Data Collaboration - Security & Compliance
Enterprise Data Security and Compliance

Corporations and government agencies rely on Accellion to ensure maximum information security and compliance for enterprise-wide information sharing.

The kiteworks solution ensures the protection of sensitive information and intellectual property while enabling mobile employees to securely create, edit, sync, and share this information with individuals both internal and external to the organization. Accellion is the leading provider of private cloud on-premise or hosted enterprise file sharing and collaboration solutions that deliver the highest levels of data security and protection. With a modular multi-tier architecture, kiteworks provides organizations with a highly scalable and flexible solution.

Private Cloud Deployments
  Private Cloud (On-Premise) Private cloud on-premise deployments provide complete ownership of the encryption keys to ensure full control over the availability, integrity, and confidentiality of content sharing between internal and external users. Accellion, offers an easy to install and manage on-premise solution for VMware and Hyper-V virtualized environments, enabling rapid enterprise-wide private cloud deployment.
  Private Cloud (Hosted) Private cloud hosted deployment provides the flexibility and scalability of a managed service offering while ensuring high levels of security and control. With an Accellion private cloud hosted solution there is no co-mingling of application data, resulting in greatly reduced risk of data exposure and leakage.
  Hybrid Cloud Enterprises with global deployments can seamlessly combine on-premise deployments for major offices with hosted deployments for satellite offices to enable rapid scaling of their own IT infrastructure. Accellion's hybrid cloud solution combines the control of the private cloud with the flexibility of hosted cloud solutions.

  eDiscovery Administrators can comply with legal requests to preserve and collect all relevant files and metadata, and set content retention policies to meet regulatory compliance requirements.
  Data Loss Prevention The kiteworks solution integrates with data leak prevention solutions via the ICAP protocol and supports leading DLP solutions, such as Symantec, WebSense, and RSA. All shared content can be monitored for sensitive content and quarantined or blocked in conformance with content policies in effect.
  User-friendly DRM Files can be protected with additional controls, such as view-only roles, watermarking, and file withdrawal capabilities.

Data Security and Compliance
  • Encryption All files are encrypted at-rest and in-motion with the highest levels of encryption. With kiteworks, organizations retain full ownership of the encryption keys; enterprises can ensure no unauthorized parties have access to their data.
  Modular multi-tiered architecture Highly flexible architecture allows the web application, and storage tiers to be separately deployed in the network for additional layers of protection..
  Data sovereignty Geographic policies can be enforced to restrict user content to storage physically located in specific countries to meet data residency requirements.
  Full Auditing Every user action in the system is logged, and audit reports can be easily created to provide full visibility and demonstration of compliance.
  Secure mobile containerAll mobile content is protected with encryption and controls, such as remote wipe, whitelisting, watermarking, offline PIN as well as an integrated MS Office editor.
  FIPS 140-2 validatedkiteworks has received FIPS 140-2 Level 1 validation.
  Compliance The kiteworks solution enables compliance with industry and government regulations, including SOX, HIPAA (with signed BAA), US-EU Safe Harbor, ITAR, SOC2, and PCI DSS Level 1. ISO27001 and FedRAMP certifications are in progress.
  Accellion is proud to be a part of the Skyhigh Cloud Trust Program. As a Skyhigh Enterprise-Ready cloud services provider, we fully satisfy the most stringent requirements for data protection, identity verification, service security, business practices, and legal protection.