Endpoint
9/12/2013
11:35 AM
Dark Reading
Dark Reading
Products and Releases
Connect Directly
RSS
E-Mail
50%
50%

Intralinks Announces Latest Release Of Secure Enterprise Collaboration Solution Intralinks VIA

Includes expanded administrative capabilities

New York, N.Y., September 11, 2013 -- Intralinks® Holdings Inc. (NYSE: IL), a leading, global SaaS provider of inter-enterprise content management and collaboration solutions, today announced the latest release of Intralinks VIATM, its secure and scalable enterprise collaboration solution that helps organizations take lifetime control of their most important information and frees employees to reach new levels of productivity. The new release provides even greater visibility, governance and control over how an organization's information is shared, while providing an easy-to-use experience that encourages collaborative working.

This latest release brings expanded capabilities for Intralinks VIA administrators, allowing them to gain control and manage policies that guide how users and business groups share and use information, all while providing complete visibility into their Intralinks VIA environment. For example, administrators can mandate the level of security that users must apply to their collaboration projects or can prevent certain users from syncing content with their personal devices.

"Working within the highly regulated healthcare industry, we needed a solution that provides the best security and controls, but was still simple to use for our employees, partners and customers," said Simon A. Corman, director, Business Operations at IRB Services. "IRB Services independently approves, monitors and reviews biomedical and behavioral research involving humans and works with many of the largest pharmaceutical and research organizations. We needed a robust collaboration solution that protects the sensitive information we share with customers, and we knew we could trust Intralinks."

Some of the additional capabilities available with this latest release include:

Setting policies for sharing work streams: Enables administrators to limit a business group's ability to create specific types of work streams, providing a standard for security on documents. For example, administrators can disable business group users' ability to share documents with public work streams and require that users create work streams with digital rights management enabled by default, which helps avoid inadvertent data leakage issues.

Determining on which desktop devices users can access their Intralinks VIA Drive: Enables administrators to track the devices a business group member uses to log in and, depending on the type of device, either allows or disallows access. Also enables administrators to disallow devices that were previously allowed – for example, if someone loses a laptop.

Enabling Remote Wipe: Allows administrators to remotely wipe all content from all synchronized devices that are no longer trusted or that fall outside of their control. Significantly, this feature works whether the device is online or offline.

Defining work stream archive dates: Enables administrators to easily comply with corporate archiving policies and manage the complete lifecycle of files.

Creating enhanced reports: Enables administrators to generate granular audit and usage reports that provide a holistic view of the Intralinks VIA environment. This facilitates IT teams' efforts to comply with audit requirements and analyze business users' usage of the application.

Provisioning trial accounts for new users: Enables administrators to easily self-manage accounts and add users for free trials or paid accounts for members of their business groups without needing to go back to an account team for service.

Built upon a proven technology used by over 99% of the global Fortune 1000, Intralinks VIA goes beyond file sharing to ensure that productive work gets done and protects that work wherever it travels. Intralinks VIA can be trusted by busy professionals as they work across a network of increasingly complex external business communities, knowing that they can UNshareTM access to shared content at any time with the click of a button, even after it has been sent beyond the firewall.

Pricing and Availability

This latest release of Intralinks VIA is immediately available as a free 30-day trial at http://www.intralinks.com/via.

About Intralinks

Intralinks Holdings, Inc. (NYSE: IL) is a leading, global technology provider of inter-enterprise content management and collaboration solutions. Through innovative Software-as-a-Service solutions, Intralinks solutions are designed to enable the secure and compliant exchange, control, and management of information between organizations when working through the firewall. More than 2.7 million professionals at 99% of the Fortune 1000 companies depend on Intralinks' experience. With a track record of enabling high-stakes transactions and business collaborations valued at more than $23.5 trillion, Intralinks is a trusted provider of easy-to-use, enterprise strength, cloud-based collaboration solutions. For more information, visit www.intralinks.com.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading Must Reads - September 25, 2014
Dark Reading's new Must Reads is a compendium of our best recent coverage of identity and access management. Learn about access control in the age of HTML5, how to improve authentication, why Active Directory is dead, and more.
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2012-5485
Published: 2014-09-30
registerConfiglet.py in Plone before 4.2.3 and 4.3 before beta 1 allows remote attackers to execute Python code via unspecified vectors, related to the admin interface.

CVE-2012-5486
Published: 2014-09-30
ZPublisher.HTTPRequest._scrubHeader in Zope 2 before 2.13.19, as used in Plone before 4.3 beta 1, allows remote attackers to inject arbitrary HTTP headers via a linefeed (LF) character.

CVE-2012-5487
Published: 2014-09-30
The sandbox whitelisting function (allowmodule.py) in Plone before 4.2.3 and 4.3 before beta 1 allows remote authenticated users with certain privileges to bypass the Python sandbox restriction and execute arbitrary Python code via vectors related to importing.

CVE-2012-5488
Published: 2014-09-30
python_scripts.py in Plone before 4.2.3 and 4.3 before beta 1 allows remote attackers to execute Python code via a crafted URL, related to createObject.

CVE-2012-5489
Published: 2014-09-30
The App.Undo.UndoSupport.get_request_var_or_attr function in Zope before 2.12.21 and 3.13.x before 2.13.11, as used in Plone before 4.2.3 and 4.3 before beta 1, allows remote authenticated users to gain access to restricted attributes via unspecified vectors.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
In our next Dark Reading Radio broadcast, we’ll take a close look at some of the latest research and practices in application security.