HomeAvePoint BlogEnsure Secure File Sharing with AvePoint Perimeter

Ensure Secure File Sharing with AvePoint Perimeter

A common need in organizations today is the ability to share content with external entities. Cloud-based free file sharing services have exploded on a viral level due to the ease of use and intuitive access. However, for companies, organizations, and public sector agencies that handle private and protected information, they might be too handy — and a data breach just waiting to happen. In the last few years alone, file sharing services like Dropbox have experienced several significant data breaches.

The average cost of a data breach in the United States is $188 per record, making the average organizational cost more than $5.4 million, according to the Ponemon Institute’s 2013 Cost of Data Breach study. According to the same report, about two-thirds of data breaches are caused by human errors and system problems. There is no question that the Bring Your Own Device (BYOD) trend tied with the use of consumer file sharing services in the workplace has many companies conscious about the security of their corporate assets.

The study illustrates the potential security risks associated with consumer file sharing services, but the legal ramifications of signing up for these services can also hurt your company. Employees do not realize that they are signing agreements on behalf of their organization when they sign up for these services, or that they are potentially violating compliance standards. This has led some corporate counsels and intellectual property security directors to eliminate the use of file sharing services entirely.

So how can you eliminate the need for free file sharing services that put your organization’s digital assets at risk by giving your end users, partners, and external parties an intuitive application to access digital content? I am excited to share that with our latest release of AvePoint Perimeter, you can protect your organization’s digital assets and mitigate data breach risk by utilizing its secure container for external parties to view shared content.

With Perimeter, users can share cached copies of SharePoint content to external users while providing administrators control over access, permissions, auditing information, and expiration time. To get an idea of how it works, check out this visual walkthrough of Perimeter’s secure file sharing capability or watch the brief animation below:

https://www.youtube.com/watch?v=rMWKXFnYIss

So what are you waiting for? Visit our website today to request a free 30-day trial so you can begin empowering your end-users with mobile SharePoint access while reassuring your IT administrator’s trust in content security!

LEAVE A REPLY

Please enter your comment!
Please enter your name here

More Stories