Providing organizations with a mobile content management solution (MCM) in mobilizing their workforce, AvePoint launched the AvePoint Perimeter Service Pack (SP) 2, enabling secure access to content from any device, without sacrificing security.
“The workplace and work hours have been expanded through the use of mobile devices and free third-party file sharing services for business purpose. Although beneficial to increase speed of business needs, organizations are now facing security headaches for compliance and IT teams alike,” said Dux Raymond Sy, Global Vice President of Customer Strategy & Solutions, AvePoint. “With the new launch, organizations can now give users the freedom to choose how and with whom they want to collaborate – from external users to devices and locations – all while keeping sensitive digital assets secure.”
New features include:
Secure File Sharing: Eliminate the need for free file sharing services that put organization’s digital assets at risk by giving end users, partners, and external parties an intuitive app, to access digital content—protect digital assets and mitigate risks by utilizing Perimeter’s secure container for external parties to view shared content.
Virtual Views: Extend personalized views of SharePoint content to external parties, granting end users the freedom to choose what information they want to share and with whom—this ensures alignment with organizational security and compliance policies by automatically generating virtual views based on predefined metadata classification.
The solution also offers IT administrators control over mobile access of SharePoint content, including:
Mobile Content Management (MCM): With multi-channel content delivery, robust content access controls, and location-based content delivery, the solution helps deliver business-critical content to the mobile workforce.
Remote Access: Empower mobile workforces with remote access to content repositories on personal devices—anywhere, anytime. Protect sensitive digital assets with multi-factor authentication, ensuring access by trusted users, in trusted locations, on trusted devices.
Centralized Access Control: By combining traditional 2-Factor Authentication (2FA), existing device authentication security systems, and location-based controls, Perimeter ensures that business-critical SharePoint assets are accessed by trusted users, on trusted devices, and within trusted locations.