Securing Sharing and Guest Access with PI’s Automated Policies
See our most used collaboration policies in action
THIS WEBINAR HAS ALREADY AIRED. YOU MAY WATCH AN ON-DEMAND RECORDING BY REGISTERING BELOW.
Duration: 30 minutes
Prevent Shadow Users, Unmanaged Guests and More
One of the biggest collaboration challenges for organizations is making external sharing and guest access both productive AND secure.
For example, did you know it's not just the membership of the Team or SharePoint site that can access a document hosted within that workspace? Users can easily provide access and permission to others through document sharing links.
In our dynamic, 30 minute virtual lab we will demonstrate live how to easily identify these shadow users when your security team asks you, “who has access to this document?” AND then we will show you the policies organizations use to prevent this data leak.
We will review the top automated collaboration policies used by our customers along with supporting use cases including:
External sharing settings
Scan external users
Owner number restrictions
Access request settings
Remove shadow users
Training and Development Manager, AvePoint
Ron DelaneyTraining and Development Manager, AvePoint
Ron has been a training and development manager at AvePoint for more than 8 years. He believes everyone's time is important. Because of that, the goal of every training session is for attendees to both enjoy the session and leave having learned something valuable.
Vice President, Solution Engineering, AvePoint
Tom GawczynskiVice President, Solution Engineering, AvePoint
As the Vice President of Solution Engineering, Tom Gawczynski enables AvePoint's global customers with software solutions and services to ensure success within their Office 365 and SharePoint deployments. Prior to joining AvePoint in 2015, Tom had been working in IT since 2005 and prior to joining AvePoint was an IT Director for a K-12 school district in Illinois that served 1,100 faculty and staff and 5,600 students. Tom's focus is currently centered on successfully turning on the lights in Office 365 without encountering friction around security and governance needs.