Security Model

Sophisticated security

Our granular approach to applying permissions under the hood ensures that administrators can finely tune access to individual files whilst ensuring they aren't inundated with too many security checkboxes. In addition, users can be granted or denied access to different functions such as emailing, sharing, downloading and editing.