Resources
Security Sheriff Resources
Whitepaper
Dynamic Security in SharePoint with Security Sheriff
Learn about new and simpler to administer “dynamic security” capabilities based on real-time comparison of user context and file context to protect SharePoint and Office 365 files – and that goes beyond what Microsoft’s static security capabilities can do.
DownloadOn-Demand Webinar
SharePoint - Dynamic Collaboration and Encryption
SharePoint is a powerful collaboration technology. But its static permissions, file encryption templates, and endless exceptions can quickly become very complicated to manage and obstruct users’ workflow.
But you need to secure your SharePoint content! What can you do?
This presentation describes how every organization can secure their SharePoint and Office 365 files – at rest, and in transit.
WatchOn-Demand Webinar
Dynamically Securing SharePoint Content – Easily and Quickly
How can you easily ensure only the right people can access, collaborate or distribute SharePoint content? How about O365 or OneDrive repositories?
This webinar discusses best practices to secure SharePoint content for common scenarios that require capabilities beyond what Microsoft provides.
WatchOn-Demand Webinar
Securing Files for All Users, All Devices, All Locations - In Any SharePoint Environment
SharePoint’s native security does a lot. But many common collaboration scenarios require additional security capabilities beyond what SharePoint provides.
What can you do?
This webinar discusses how to secure files for all users, all devices, and all locations -- in any SharePoint environment.
WatchOn-Demand Webinar
EU GDPR - Worldwide IT Compliance & Security Implications
Starting May 2018, any company managing data about EU citizens can be fined up to 4% of global company revenues if found to be non-compliant with the EU’s new General Data Protection Regulation (GDPR).
Will your IT systems and data processes be ready?
WatchDatasheet
Security Sheriff Datasheet
See how Security Sheriff provides security for SharePoint and Office 365 based on real-time comparison of user and file context, to dynamically individualize file restrictions as contexts change, to ensure users view, use and share files according to your organization’s regulations and policies.
DownloadShort Video
What is Security Sheriff?
Check out this 2 minute explanation of Security Sheriff!
WatchOn-Demand Webinar
SharePoint Migration – Securing data on premises, online and anywhere in between
SharePoint Online and Office 365 migration projects can be complicated, often because of information security concerns. So, how can you simplify and accelerate the process by applying security and privacy policies early in the transition?
This webinar will show you how.
WatchCase Study
Cogentrix
Cogentrix required confidential data in SharePoint to be secured by legal entity/business unit and needed to secure access at the document level and report on how information is accessed and secured. Security Sheriff offered Cogentrix’s a powerful solution to solve secure access to sensitive information in SharePoint.
Whitepaper
Avoiding the Security Risks of Office 365
As organizations replace on-premises applications with cloud-based ones, more of their data communications occur outside the corporate firewall, creating a completely new set of compliance and security concerns. Paramount among these concerns is the security of business-critical and sensitive information.This paper discusses how organizations can reap the benefits of Office 365 while mitigating security risks associated with storing information outside the corporate firewall. By reading this white paper, organizations can see how to manage content security risks in Office 365 by continuously monitoring content and automatically applying granular controls to limit access to and the distribution of sensitive content.
DownloadInfographic
Managing Information Security and Compliance in SharePoint and Office 365
Effective information security and compliance not only requires a well defined governance strategy, but also the ability to manage risk by putting controls in place to identify issues and potential violations, restrict actions that can be taken with sensitive data and log activity.
Download