Box and Microsoft

Leveling up productivity with Box and Microsoft 365

With the increasing need to support hybrid work across distributed teams, enterprises need to have connected, integrated solutions that help them get work done from anywhere, on any device, across all their apps. That’s why Box integrates with over 1,500…

Hybrid
Box: At the Forefront of Hybrid Work

2020 was a year for the history books, and in 2021 and beyond, things are still ever-changing. Throughout this unprecedented time, helping our Boxers stay safe, engaged, AND productive has been a top priority for us. Let me walk you through how we are…

How to upload documents
How to upload documents

One of the benefits of operating in today’s workplace is that you no longer need to rely on hard copies of documents. Not so long ago, if a document, such as a contract, required review and a signature, you'd need to send a physical version of it to the…

How to transfer or send large files
How to transfer or send large files

Not long ago, if you were working on a project with someone, the only way to share a file with them was to send a physical copy. Co-authors would print out drafts on paper and send them to collaborators via couriers or the postal service. Editing teams…

How to send a video through email
How to send a video through email

Content is king, and the king of content is video. Your company may make videos to win over new customers, train new employees, or introduce new product lines. When you're working on your latest video, you may need to share it with your collaborators or…

How much cloud storage do I need?
How much cloud storage do I need?

From documents and videos, to spreadsheets and presentations, content runs every business. And if you’re like many companies, you have the flash drives, backup hard drives, and local servers to prove it. While physical storage options have their benefits…

What is file-sharing software, and how does it work?
What is file-sharing software and how does it work?

When you need feedback on a piece of content, how do you share it? In the far distant past, you might have printed out your document and walked it across the office. In the case of videos and images, you had to provide physical tapes or copies to your…

Meet Ravi Malik
Meet Ravi Malick, Box's Chief Information Officer

This summer, Ravi Malick joined Box as our new Chief Information Officer. Since then, Ravi has hit the ground running, leading the company’s global information technology strategy, compliance practices and customer advocacy. We met with Ravi to get to…

How does data mining affect privacy?
How does data mining affect privacy?

You're casually browsing an online retailer one day, looking for new office furniture. The next thing you know, ads for that brand — showing the exact pieces you were looking at — start appearing on other websites you visit. A coincidence? Not quite.

What is data protection?
What is data protection?

Think of all the confidential and personal information your company works with in a day, a week, or a month. Now, think of what would happen if that content got lost, erased, or stolen. You’d be left scrambling for protection.

Box Blog Image
U.S. General Services Administration selects Box for Secure, Seamless E-Signatures

We're excited to announce that the U.S. General Services Administration (GSA) has selected Box Sign technology for its native e-signature capability through Systems Engineering Solutions Corporation (SES), a leading IT consulting services firm in…

Box Sign
E-signatures unleashed: Box Sign now available worldwide

We’re excited to share that we have completed the global rollout of Box Sign — building on the initial release of Box Sign to U.S. and Canadian customers in October. As of today, all Box Business and Enterprise customers worldwide have access to…

What are Trojan viruses?
What are Trojan viruses?

Trojan viruses are a formidable threat to businesses and individuals. They're subtle, often go undetected, and can lead to a range of adverse effects from malware. They can grant access to sensitive data and credentials or be used to conduct special…