SharePoint Security

 

SharePoint Security

Collaborate in confidence

Malware protection and content control to let your users share, but not too much.

Protect Critical Business Data

 

Sophos for Microsoft SharePoint protects your critical business data from malware. But, it also helps you control the distribution of sensitive information and provides you with visibility into the security of your servers.

We’ve combined modern threat protection, customizable content controls and an intuitive web-based console. These features make it easy for you to secure a single server or an extensive SharePoint infrastructure.

 
    
     

Modern Threat Protection

 

 

We’ve based Sophos for Microsoft SharePoint on the same great protection used in our award-winning endpoint products. Our unique Behavioral Genotype technology detects previously unseen malware by recognizing the behaviors common to malicious files.

Live Protection provides a real-time connection to SophosLabs. There, we continually collect, correlate and evaluate suspicious files in the cloud.

 


Flexible Content Control

 

Certain sensitive data simply shouldn't be shared on your SharePoint sites. That's why Sophos for Microsoft SharePoint includes content controls that allow you to limit what your users post. The controls can match file types, text and even regular expressions, giving you the flexibility to match the rules to your policies.

Violations can be configured to warn users, block the files from being posted and/or replace the files with custom text. True file type technology makes sure that changing a file's extension won't bypass your rules.

   
     

Intuitive Web-Based Console

 

 

Our intuitive web-based console gives you visibility into your SharePoint security environment. Easily configure new rules and policies and apply them throughout your organization.

View the quarantine, where you can choose to allow, delete or clean suspicious files or items posted in violation of your content policies.

Rich, customizable reports provide insight into threat activity, content filtering performance and quarantine status. You can even use our detailed, searchable logs for forensic analysis.

Network and endpoint protection, centrally managed and communicating together.
For stronger, simpler security.