Skip to Main Content

SHAREPOINT PRODUCTIVITY & SHAREPOINT MOBILITY WITH AVEPOINT PERIMETER

AVEPOINT PERIMETER: ON POINT. ON-PREM. OUT OF THE BOX.

With the proliferation of mobile devices and emergence of free file sharing services, information workers expect and demand fast, responsive services. If enterprise software limitations restrict productivity, end users will circumvent the policies set by their organization in order to get their job done.

AvePoint Perimeter extends the collaboration power of on-premises SharePoint beyond the walls of your organization, increasing user productivity by allowing them to work with anyone from a single content repository. Best of all, you maintain security over the content with robust administrator options.

VIEW OUR PRODUCT BROCHURE

VIEW OUR TECHNICAL OVERVIEW

VIEW OUR SCREENSHOT TOUR

Mobile Editing

User or Group Based External Sharing Control

The central administrator portal includes top-navigation to a comprehensive dashboard and tools for management, reporting, and configuration. The portal also features an alert center and activity feed.

The graphical dashboard displays farm health, including access logs of sessions, locations, and device types.

The management menu allows administrators to control content access polices across sites, users, and locations, as well as manage and enroll devices.

Administrators can control access policies by SharePoint site.

The ‘secure share’ features are embedded directly into the end user’s SharePoint ribbon to easily and manage shared content with external stakeholders.

End users can now share content securely and directly from SharePoint. With this menu, users can specify recipient, permission level, whether or not to share updates, and share expiration dates.

Selecting 'Edit in Browser Only' gives sharing recipients the ability to open and edit the shared document or folder contents within Office Web Apps. He or she cannot download a local copy of the file.

End users who have shared documents or folders can view or the sharing information later to review or revoke access if necessary.

Once an end user has shared documents externally, SharePoint will populate a library of his or her shared files for easy reference and management.

Recipients of secure shares can access their received files in the Perimeter secure portal.

Secure Share recipients can view or edit shared documents, download local copies, and upload new conent based on permission levels.

Secure Share recipients of documents or folders can also upload content into the SharePoint library with the correct permission levels.

The secure document viewer allows end users to securely share read-only content without losing control of the files. The secure document viewer prevents saving, editing, or further sharing.

Administrators can create virtual views, consolidated views of specified SharePoint content in a secured container, for external users from the manage menu.

The virtual views function uses metadata tags to display only administrator specified SharePoint content. Administrators can configure metadata rules from the administrator portal.

From the manage menu, administrators can configure site access policies at the site level, specifying requirements for authentication and devices.

Administrators can configure device group permissions for each site.

Administrators can define content access policies by geopolitical region or radial distance from a specified point.

Administrators can enroll devices one at the time or in bulk. Permissions for enrolled devices can be managed individually.

From the reporting menu, administrators can view and export logs of all content access events, including time, location and activity.

Adminsitrators can audit and generate reports on user activity such as access, authentication, and policy violations.

The Burglar Alarm feature allows Administrators to configure alerts for suspicious user behaviors.

Alerts for Burglar Alarm generate emails to the administrator and also appear in the administrator Perimeter Portal.

Activity recorded by the Perimeter Burglar Alarm can be viewed or exported as a report.

Daily Audit Tracking allows administrators to generate behavior reports by specific users or user groups.

Daily Audit Tracking reports are configurable by user groups, date, and time.

Virtual Views display only specified content to external users. Configurable content access policies include download and editing permissions.

Multi-factor remote access authentication requires end users to scan a QR code or generate an access password from their pre-registered devices.

The AvePoint Perimeter mobile app for iOS connects users to their SharePoint content based on specified access policies.

The AvePoint Perimeter iOS App supports end users with a range of settings, email logs, and a tutorial.

AvePoint Perimeter mobile app is supported for Android.

AvePoint Perimeter mobile app is supported for Windows Phone.

WATCH WHAT AVEPOINT PERIMETER CAN DO FOR YOU

Learn how AvePoint Perimeter transforms your on-premises SharePoint into the single point of access for all of your organization’s content – eliminating the need for multiple, disparate sharing systems.

View Our Featured Video

REGISTER FOR OUR EXCLUSIVE DEMO VIDEO

TOP USE CASES FOR AVEPOINT PERIMETER

Mobile Access Controls

SHAREPOINT FILE SYNC & SHARE

Extend the capabilities of native SharePoint on-premises functionality by enabling sharing directly from SharePoint to external users with granular control over users and content.

Combining a secure container and the familiar interface of Office Web Apps, external users can edit and sync changes back to your environment, without ever having to download and re-upload content.

REGISTER FOR OUR DEMO VIDEOVIEW OUR USE CASE PDF
Secure Remote Access

SHAREPOINT PRODUCTIVITY

Give end users the power to collaborate and increase productivity without slowing down to use multiple sharing platforms.

With a single click in the SharePoint ribbon, information workers can share content from your approved-for-sharing libraries without ever having to leave SharePoint.

VIEW OUR SCREENSHOT TOUR

The central administrator portal includes top-navigation to a comprehensive dashboard and tools for management, reporting, and configuration. The portal also features an alert center and activity feed.

The graphical dashboard displays farm health, including access logs of sessions, locations, and device types.

The management menu allows administrators to control content access polices across sites, users, and locations, as well as manage and enroll devices.

Administrators can control access policies by SharePoint site.

The ‘secure share’ features are embedded directly into the end user’s SharePoint ribbon to easily and manage shared content with external stakeholders.

End users can now share content securely and directly from SharePoint. With this menu, users can specify recipient, permission level, whether or not to share updates, and share expiration dates.

Selecting 'Edit in Browser Only' gives sharing recipients the ability to open and edit the shared document or folder contents within Office Web Apps. He or she cannot download a local copy of the file.

End users who have shared documents or folders can view or the sharing information later to review or revoke access if necessary.

Once an end user has shared documents externally, SharePoint will populate a library of his or her shared files for easy reference and management.

Recipients of secure shares can access their received files in the Perimeter secure portal.

Secure Share recipients can view or edit shared documents, download local copies, and upload new conent based on permission levels.

Secure Share recipients of documents or folders can also upload content into the SharePoint library with the correct permission levels.

The secure document viewer allows end users to securely share read-only content without losing control of the files. The secure document viewer prevents saving, editing, or further sharing.

Administrators can create virtual views, consolidated views of specified SharePoint content in a secured container, for external users from the manage menu.

The virtual views function uses metadata tags to display only administrator specified SharePoint content. Administrators can configure metadata rules from the administrator portal.

From the manage menu, administrators can configure site access policies at the site level, specifying requirements for authentication and devices.

Administrators can configure device group permissions for each site.

Administrators can define content access policies by geopolitical region or radial distance from a specified point.

Administrators can enroll devices one at the time or in bulk. Permissions for enrolled devices can be managed individually.

From the reporting menu, administrators can view and export logs of all content access events, including time, location and activity.

Adminsitrators can audit and generate reports on user activity such as access, authentication, and policy violations.

The Burglar Alarm feature allows Administrators to configure alerts for suspicious user behaviors.

Alerts for Burglar Alarm generate emails to the administrator and also appear in the administrator Perimeter Portal.

Activity recorded by the Perimeter Burglar Alarm can be viewed or exported as a report.

Daily Audit Tracking allows administrators to generate behavior reports by specific users or user groups.

Daily Audit Tracking reports are configurable by user groups, date, and time.

Virtual Views display only specified content to external users. Configurable content access policies include download and editing permissions.

Multi-factor remote access authentication requires end users to scan a QR code or generate an access password from their pre-registered devices.

The AvePoint Perimeter mobile app for iOS connects users to their SharePoint content based on specified access policies.

The AvePoint Perimeter iOS App supports end users with a range of settings, email logs, and a tutorial.

AvePoint Perimeter mobile app is supported for Android.

AvePoint Perimeter mobile app is supported for Windows Phone.

Secure File Sharing

SHAREPOINT REMOTE ACCESS

Work no longer takes place solely from 9am to 5pm within the walls of the corporate office.

Empower a mobile workforce with secure remote access to SharePoint content as well as editing capabilities using a secure container on personal devices – anywhere, anytime.

SAP Jam Integration

SAP Jam Integration

Simplify team collaboration by seamlessly connecting SharePoint with SAP Jam. Pin SharePoint documents and folders to SAP Jam groups to centralize collaboration.

KEY BENEFITS FOR SHAREPOINT PRODUCTIVITY

  • SharePoint File Sync and Share: End users can extend sharing beyond the organization by allowing external users to view, download, and edit content from Office Web Apps on mobile devices and desktop browsers. Content can be saved and synced back to your organization’s source library without ever having to download it.
  • SharePoint Productivity: Information workers can share content from approved libraries with one click in the SharePoint ribbon, ensuring your on-premises SharePoint becomes the single point of access for all of your organization’s content.
  • Secure Collaboration: Combining a secure container and the familiar interface of Office Web Apps, Perimeter exposes only content that is approved for external sharing according to the rules you set.
  • Secure Remote Access: Protect sensitive digital assets while empowering a mobile workforce with remote access to content as well as editing capabilities on personal devices – anywhere, anytime.
  • Multifactor Authentication: Protect corporate data and prohibit unauthorized content access with multifactor authentication (MFA).
  • User and Group – based Sharing Control: Create and manage external sharing options for internal users and define which permissions a user can grant to external users and groups.
  • Robust Access Controls: Maintain control over a comprehensive mobile access and external collaboration solution by combining Two-Factor Authentication (2FA), your existing device authentication security systems, and location-based access controls.
  • Access Auditing & Alerts: Enforce compliance and strengthen security by proactively monitoring and responding to alerts on suspicious file sharing, remote access, and content downloads.

DOWNLOAD AVEPOINT PERIMETER MOBILE APP

windows storedownload on the app storeANDROID APP ON Google play

Apple, the Apple logo, iPhone, iPad and iPod touch are trademarks of Apple Inc., registered in the U.S. and other countries. App Store is a service mark of Apple Inc.

Customer Testimonials

See what our customers are saying about AvePoint Software.