Accellion Status
The company raised $1.4 million of venture funding from undisclosed investors on March 13, 2012. Previously, the company raised $12.15 million of Series 3 venture Funding from Riverwood Capital on January 4, 2012.
Provider of a cloud-based platform intended to offer file sharing and collaboration. The company's platform secure single point of access to content stored in existing enterprise content sources, enabling organizations to securely connect all their content to the people and systems that are part of their critical business processes, regardless of the applications that create that content or where it is stored, while maintaining the controls and visibility needed to demonstrate compliance.
Generating Revenue
Privately Held (backing)
Venture Capital-Backed
"Apps won't work. Appliances may not work. People don't even know all the things they depend on. All of a sudden, the supply chain starts getting disrupted because computers don't work." https://t.co/E5sFN9H3RJ #cybersecurity #cyberattack #databreach #datasecurity #dataprotection
"Analyzed #CTI helps organizations understand the capabilities, opportunities, and intent of adversaries conducting malicious cyber activities." https://t.co/bI7jmxsWcw #cybersecurity #cyberthreatintelligence #informationsharing #bestpractices
Mandiant has shared its full & final report re: Accellion's recent FTA security incident. Read the press release, Mandiant's report, and supplementary materials, all accessible below. https://t.co/ZWmP3z8Boe @FireEye #cybersecurity #cyberattack #supplychainrisk
Learn how Accellion has applied its 3rd party communication compliance expertise to #MFT to save you time and money – and help you pass #compliance audits – with its enterprise content firewall. https://t.co/dWceXV0MlU #managedfiletransfer #dataprotection https://t.co/Yt2k3DbMG7
The company raised $1.4 million of venture funding from undisclosed investors on March 13, 2012. Previously, the company raised $12.15 million of Series 3 venture Funding from Riverwood Capital on January 4, 2012.
"Apps won't work. Appliances may not work. People don't even know all the things they depend on. All of a sudden, the supply chain starts getting disrupted because computers don't work." https://t.co/E5sFN9H3RJ #cybersecurity #cyberattack #databreach #datasecurity #dataprotection
"Analyzed #CTI helps organizations understand the capabilities, opportunities, and intent of adversaries conducting malicious cyber activities." https://t.co/bI7jmxsWcw #cybersecurity #cyberthreatintelligence #informationsharing #bestpractices
Mandiant has shared its full & final report re: Accellion's recent FTA security incident. Read the press release, Mandiant's report, and supplementary materials, all accessible below. https://t.co/ZWmP3z8Boe @FireEye #cybersecurity #cyberattack #supplychainrisk
Learn how Accellion has applied its 3rd party communication compliance expertise to #MFT to save you time and money – and help you pass #compliance audits – with its enterprise content firewall. https://t.co/dWceXV0MlU #managedfiletransfer #dataprotection https://t.co/Yt2k3DbMG7
“If I have to be targeted by an APT then it’s all over. It’s not something that I can defend against.” https://t.co/avSxmxm2jU #cybersecurity #cyberattacks #APT #datasecurity #dataprotection
"In the face of global sanctions to punish it for its nuclear weapons program, North Korea has relied heavily on cybercrime to fill its depleted coffers." How much? Approx $2 billion in 2019. https://t.co/w3obJXacRN #cybersecurity #cybercrime #cyberattacks #datasecurity
Mandiant, a division of @FireEye, has identified UNC2546 as the criminal hacker behind the cyberattacks and data theft involving Accellion’s legacy File Transfer Appliance product. https://t.co/TQbW6XUDvc #cybersecurity #cyberattack #ransomware
Learn how Accellion has applied its 3rd party communication compliance expertise to #MFT to save you time and money – and help you pass #compliance audits – with its enterprise content firewall. Register for our March webinar below. https://t.co/dWceXV0MlU https://t.co/8XLB1fALMv
"While they’re easy for attackers to set up, web shells can be difficult for defenders to detect, since they’re often targeted to specific servers and can hide in the noise of internet traffic." https://t.co/sxhQw2YLRT #cybersecurity #cyberattack #dataprotection #datasecurity
Trust us, we know. It's critical that every organization update to the latest software and operating systems and ensure they have all the proper protections to protect their systems, data, and customers. https://t.co/4fezO84tAv #cybersecurity
Most visits will take between 1.5 and 2 hours. The agenda for a specific visit depends on your group, its interests and objectives as well as on the host company. A visit may include a company or industry specific presentation, a discussion around a specific product or service, partnership opportunities, a demo, a meeting of the premises, etc.
Add a review