User permissions

Locks Encrypt 600X400 42Kb

Comprehensive user permissions

Staying in control of shared sensitive data has never been easier with our enterprise-grade permissions that keep content safe from unwanted access, as well as a subsequent security breach.

Users have all the tools they need to quickly and simply apply comprehensive restrictions in order to effectively secure confidential files.

File Sharing Laptop 600X400 43Kb

Location locks

Restrict access by location to determine exactly where colleagues can view files and documents.

Realtime Feedback Features 555X300

Time expiry settings

Specify a limited period for team mates to access confidential content.

1313 IES For Banks Credit Unions Datasheet US Thumb 555X300

Restrictions on usability

Comprehensive user permissions include editing, forwarding, and download restrictions, as well as digital watermarking.

Related Content

Email encryption
Why should you encrypt email?

As a communication method and for sharing data, email is as popular as ever. Despite the influx of other messaging and online secure file sharing solutions, it remains the most widely used tool for organisations to transmit and receive sensitive data.

'How to' guides
How to recognise and prevent impersonation attacks

Impersonation is a dangerous phishing tactic. Learn how to spot and prevent attacks before they lead to a serious breach. 

Data Loss Prevention
How to recall an email in Outlook

Find out how to recall an email using Outlook. We also suggest other ways to stop sending emails to the wrong people in the future.