Box Notes application employs all the same security layers that have made Box the go-to cloud-based sharing service among enterprises.
Sharing files and collaborating in the cloud are old news. DropBox, SkyDrive, Google Docs and many more cloud-based service providers have made it possible to store files, sync them, and make them accessible to others.
But one company is thinking outside the box (pun intended) and going beyond simple file sharing and collaboration. Box is making its first foray into the applications space with Box Notes, a tool that lets users capture and share ideas securely from anywhere in real-time.
And "securely" is the key word here. Box has distinguished itself from the rest of the file-sharing pack by offering very high security levels for its services. With 256-bit AES encryption, intrusion detection systems, redundant backups, uninterruptible power and more, Box has become the go-to cloud-based sharing service among enterprises. It boasts 180,000 corporate customers, including most of the Fortune 500.
Box Notes takes advantage of all those security layers. One feature that's sure to make a lot of IT admins happy is compliance with HIPAA and other regulatory standards. This means users can work on documents using Box Notes and not have to worry about privacy and other measures because they are all covered. This will be a huge feature for those in healthcare, finance and other markets that need to tread carefully when documents leave their secured, firewalled environment.
This strong security and compliance with regulations has taken over the spotlight on Box. This is interesting but not surprising, given the news about the National Security Agency's Prism program. Companies such as Microsoft, Google, Yahoo, and Facebook allegedly received millions of dollars in reimbursement for participating in the Prism surveillance program. The money allegedly went toward meeting new certification demands for surveillance operations and covering the costs of compliance with the Foreign Intelligence Surveillance Act (FISA) court.
How Enterprises Are Attacking the IT Security EnterpriseTo learn more about what organizations are doing to tackle attacks and threats we surveyed a group of 300 IT and infosec professionals to find out what their biggest IT security challenges are and what they're doing to defend against today's threats. Download the report to see what they're saying.
Digital Transformation Myths & TruthsTransformation is on every IT organization's to-do list, but effectively transforming IT means a major shift in technology as well as business models and culture. In this IT Trend Report, we examine some of the misconceptions of digital transformation and look at steps you can take to succeed technically and culturally.