Blog

  • HR Document Security: How to Secure Personnel Files
    01 Nov 2015 Colin Graf

    HR Document Security: How to Secure Personnel Files

    HR Directors are under enough pressure to help ensure that employees are happy and productive. The last thing they need to worry about is secure access to employee files. Here’s how this aspect of their job can be made a whole lot easier. Cloud Document Management Cloud document management software is the first step for […]

    Read Post
  • ApplicationXtender 8.0, Technically Speaking
    14 Oct 2015 Colin Graf

    ApplicationXtender 8.0, Technically Speaking

    Guest Blog: Bill Bastian – Manager, Technical Services ApplicationXtender (AX) 8.0 is now available. This is the upgrade we’ve all been waiting for, especially myself. AX 8.0 offers a sleek new interface, some sweet new features and better performance. This is an evolutionary leap forward that positions the platform for rapid adoption into mainstream processing […]

    Read Post
  • German Adventures
    08 Oct 2015 Colin Graf

    German Adventures

    Guest Blog: Mario Duckett The EMC Enterprise Content Division (ECD) DACH office in Munich, Germany, recently hosted their EMC Partner Day / Tech Refresh event. MetaSource was invited to participate in this year’s conference. This is part of MetaSource’s continued efforts to expand sales of ApplicationXtender outside of the North American market where we currently […]

    Read Post
  • How to Ensure Secure Document Submission Beyond SFTP
    01 Oct 2015 Colin Graf

    How to Ensure Secure Document Submission Beyond SFTP

    Whether you need to share a contract or application to a partner, upload mortgage documents to your quality control compliance advisor or send any other confidential information electronically, SFTP is not enough to guarantee secure access. Below are the limitations and how to overcome them. Limitations of SFTP Whoever has the SFTP address, login and […]

    Read Post
  • Security Breaches, Data Leaks and Cyber Attacks… Oh, My!
    27 Aug 2015 Colin Graf

    Security Breaches, Data Leaks and Cyber Attacks… Oh, My!

    It seems every time we turn on the news or turn our heads we hear about a security breach, or as Ashley Madison calls it “cyber terrorism.” As any business attempts to grow in today’s technology-driven world, one of the top issues that any CEO or business manager must control and continue to proactively address […]

    Read Post