💬Chat With Sales
Social Media Giveaways: Racing a Little Faster in the Formula 1® Grand Prix 7
Corporate Communications Manager, Intralinks
POSTED ON October 31, 2013

Esther On November 15 - 17 in Austin, Texas and November 22 - 24 in Sao Paolo, Brazil, when the cars start racing at the Formula 1® Grand Prix, our customer Vodafone McLaren Mercedes will come out ahead in keeping their secure information protected.

To show our support for the last two Formula 1® races of the year, we’re giving away cool racing merchandise from McLaren. For your chance to win a cap, bag or collectible model race car, answer our Formula 1® trivia question on our social media pages on November 4, 2013. It’s easy!

 
READ

How to Safely Extend the Value of SharePoint Outside the Firewall
by Paul Loefstedt
Sales Engineer , Intralinks
POSTED ON October 31, 2013


PaulOne of the more lively discussions coming out of the Gartner Symposium/ ITxpo 2013 was around the future of SharePoint™ on-premise solutions. Gartner analyst Jeffrey Mann offered an opinion that "SharePoint on-premise is slowly on its way out," and elaborated on the woes some long-time SharePoint users continue to experience. Memeburn echoed this view, pointing out SharePoint’s lack of popularity among users and the difficulty upgrading or changing an installation:

  • "[Sharepoint] has become too big, too complex, and too hard to manage and upgrade, especially since in many organizations it’s highly customized. It takes three to five years to develop and test a new version, and then another year or two before most businesses take the plunge and install it. As a result, many people are using versions of SharePoint that are least four years old.”

 
READ

How will Consumers and Providers Protect Private Data from the NSA?
Security Architect, Intralinks
POSTED ON October 30, 2013

Mushegh Hakhinian

The NSA breach reveals that the super adversary the security people hoped would never materialize does exist - the government agent with pretty much unlimited time and resources to store and analyze the majority of Internet traffic.

Does this mean ‘game over’? I have reasons to be optimistic here. Once the initial shock is gone and we read past the headlines, one can see that proven techniques work when used to design systems with highly resourced adversary in mind. This may sound simplistic, but encrypting sensitive content and implementing proper cryptography at the application level are two practical measures that will produce effective protection for private data.

 
READ

Sustained Recovery Underway in the Global M&A Market Sets Strong Start for 2014
Senior Manager of Social Media, Intralinks
POSTED ON October 30, 2013

Meagan ParrishBeing a leading global provider of virtual data rooms for the last 16 years has allowed us to stay on top of the fast-paced M&A industry.

The Intralinks Deal Flow Indicator (DFI), which tracks global sell-side mandates and deals reaching due diligence prior to public announcement, gives us insight into future M&A activity, about six months ahead of deals being announced.

 
READ

6 Steps for Data Breach Recovery and Prevention
Senior Manager of Social Media, Intralinks
POSTED ON October 29, 2013

Meagan ParrishData breaches can occur in a number of ways (such as through hacking, phishing or physical theft) and it’s unsettling to think about what could happen to stolen data if it falls into the wrong hands. What should you do if your business experiences a data breach? What proactive measures should you take to minimize your risk of attack?

You may not know the answers to these questions, but fear not, companies can protect themselves against threats.

Let’s start with question one. If your company experiences a data breach – how should you proceed?

 
READ