Page 2 of 6

Microsoft Office 365 Integration for Effective Online Collaboration

Maytech, a global leader in secure file sharing for businesses since 2006, proudly announces integration with Microsoft Office 365, thus extending the Quatrix® product offer into the new area of Enterprise Online Collaboration. Adding Microsoft Office 365 integration, a feature high in… Continue Reading →

SSO / ADFS Integrations for Better Security and Corporate Data Protection

Maytech, a global leader in secure file sharing for businesses since 2006, is happy to announce a new feature in our ever-growing list of available enterprise capabilities: Single Sign On (SSO) Login and ADFS integrations. The new integrations enable our… Continue Reading →

Automate Your Team’s Audit Trail

Today, Maytech introduce Quatrix’s automated activity report feature, which provides a comprehensive dashboard of critical information on what is happening with your team’s files inside and outside your organisation. As a Quatrix®  admin, it’s important that you have a clear, reliable understanding… Continue Reading →

Quatrix Express – a Desktop Application for Convenient and Secure File Transfer

Fast information exchange and stringent security measures don’t usually go hand in hand. But while companies implement strict security policies due to complicated compliance requirements, regular users are prone to overlook security measures and go ahead with insecure, but convenient… Continue Reading →

Growing Companies Equals Growing Data Risks

“Growth demands a temporary surrender of security.” Gail Sheehy, New York Times Bestselling Author  Despite talking about the stages people pass through in life in her best-selling book Passages, Gail Sheehy’s quote could not be apter in describing the battle… Continue Reading →

Taking Security Seriously

Imagine one day leaving for work and, as you close the front door behind you, discovering that someone has graffitied in red spray paint all over the face of your home – door, windows, paintwork, roof, the lot. You’d be… Continue Reading →

5 PCI Compliance Myths

If your business takes credit cards, it’s vital that it’s compliant with the Payment Card Industry Data Security Standard (PCI DSS), which is designed to protect and secure stored, processed and transmitted Primary Account Numbers (PANS) and credit card holder… Continue Reading →

Our Data Travels Quicker Than…

There’s a saying about time that it is an equal opportunity employer. Everybody gets 24 hours/1,440 minutes/86,400 seconds a day no matter who you are, where you’re from or how much wealth you have. Some just do things quicker than… Continue Reading →

Introducing Quatrix

At Maytech we never stop innovating, so it’s with great pleasure we’re announcing the latest evolution of our growing product range: Quatrix®. Quatix is for organisations that crave a no-nonsense data-transfer service which is fast and secure, because it marries these… Continue Reading →

Your Data, Your File Sharing Vendor, Your Responsibility

It’s no coincidence that the first point of call for any parents in the market for a babysitter is family. Outside of the cheap labour costs, family also represents people they know and trust. When it comes to business file… Continue Reading →

How Data Transfer is Taking On Global Warming

It is well documented that the Arctic polar ice caps are melting. What is not well documented is its advantages and the role secure and reliant data transfer plays in exploiting them. Luckily the ice in the North Pole is… Continue Reading →

eBay Hacking And The Tightrope Walker’s Dilemma

“If you had a friend who was a tightrope walker and he tripped and fell on the sidewalk, that would be completely unacceptable.” – Mitch Hedberg Two months ago, eBay got hacked. Two weeks ago, eBay – the owners of… Continue Reading →

5 Biotech Startups Using Big Data To Shake up Big Pharma

Big data is dividing the world into two distinct categories: the big data haves and have-nots. Nowhere is this more evident than in the healthcare and pharmaceutical industries that traditionally are not associated with innovation and change. But whilst many… Continue Reading →

What is IL3 Accreditation and Why Are We Getting It?

Never one to rest on our laurels when it comes to secure data transfer, we are currently undertaking the IL3 security accreditation for our ICT system. This accreditation requires enhanced security to protect sensitive information and is a common requirement… Continue Reading →

Chinese Government Reveals Microsoft Patents

When Microsoft completed its acquisition of the Nokia Devices and Services business in April of this year neither party was legally allowed to discuss details about the deal in public leaving experts and commentators to speculate about how things would… Continue Reading →

« Older posts Newer posts »