From day one, Files.com has always set itself apart by offering deeply powerful group management functionality.
Flexible access and granular permissions are all at your fingertips when you’re designing your enterprise on Files.com.
We want security best practices to be natural for you on Files.com. That means creating a user for every purpose and following the principle of least access.
In fact, we’ve assisted creative site administrators in designing permissions-based security gates and funnels that guide their sensitive files safely through their data life cycles, making sure that the right people have only the access and control they need along the way.
We also want your site administrators to find it easy to use the tools we provide so that they will take advantage of the platform strengths.
Adding and changing permissions is a snap through our interface, and changes take effect right away.
Assigning users the file permissions they need to get their work done is straight-forward.
We support separate permission levels for full access, read only, write only, and read-write (but not delete). You can even assign permission to preview files on a per-folder basis for those users who need to check on things but don’t need to change them or see the original source documents.
And for your staff who help with reporting and record-keeping but don’t need file access or full administrative rights, you can assign permission to view activity logs without adding anything unnecessary.
When you have large numbers of users to manage (we support customers who manage multiple thousands of users!), or a revolving door of contractors, vendors, customers, or special project teams, then you want the convenience and fail safe accuracy of groups.
Define a group to match its mission, design the access and permissions for the group to accomplish that mission, then add and remove members as you need, always knowing that accuracy is assured.
Okay, so you’ve set up your group for the secret special project, and you’re ready to add the four hundred and sixty-two group members who will hammer it out in only eight weeks, but, it’s vital that access ceases at project close. Will you remember to revoke their access? or remove the users at the right time? Not to worry. You can simply remove the group, or, if you won’t need the users to have any access beyond a certain date, you can define them with an expiration date. Simple.
Delegate Group Administration to Group Administrators
We provide Group Administrator capability on our Enterprise and Enterprise Premier plans, allowing you to delegate user creation to trusted group members that you select.
You’ve made it easy for them, because they can’t accidentally assign the wrong permissions (you’ve already assigned permissions at the group level), and group administrators don’t have any other administrative rights that could get them into trouble. So, you’ve just made it easier for yourself too.
What about the general public?
Now that your special project is all buttoned up and ready for launch, you want to share it with the world, but you don’t want to make user accounts for everybody, right? What do you do?
Don’t worry; we’re not going to make you wait for it: Share links and Web hosting mode are two features that make backend control sensible and easy to manage while providing public access to the files and content your rules specify.
Share links function like a bearer key; only those who possess the precise link can access the files, and you can set links to expire after a certain number of days, or you can manually revoke them at any time.
Yes, as you can imagine, we’ve seen some impressively efficient and secure workflows prepare documents and get them to the public using this feature. And if your wheels are starting to turn, and you’d like to talk through the possibilities, get in touch.
Helping you imagine how your organization can work better is what we’re here for.