Endpoint
9/12/2013
11:35 AM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Intralinks Announces Latest Release Of Secure Enterprise Collaboration Solution Intralinks VIA

Includes expanded administrative capabilities

New York, N.Y., September 11, 2013 -- Intralinks® Holdings Inc. (NYSE: IL), a leading, global SaaS provider of inter-enterprise content management and collaboration solutions, today announced the latest release of Intralinks VIATM, its secure and scalable enterprise collaboration solution that helps organizations take lifetime control of their most important information and frees employees to reach new levels of productivity. The new release provides even greater visibility, governance and control over how an organization's information is shared, while providing an easy-to-use experience that encourages collaborative working.

This latest release brings expanded capabilities for Intralinks VIA administrators, allowing them to gain control and manage policies that guide how users and business groups share and use information, all while providing complete visibility into their Intralinks VIA environment. For example, administrators can mandate the level of security that users must apply to their collaboration projects or can prevent certain users from syncing content with their personal devices.

"Working within the highly regulated healthcare industry, we needed a solution that provides the best security and controls, but was still simple to use for our employees, partners and customers," said Simon A. Corman, director, Business Operations at IRB Services. "IRB Services independently approves, monitors and reviews biomedical and behavioral research involving humans and works with many of the largest pharmaceutical and research organizations. We needed a robust collaboration solution that protects the sensitive information we share with customers, and we knew we could trust Intralinks."

Some of the additional capabilities available with this latest release include:

Setting policies for sharing work streams: Enables administrators to limit a business group's ability to create specific types of work streams, providing a standard for security on documents. For example, administrators can disable business group users' ability to share documents with public work streams and require that users create work streams with digital rights management enabled by default, which helps avoid inadvertent data leakage issues.

Determining on which desktop devices users can access their Intralinks VIA Drive: Enables administrators to track the devices a business group member uses to log in and, depending on the type of device, either allows or disallows access. Also enables administrators to disallow devices that were previously allowed – for example, if someone loses a laptop.

Enabling Remote Wipe: Allows administrators to remotely wipe all content from all synchronized devices that are no longer trusted or that fall outside of their control. Significantly, this feature works whether the device is online or offline.

Defining work stream archive dates: Enables administrators to easily comply with corporate archiving policies and manage the complete lifecycle of files.

Creating enhanced reports: Enables administrators to generate granular audit and usage reports that provide a holistic view of the Intralinks VIA environment. This facilitates IT teams' efforts to comply with audit requirements and analyze business users' usage of the application.

Provisioning trial accounts for new users: Enables administrators to easily self-manage accounts and add users for free trials or paid accounts for members of their business groups without needing to go back to an account team for service.

Built upon a proven technology used by over 99% of the global Fortune 1000, Intralinks VIA goes beyond file sharing to ensure that productive work gets done and protects that work wherever it travels. Intralinks VIA can be trusted by busy professionals as they work across a network of increasingly complex external business communities, knowing that they can UNshareTM access to shared content at any time with the click of a button, even after it has been sent beyond the firewall.

Pricing and Availability

This latest release of Intralinks VIA is immediately available as a free 30-day trial at http://www.intralinks.com/via.

About Intralinks

Intralinks Holdings, Inc. (NYSE: IL) is a leading, global technology provider of inter-enterprise content management and collaboration solutions. Through innovative Software-as-a-Service solutions, Intralinks solutions are designed to enable the secure and compliant exchange, control, and management of information between organizations when working through the firewall. More than 2.7 million professionals at 99% of the Fortune 1000 companies depend on Intralinks' experience. With a track record of enabling high-stakes transactions and business collaborations valued at more than $23.5 trillion, Intralinks is a trusted provider of easy-to-use, enterprise strength, cloud-based collaboration solutions. For more information, visit www.intralinks.com.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2015-0714
Published: 2015-05-02
Multiple cross-site scripting (XSS) vulnerabilities in Cisco Finesse Server 10.0(1), 10.5(1), 10.6(1), and 11.0(1) allow remote attackers to inject arbitrary web script or HTML via unspecified parameters, aka Bug ID CSCut53595.

CVE-2014-3598
Published: 2015-05-01
The Jpeg2KImagePlugin plugin in Pillow before 2.5.3 allows remote attackers to cause a denial of service via a crafted image.

CVE-2014-8361
Published: 2015-05-01
The miniigd SOAP service in Realtek SDK allows remote attackers to execute arbitrary code via a crafted NewInternalClient request.

CVE-2015-0237
Published: 2015-05-01
Red Hat Enterprise Virtualization (RHEV) Manager before 3.5.1 ignores the permission to deny snapshot creation during live storage migration between domains, which allows remote authenticated users to cause a denial of service (prevent host start) by creating a long snapshot chain.

CVE-2015-0257
Published: 2015-05-01
Red Hat Enterprise Virtualization (RHEV) Manager before 3.5.1 uses weak permissions on the directories shared by the ovirt-engine-dwhd service and a plugin during service startup, which allows local users to obtain sensitive information by reading files in the directory.

Dark Reading Radio
Archived Dark Reading Radio
Join security and risk expert John Pironti and Dark Reading Editor-in-Chief Tim Wilson for a live online discussion of the sea-changing shift in security strategy and the many ways it is affecting IT and business.