

The Syncplicity product and engineering team has been busy building new enterprise features.  We continue to innovate across four pillars that drive value for our customers:

  • Innovative User Experience, the user
  • IT Modernization, IT
  • Advanced Data Protection & Security, Security + Governance
  • Ecosystem Collaboration, Developers

You'll see that the Spring Release brings some very exciting features that empower the entire Syncplicity ecosystem from administrators to users, but this release has a strong emphasis Innovative User Experiences (user) and Ecosystem Collaboration (developers).

Watch the webinar “Spring Release: What’s New with Syncplicity”.

Innovative User Experiences

Power + Usability

This spring, we released an improved desktop experience, one that is both innovative and powerful.  We have combined the strength of multi-folder sync (the ability to sync any folder on your desktop to the cloud) with the power to seamlessly stream files from the cloud to the desktop. 

With this release, you have the benefits of multi-folder sync like real-time backup, recovery from Ransomware combined with streaming files from the cloud without using storage – accessing millions of files without consuming storage.

Available on Syncplicity Windows App 5.4.0, not currently available on Mac. 

Folder Insights + Notifications 

With our new notifications users have more visibility into their folders and files than ever before.  With notifications and digest, that users can set for daily, weekly, monthly – users receive an update that summarizes activity.  At a glance – users can see what content has been shared, re-shared, changed and deleted.

Removing the guesswork.  These types of features help users in subtle yet, powerful ways from understanding personal collaboration activity to knowing who is responsive, to being alerted to changes in a file so that you can keep abreast of new content.

External Sharing
As we continue to evolve our sharing models, to address our customers’ need to provide users with secure sharing, external sharing is a top priority. We address three levels of sharing – Internal, Affiliate and External.  Now, users can easily view from Syncplicity online if their folder is being shared with an external partner, internal or if the folder has been shared by an external partner. This helps users manage external collaboration and sharing – helping avoid data leakage while giving IT more granularity over external sharing.

This features requires activation, please contact your Syncplicity Customer Success Manager.

Advanced Data Protection

Improved Security for Regulated Industries
For security conscious industries, we now offer client certificate based authentication for Syncplicity Windows App and the Syncplicity web client. This additional level of security supports using client certificates allowing mutual TLS/SSL authentication against Syncplicity storage. Only users with the correct certificate installed will be able to access corporate data.

This new feature ensures only trusted devices can access company data, providing heightened security. 

Customer owned encryption keys is also available in a controlled release for customers and prospects, giving you, the customer, ultimate control over your encryption keys, ensuring no unauthorized 3rd party can access your company files.

Application Whitelisting – Control Access to Syncplicity API
Prevent unauthorized applications from accessing data from Syncplicity.  Administrators have the ability to enable and disable application whitelisting and specify application keys to whitelist. Giving companies the control over what applications connect to Syncplicity and the ones to be blocked.I

Define specific capabilities for applications accessing Syncplicity.

Application Scopes
With this features customers can limit what API calls are made to the Syncplicity API. Applications Scopes provide control over Syncplicity’s APIs that an application can call, providing Enterprises complete security and control based on their security policies for external applications on each of the APIs.

Ecosystem Collaboration 

We are excited to announce our Developer Portal and our new Content API giving customers the power to create and innovate by building custom applications that solve your unique use cases.

  • Full exposure of Syncplicity API in Developer Portal
  • Addition of the Content APIs
  • Sample code
  • Interactive documentation

To read the blog, click here.

In addition, to the new Developer Portal we’ve released five new applications that customers can download from the AMPLIFY MARKETPLACE, click here.

  • Adobe Sign
  • Confluence
  • JIRA
  • Microsoft OneNote
  • Chrome Extensions

Thank you for your continued support.  To learn more please visit our support site for release notes.

The Product Solution, Management and Engineering Team at Axway Syncplicity  

April 18, 2018

Announcing the addition of Content APIs on Syncplicity Developer Portal

We are excited to introduce the Syncplicity Developer Portal!  The new portal includes an interactive console with everything you need to help facilitate and speed custom application development. From exploring the latest document for Syncplicity’s application programming interfaces (APIs) which include content capabilities and user provisioning to accessing sample code in Java, C#. With Syncplicity APIs, developers can make their applications content aware by accessing files for upload, download, create shared links. APIs allow both developers, technology partners and customers to easily create end-user applications or administrative applications connecting to customers’ Syncplicity accounts.

As a developer, the portal will provide complete access to everything you need to get started, upon creation of a developer account, you will instantly get access to interactive documentation, code samples, knowledgebase articles and a Syncplicity sandbox environment to test your application or just your API calls.  The site provides an easy to follow reference guide and prerequisites to help you get started.  One of benefits is instant help from a community of other developers and our team here at Syncplicity, including Product Management.

Build Custom Applications to Meet Your Business Needs

They Syncplicity APIs can help you address a wide-range of unique use cases based on your business requirements.  

As a Syncplicity platform user or an application developer, you can enable development of your content aware applications by using Syncplicity API set – building applications for end-users that streamline interactions with content and improve collaboration.  Giving business users new innovative ways to collaborate with internal and external teams.

  • Build an integration between Syncplicity and your application
  • Automate routine processes with Syncplicity
  • Customize Syncplicity for your organization

An example: Build an administrative tool to simplify user provisioning or an application to automate group and policy configuration

Our API platform takes care of the heavy lifting so you can focus on your business needs. Further, you can publish your new application on the AMPLIFY MARKETPLACE.  The AMPLIFY MARKETPLACE includes applications provided by Axway, the Syncplicity team, our customers and partners. Additionally, you can also find reference applications/connectors you can use.

Take a look at our new applications / integrations, to download click here.

  • Syncplicity for OneNote
  • Syncplicity Extension for Chrome
  • Adobe Sign connector
  • Syncplicity for Jira
  • Syncplicity for Confluence

Join our webinar, Spring Release 2018 to learn more about the Developer Portal, Content API and our new applications. Register to attend live or watch on-demand at a later date.

Enjoy!

Product Management

April 11, 2018   |   by Kristie Conner

The changing face of Enterprise File Sync and Share

The content collaboration platform (CCP) market, formerly enterprise file sync and share, is going through a period of rapid transformation. CCP is a key building block for digital transformation as enterprises look to modernize their infrastructure to power a modern, digital workplace. Some, CCP solutions are providing enterprises with a path to modernize their infrastructure and realize the productivity benefits of a secure mobile, digital workforce while ensuring data is stored securely and in line with changing data protection regulations.  True digital transformation requires unlocking unstructured data from within legacy infrastructure – home directories, group shares and making it easily accessible to enterprise users from any device, anywhere while offering security and a feature rich CCP solution.

For CCP solutions to truly enable digital transformation – businesses need to understand their infrastructure and security requirements and then map to the right CCP solution. Whether from an application or infrastructure perspective, CCP solutions will need to adapt to ensure their place as strategic and competitive tool for today’s businesses.  

The Digital Workplace
As businesses look to capitalise on the productivity benefits of modern technologies a key trend has been mobility and BYOD. CCP vendors continues to prioritise the “anytime anywhere” working model, enabling the digital workplace while giving senior-level executives peace of mind around security and governance. CCP providers that specialise in hybrid options allow businesses to easily align their data storage with their business needs – whether on premises, in the cloud, a private cloud or a combination of the three.

The digital worker requires seamless access to content “anytime anywhere” on any device regardless of where it resides in the enterprise, but they also require integration with popular user productivity tools like Microsoft Office 365.  Modern EFSS providers are not only providing the infrastructure for secure mobile access, but collaboration functionality that improves productivity.

Additionally, as cloud solutions play an increasingly large role, a progressive CCP solution will need to ensure that enterprises maintain flexibility, something that can be achieved through hybrid cloud solutions. Not all data is created equal and large, global corporations need the flexibility that comes with a hybrid cloud offering, allowing them to customize their environment, combining public or private cloud and on premise, without sacrificing usability.

An Infrastructure for Tomorrow – Security, Compliance and Data Protection

With uncertainty still surrounding data protection and compliance enterprises are operating in an increasingly complex environment. One such example is Privacy Shield that was recently approved to replace Safe Harbour. The one certainty is that businesses operating within Europe need to have a fine-grained understanding of what data they are collecting and the geographical regulations that apply to that data. To achieve this -- business are changing the way they evaluate new technology such as cloud, and how which their data is accessed and shared.

CCP can provide an answer. By providing a consolidated modern storage platform, CCP addresses the issues of distributed, costly and insecure legacy storage solutions, delivering a secure and compliant way to manage and store data. CCP solutions which enable infrastructure modernisation will also support enterprises in meeting the most stringent security, governance and IT administration requirements and avoiding costly fines for non-compliance.

And it’s not just being compliant that companies need to worry about. As more global enterprises become victims to ransomware attacks and business leaders become increasingly nervous, EFSS providers can support organisations with real-time backup, multi-folder sync features, retention policies and recovery plans.

What Next?
The CCP market is evolving to address an increasing number of business requirements to improve collaboration across the digital ecosystem and infrastructure modernization, while ensuring data is secure. Organizations are looking for vendors who integrate with office productivity solutions, like Microsoft Office 365 and connect to back-end content repositories to provide access to content that was previously not available unless you were behind the fire wall. Though integration, whether with applications or infrastructure, CCP can support the modernization of the workplace as a critical component to digital transformation in the modern business. 

To learn more read: Gartner Magic Quadrant for Content Collaboration Platforms.

April 8, 2018

How to Reduce the Impact of Ransomware & Shadow IT

With a growing tally of high-profile incidents, multiple warnings from European and US agencies on increased cyber-threats, and employees tempted to use collaborative tools to share information, causing Shadow IT, leaders across industries are under pressure to reduce risk from data attacks and prevent data leakage.

Register for the Axway Syncplicity webinar and learn how to reduce damages due to ransomware attack and gain control of Shadow IT using a secure content collaboration platform.

Let's Face It -- There is No Solution that Prevents Ransomware Attacks 
Some surveys unveil ransomware losses for businesses can average $2,500 for each incident, with businesses willing to shell out upwards of $50,000 to decrypt their data.

Ransomware appears between 6 key cyber threats most dangerous for organizations this year. Last year, was a plague of ransomware attacks, with targets including Britain’s National Health Service, San Francisco’s light-rail network, and big companies such as FedEx. Ransomware is a relatively simple form of malware that breaches defenses and locks down computer files using strong encryption. Hackers then request money in exchange for digital keys to unlock the data.  Usually, victims have no choice and often pay, especially if the material encrypted hasn’t been backed up.

Read 8 Tips for How to Prevent & Recover from Ransomware

Shadow IT is a real problem for IT Teams
The growth of cloud-based software, along with the continued outsourcing of enterprise data services, has led to an explosion of shadow IT problems for large enterprise. Now while Shadow IT sounds very malicious, it usually is innocently deployed. Most of the time, it is born within an organization simply because employees are trying to be productive. Hosting and moving files using an open consumer file sharing platform, for example, can lead to serious security risks. When employees and departments start ‘piece-milling’ enterprise software solutions together that are not approved by IT, sensitive client and internal data can be made susceptible to breach.

Learn more about why shadow IT is a problem

A Secure Content Collaboration and File Sharing Solution Can Help 

Axway Syncplicity is an innovative and robust cloud-based solution built on a hyrid-cloud archieecture that provides seamless and automatic access to files,shared folders with strong security features that make IT very happy.

Register for our webinar and learn all about Ransomware & Shadow IT prevention.

November 20, 2017

Time to bridge MFT and Content Collaboration Platform

BY SCOTT LEWIS, SENIOR DIRECTOR, PRODUCT & SOLUTION MARKETING, AXWAY

Gartner has stated in its recent Magic Quadrant for Content Collaboration Platforms (read the full report here) that 80% of large and midsize organizations in mature regions will have deployed one or more content collaboration platform (CCP) products.  Gartner defines CCP as a range of content-centric platforms enabling secure file productivity and content collaboration for individuals and teams as well as supporting the creation of a modern digital workplace. It is the evolution of the EFSS (Enterprise File Sharing and Synchronization) products.

Now this is not meant to be lesson on CCP and MFT but let’s step back and look at both and why there is a value in bridging the two.

CCP solutions address the use cases of people sharing and collaborating very well with other people be it within an organization and with customers, partners and suppliers.

The focused is placed on ease of use and universal access from any device, anytime, anywhere to optimize collaboration with other individuals.

On the other hand, with Managed File Transfer (MFT) solutions the use cases are driven by business processes typically between systems of record which are event and scheduled driven. Premiums are places on automation, monitoring and security. Think “locked down back office processes”. 

There is definitely a “better together” scenario if we can bridge MFT with CCP we could open up many new use cases that we have not been able to support before.

Been there, done that but failed
In particular, MFT vendors tried to include file sharing and human based file transfer use cases into their offer. They delivered Frankenstein like products that end users basically refused to use as they were not finding the simplicity they desired. Also, patterns and use cases are so different that it was also creating performance issues on the MFT side. But the intention is still valid, to achieve maximum efficiency and to address hybrid patterns within the organization, IT need to deliver MFT and CCP and expose them as consumer like services to end-users.

Solution is not replacing one with the other
Whatever solution that tried to replace other - MFT by EFSS or EFSS by MFT was just doomed to fail. Both serve a vital purpose and bridging the two properly opens the door to many new possibilities. This is the approach we have taken here at Axway. We have created a bridge between our leading Axway Syncplicity CCP solution and our leading Axway SecureTransport MFT Gateway solution. The two solutions are governed solutions and managed and controlled by IT. Doing so permits new use cases such as an application delivering files to a person or a team, and a person or team sending a file to an application. All while providing the familiar user interface the end users are already using with the benefits of secure anytime, anywhere, any device access.

Take advantage of bridging CCP and MFT 

Axway SecureTransport and Syncplicity customers can download the Syncplicity Connector for SecureTransport for free from the Axway AMPLIFY marketplace and start transforming the way their organization collaborates and innovates.

November 16, 2017

Content Collaboration Platforms: Friend or foe in protecting your content?

Syncplicity is an important ally for enterprises determined to protect their content. It can be highly sensitive content like PII – personally identifiable information. Or perhaps something less sensitive, such as public data on a website. Either way, if there’s a breach, it’s not good.

If you want your business to remain viable and competitive, security matters. But to maintain a high level of content security, experience matters. That’s where Syncplicity comes in. As a company with experience managing millions of files for our customers using our content collaboration platform, we take data protection very seriously. It’s probably why we’ve become such a valued ally to so many.

Fact is, Axway Syncplicity recently received one of the highest scores for security capability in Gartner’s Critical Capabilities Research for Content Collaboration Platforms – especially in use cases involving Centralized Content Protection. And this comes just as regulatory compliance is heating up. With Europe’s General Data Protection Regulation (GDPR) taking effect in May 2018, and directives such as PrivacyShield in the U.S., data security and content protection are top of mind for enterprises around the globe. And they’re looking to the cloud for answers.

Securing sensitive content

Keeping sensitive content secure is a big part of a company’s overall data protection strategy. With Syncplicity’s DLP integration capability, organizations are moving sensitive and confidential content to the cloud to enforce security policies. And they’re doing it by leveraging their existing DLP solution. Syncplicity integrates with top DLP solution providers, including leaders in the 2017 Gartner Magic Quadrant for Enterprise Data Loss Prevention (DLP), to give customers a seamless, reliable way to manage sensitive content – including files stored in Syncplicity. Symantec Data Loss Prevention, Digital Guardian and McAfee DLP Prevent, are some of the trusted brands Syncplicity integrates with.

How does this work? Well, organizations can now leverage their existing DLP infrastructure to detect when sensitive content is added to Syncplicity. Access to files and sharing is restricted based on DLP classification. Classification is done in the DLP engine, which identifies what is considered sensitive whether it’s personally identifiable data (PII), health records, intellectual property, or customer or partner information.

Through this integration, companies can enforce file and folder sharing restrictions based on corporate policies, allowing them to adhere to strict security and compliance regulations and requirements. For example, Sara in HR can see PII of employees in, say, the U.S., but other U.S. employees can’t. At the same time, Sara is unable to view PII associated with employees in Europe. Companies can customize policies based on region, employee type and department. And these policies are easily adjusted by approved teams using an administrative console.

Insider threats and cyber crimes

Regulatory compliance is a key reason for DLP solutions and strategies, but there are other business drivers. Insider threats and cyber crimes such as those involving ransomware jeopardize business operations and may put your organization out of compliance with regional or industry regulations. Exposure to ransomware is particularly costly because it not only affects business operations, but will also carry a stiff, 4 percent fine for breaking GDPR mandates starting in May 2018.

Syncplicity lets you track user behavior and recover files. Combine this with your existing DLP capability, and you’ll have a much more comprehensive solution – one that secures sensitive data, applies policies to that data, tracks user behavior (digital footprint) and lets you recover from internal or external content breaches.

Learn more about how we can help you protect your sensitive content with advanced data protection solutions that combine your existing DLP capabilities with Syncplicity.

To learn more about DLP, click here and to learn more about how Syncplicity provides customers with Advanced Data Protection, click here.

October 26, 2017

What’s missing from those “Millennials Are Killing dot dot dot” lists? Home Directories.

Written by Frank Murphy, Director of Strategic Sales Engineering, Syncplicity
LinkedIn Profile

A trend in popular culture today that you may have missed is to catalog the growing list of industries, services, and other business-as-usual practices that are being disrupted or even killed off at the hands of Millennials. Everything from family restaurants, doorbells to napkins are being looked at differently by an entire generation who is unafraid to challenge accepted practices. Although the targets of the disruption vary -- the common factor driving the disruption is the need for convenience, avoiding friction, and living life on the go. What happens when that same approach finds its way into your corporate file storage environment? You guessed it, even more disruption. 

As out-dated as the door bell: The Home Directory
Just as the doorbell has been a business-as-usual standard fixture on any flat, apartment or house, it's been standard practice for corporate users for decades to be provisioned a small repository of space. This space is typically carved out on a file server somewhere, that is their ‘home’. This directory comes with a logical organizing structure. Just like the buttons assigned to each occupant of an apartment building and when people arrive -- they push the buzzer.As an end user you have data you need to store, but you don’t need to share it with anyone else you put that in your home directory. That is, it’s specific function – the home of your files. It’s what you do. And you automatically get connected to that home directory through some mapping function when you first login. And just like the doorbell, you get one assigned to you whether you actually use it or not.

That's what happened to me when I first showed up as a new hire at EMC 17 years ago. Access to that home directory assumes that I was tethered to the network and able to reach it over network-based storage protocols. In 2001, it was unthinkable to get access to data remotely - "remote access" meant hopping in your car and driving to the office to get to your files.

A new normal: always-on connectedness
Fast forward to today, and it’s a different world. Remote access means I have to always connect to VPN to get map a drive letter.  Who needs that? A mobile tablet or phone or similar device doesn't know what a mapped drive leter is. Syncplicity users have access to all their files all the time. In my case, that access is spread out across five or six different devices. My data is tethered to me, not me tethered to the network to get to my data.

Disrupting the home directory: not just for Millenneals
Although the gray hair in my current badge photo disqualifies me as a millenneal, the same benefit of convenience and reduction of friction is where Syncplicity excels. Plus, not being able to connect to the network, or to any wifi signal brings on feelings of anxiety and FOMO (fear of missing out). In my case the fear isn't missing out on someone's Instagram post or Snap Chat -- it’s the fear of missing a customer request, a sales order or anything else I collaborate on throughout the day. The millennial thinking is: why surprise your host with a loud and disturbing buzzing sound when you can send them a text before you arrive? Avoids the hassle. That hassle avoidance motivation also drives users to keep their data as close as the phone in their pocket. That drive for convenience drives users to take matters into their own hands, or their own pockets, and causes a major challenge for data security and governance through Shadow IT Syncplicity can help avoid that friction and hassle of being tethered to the network when we live in a fundamentally untethered and wireless world. For those rare moments you find yourself off-line, you're still not completely disconnected with the ability your favorite files on your mobile device, or use favoriting on SyncDrive if your users only have a laptop and still need a mapped drive letter experience.

Ding Dong: Distupt or be distupted
Migrating legacy home directories into Syncplicity using DataHub, decomissioning or repurposing that NAS capacity while also replacing the home directory with SyncDrive, is the best of both worlds. It It marries the convenience of.... of access anywhere, with the ability to store data in the Syncplicity Cloud, in the cloud of your choice like AWS or Azure, and/or in an on premises StorageVault.

Learn more about SyncDrive and DataHub here.

September 28, 2017

GDPR overexposes shadow IT

By Jean-Claude Bellando

Cloud computing paves the way for shadow IT
Shadow IT is described as IT solutions used within a company without organizational approval. It’s the IT activity that takes place in the shadows without the usual security and control requirements on data placed under the responsibility of the company.

Shadow IT predates the cloud when many employees downloaded and installed their own software to achieve tasks. Since cloud solutions come with an easy-to-consume (starting with freemium account) and easy-to-use paradigm, the potential lack of control is astounding. Symantec states that "organizations use 20 times more cloud apps than they think."1 Corporate IT security professionals estimate they have 30 to 40 apps in the cloud, when the reality is a staggering 928 apps.

Shadow IT does not meet security requirements
The main reason shadow IT emerged was usability and price. Security is still not considered by end users and is often seen as a constraint. As a consequence, "only 8.1% of cloud services meet enterprise security and compliance requirements,"2 states a recent Skyhigh networks report.

Shadow IT: the digital workplace and CCPs
In addition to a focus on the digital workplace, shadow IT also relies on Content Collaboration Platforms (CCP) as defined by Gartner in a recent Magic Quadrant report. “Of the 1,427 cloud services used by the average company, 342 are related to collaboration, file sharing, content sharing”2 (Skyhigh networks report). In addition, “25% of all files shared in the cloud are broadly shared” 1 (Symantec). According to Symantec, this shared data contains personal data for “3% of those shared files contains current compliance related data (PCI, PII, PHI)”1.

The digital workplace in a GDPR perspective
The European Union’s new GDPR (General Data Protection Regulation) is a game-changing regulation that will bring a new focus to shadow IT for any company doing business in Europe. When the rules take effect in May 2018, the GDPR will require:

  • A focus on shared data, not only broadly shared data
  • A focus on all personal data (anything that identifies someone), not just PCI, PII, or PHI
  • Reports of personal data leaks within 72 hours
  • A stronger assessment and monitoring of the conditions of data transfer between entities and across boundaries
  • More rigorous sanctions that can impact a company’s reputation and bottom-line:
    • A GDPR violation can generate a penalty up to 4% of the global revenue of the companies involved in the data processing
    • This is on top of any damages done to individuals
    • A company’s image or brand can be severely damaged

What to do now?
No one can stop the move to GDPR. It’s time to standardize existing EFSS solutions into one that:

  • Offers GDPR-aware features (privacy by design)
  • Provides the company DPO (Data Protection Officer) with the necessary control of all data, including location of data
  • Provides the user’s expected features and usability, securely, protecting them and their organization
  • Delivers expected IT security features, like granular-group based policies, remove wipe and others that protect the user, while also giving the freedom they require to do their jobs

Besides GDPR compliance, there are other immediate rewards to standardizing on an industry leading, secure solution such as reduced costs and easier collaboration for all employees. GDPR is coming, and it’s coming fast. If your organization is guilty of a lot of shadow IT, take the time to get your IT business in order. Your company’s image, revenue, and data will thank you.

To learn more about Axway Syncplicity and how we help you compose a secure digital workplace:  Modernize Your IT Infrastructure or Innovative User Experiences.

[1] Symantec: 2H 2016 Shadow Data Report
[2] Skyhigh networks report: Cloud adoption risk report Q4 2016 

June 30, 2017   |   by Kristie Conner

Play ball with Syncplicity by Axway and win

Did you know Major League Baseball (MLB) uses Syncplicity by Axway to power their digital transformation? It’s a great story about how MLB is driving engagement, making it easier for users including baseball scouts to access and share data, securely. So we asked Dan Gainey of MLB to tell us all about it in a webinar to be held July 19. You should be there.

If you’ve never heard Dan speak – or even if you have – you’re in for a treat. Just ask anyone who attended IMAGINE SUMMIT 2017 in Atlanta, or who packed the house at Gartner IT Expo last year. The webinar happens soon after the MLB All-Star Game, so Dan will surely have stories to share about how Syncplicity by Axway helped the league streamline internal collaboration across one of their major events.

Dan Gainey weaves in key themes of digital transformation that impact the digital workplace.  If you’re in IT, or manage collaboration, mobility or security, this webinar will provide you with vital insight providing a 360-degree view of what digital transformation looks like across critical groups and the business impact.

To register click here.

Learn how Axway Syncplicity can help you Modernize Your IT Infrastructure or create Innovative User Experiences.

< Older

DemoSee How it Works

Call Sales1-888-908-4276
or We'll Call You

Live Chat

Thank you.
Our team will contact you soon!