AvePoint Media Contact
Nicole Caci
Tel: +1 201-201-8143
Email: nicole.caci@avepoint.com
AvePoint Perimeter Delivers a Robust Mobile Content Management (MCM) Solution for Modern Business Operations
AvePoint’s latest release of its enterprise mobility solution allows organizations to provide secure access and sharing of Microsoft SharePoint content – from any mobile device, in any location.
Jersey City, New Jersey — May 1, 2014 — AvePoint, the established leader in enterprise-class management, governance, and compliance software solutions for next-generation social collaboration platforms, today announced the general availability of AvePoint Perimeter Service Pack (SP) 2 . AvePoint Perimeter, a 2014 European SharePoint Community (ESPC) Awards finalist for best mobile solution, provides organizations with a robust mobile content management solution to mobilize their workforce by offering secure access to content from virtually any device – including smartphones, tablets, laptops, and desktop – without sacrificing security.
With the launch of AvePoint Perimeter SP 2, organizations can now give users the freedom to choose how and with whom they want to collaborate – from external users to devices and locations – all while keeping sensitive digital assets in SharePoint secure. New features include:
Secure File Sharing: Eliminate the need for free file sharing services that put your organization’s digital assets at risk by giving your end users, partners, and external parties an intuitive application to access digital content. Protect your organization’s digital assets and mitigate risk by utilizing AvePoint Perimeter’s secure container for external parties to view shared content.
Virtual Views: Extend personalized views of SharePoint content to external parties, granting your end users the freedom to choose what information they want to share and with whom. This ensures alignment with organizational security and compliance policies by automatically generating virtual views based on predefined metadata classification.
In addition to these new features, AvePoint Perimeter SP 2 offers IT administrators robust control over mobile access of SharePoint content, including:
Mobile Content Management (MCM): With multi-channel content delivery, robust content access controls, and location-based content delivery, AvePoint Perimeter provides a comprehensive MCM solution to help deliver business-critical content to your mobile workforce.
Remote Access: Empower your mobile workforce with remote access to content repositories on personal devices – anywhere, anytime. Protect sensitive digital assets with multi-factor authentication, ensuring access by trusted users, in trusted locations, on trusted devices.
Centralized Access Control: By combining traditional 2-Factor Authentication (2FA), your existing device authentication security systems, and location-based controls, AvePoint Perimeter ensures that your business-critical SharePoint assets are accessed by trusted users, on trusted devices, and within trusted locations.
“The workplace and work hours have been expanded through the use of mobile devices and free third-party file sharing services for business purpose. Although beneficial to increase speed of business needs, organizations are now facing security headaches for compliance and IT teams alike,” said Dux Raymond Sy, Global Vice President of Customer Strategy & Solutions, AvePoint. “With AvePoint Perimeter, organizations can provide enterprise mobility as a service by giving users the freedom to choose how and with whom they want to collaborate, from external users to devices and locations – all while keeping sensitive digital assets secure.”
AvePoint Perimeter is generally available today, May 1, 2014. For more information on how AvePoint Perimeter can keep your organization secure during mobile access, please visit our website.
About AvePoint
AvePoint accelerates your digital transformation success. Over 21,000 companies and 9 million SharePoint and Office 365 users worldwide trust AvePoint software and services for their data migration, management, and protection needs in the cloud, on-premises and hybrid environments.
All product and company names herein may be trademarks of their registered owners.