https://store-images.s-microsoft.com/image/apps.40390.fbee73d5-6d73-47f1-8a23-4121feb4ceb4.1fb2c41a-6ae5-4346-a15c-1cdf9a157ad7.c5fbf3af-7f38-442d-8e5a-7f56ac61c10f

SphereShield Ethical Wall for Skype for Business

AGAT Software Development LTD

(10 évaluations)

SphereShield Ethical Wall for Skype for Business

AGAT Software Development LTD

(10 évaluations)

Control who can communicate with whom, specifying communication type and apply to external users too

SphereShield Ethical Wall for Skype for Business

Control who can communicate with whom, using specific collaboration options. Apply policies on external or internal users and groups.


✔Restrict communication participants, and control or block specific options such as chat or file sharing, between different users

✔Granular control is offered based on groups, domains and users and applied dynamically based on the context of the communication

✔Specific policies can be applied to chat and meetings depending on participant type (Employee, external)

✔Comply with FINRA, HIIPA and many other policies requiring control on communications

✔Block file sharing, control file sharing

✔Block screen share, control screen share 


Features

-Internal Control by Groups/Users (Allow/Block)

-External Control by Groups/Users (Allow/Block)

-Granular Control capabilities (IM’s/files/audio/video/sharing)

-Web User Interface (GUI) - Easy to operate

-Notifications to end user/admin

-Incident auditing for compliance awareness and training

-Reports by user/policy/domain

-External system integration/SIEM 

When it comes to having comprehensive control over communications, Skype for Business Ethical Wall by SphereShield It is the best option for those Compliance Officers who are looking for immediate solutions, because it gives the user the possibility to customize and set privacy in real time. 

Policies can be configured by an admin to prevent individuals or groups from communicating with each other. On the other hand, imagine that what you want is to restrict the contact between your employees with people outside the company. In this case and on the fly, those who are in charge of ensuring information security can totally restrict the flow of communication between members of the company and external agents.

Among the actions that can be blocked are: chat, calls, multi chats, meeting invitations, just to say a few

Common use cases involve the need to block file-sharing or control file-share as well as Block screen-share or control screen-share.  

https://store-images.s-microsoft.com/image/apps.47993.fbee73d5-6d73-47f1-8a23-4121feb4ceb4.1fb2c41a-6ae5-4346-a15c-1cdf9a157ad7.81904707-0379-46c5-97d7-638f95946b37
/staticstorage/55c01f2/assets/videoOverlay_7299e00c2e43a32cf9fa.png
https://store-images.s-microsoft.com/image/apps.47993.fbee73d5-6d73-47f1-8a23-4121feb4ceb4.1fb2c41a-6ae5-4346-a15c-1cdf9a157ad7.81904707-0379-46c5-97d7-638f95946b37
/staticstorage/55c01f2/assets/videoOverlay_7299e00c2e43a32cf9fa.png
https://store-images.s-microsoft.com/image/apps.7449.fbee73d5-6d73-47f1-8a23-4121feb4ceb4.1fb2c41a-6ae5-4346-a15c-1cdf9a157ad7.2e39f07f-a652-4d7d-8c91-325690488a81
https://store-images.s-microsoft.com/image/apps.48869.fbee73d5-6d73-47f1-8a23-4121feb4ceb4.1fb2c41a-6ae5-4346-a15c-1cdf9a157ad7.11932d86-f96d-4a52-bae3-b7cb8015ccd9
https://store-images.s-microsoft.com/image/apps.55656.fbee73d5-6d73-47f1-8a23-4121feb4ceb4.1fb2c41a-6ae5-4346-a15c-1cdf9a157ad7.a47790b4-36dd-420d-aa65-02a59a2e374d
https://store-images.s-microsoft.com/image/apps.465.fbee73d5-6d73-47f1-8a23-4121feb4ceb4.1fb2c41a-6ae5-4346-a15c-1cdf9a157ad7.641ae1c5-2ec4-4049-bcc0-3661286a3424
https://store-images.s-microsoft.com/image/apps.29142.fbee73d5-6d73-47f1-8a23-4121feb4ceb4.1fb2c41a-6ae5-4346-a15c-1cdf9a157ad7.52ee9ecc-df7a-44a8-af88-3e1558f49571