AvePoint Perimeter Promotes Trust

— August 14, 2013

AvePoint has launched a new mobility solution to help organizations keep up with the demands of business by allowing for secure mobile and remote access to Microsoft SharePoint deployments Currently in preview, AvePoint Perimeter ensures business critical Microsoft SharePoint assets are accessed by trusted users, within trusted locations, on trusted devices.

The solution combines traditional 2-Factor Authentication (2FA), the organization’s existing device authentication security systems, and location-based controls to enable secure, remote access to SharePoint content from every endpoint.

Organizations can decide which employees should have mobile or remote access to SharePoint content. These trusted users are then granted secure content access from their registered mobile device. AvePoint Perimeter also allows for “short-term access”, which can be given to trusted users without the need for Federation, Active Directory (AD), or SharePoint accounts.

With location-based controls, organizations can also ensure documents are only accessed from known or trusted locations, using Location Services built into today’s mobile devices as well as most modern browsers (Microsoft Internet Explorer, Google Chrome, Mozilla Firefox).

In addition, verify trusted mobile devices by providing 2-Factor Authentication using either a QR code or an access code, in conjunction with existing authentication and authorization systems.

POST A COMMENT

comments powered by Disqus

RATE THIS CONTENT (5 Being the Best)

12345
Current rating: 5 (2 ratings)

MOST READ STORIES

topics

Must See


FEATURED REPORT

IoT 2020: How Inter-Connected Devices Will Impact the Enterprise

In realizing the vision of the IoT, we are in uncharted territory. It's happening so fast in so many separate pieces that managing and leveraging has escaped a majority of enterprises. This report provides a snapshot of the evolution of the IoT and examines what's to come to help you prepare for the impact—from the onslaught of technology and its unprecedented risk, to attaining the extraordinary value of innovative information.