send link to app

AvePoint Perimeter


4.8 ( 6368 ratings )
Economia Produttività
Sviluppatore AvePoint, Inc.
Libero

AvePoint Perimeter connects mobile workers to enterprise SharePoint content, while reducing organizational risk, ensuring compliance and increasing productivity. The app provides a secure container and accessible interface for document sharing and syncing with authorized external users and people within your organization that are on-the-go.

With AvePoint Perimeter’s mobile content management (MCM) solution, users can enjoy secure access to content at location of their choosing from the mobile device.

With this app employees can:
-browse and view, edit or download content directly from enterprise content repositories, within AvePoint’s secure container, on iPad, iPhone, or iPod touch devices.
-access SharePoint content offline via cache.
-enroll personal devices with existing employer system(s) for secure remote access.
-authenticate remote access for other devices by scanning a QR code or one-time access code with the enrolled iOS device.
-avoid data risk by verifying content is being accessed by trusted users, on trusted devices, in trusted locations.
-use iOS location based features to access content according to governance policies.
-ensure content is protected against unauthorized edits and screenshots using AvePoint’s Watermark.

With this app, external stakeholders can:
-enroll personal devices with AvePoint Perimeter for secure access to shared SharePoint documents.
-view, edit or download securely shared documents, within AvePoint’s secure container, according to the permissions set by the content owner
- receive push notification updates when a shared file is updated.
-view specific, consolidated views of content, only accessing what content is directly applicable.

AvePoint Perimeter ensures enterprise content security while giving users the freedom to choose how and with whom they want to collaborate.

*requires additional software

NOTE: The AvePoint Perimeter App requires connection to an enterprise deployment of Perimeter. Consult with your IT department for further details.