You've requested...

Share this with your colleagues:

Download this next:

Dropbox Business security features

Eager to invest in a collaboration platform but concerned about data security?

In this white paper, explore your collaboration platform options with Dropbox Business. Get an overview of Dropbox product features, and explore the security a Dropbox Business collaboration platform can offer your organization.

View now, and glean insight into an array of Dropbox security features, including:

  • Two-step verification
  • User provisioning and identity management tools
  • Remote wipe
  • Network control
  • And more

These are also closely related to: "What is Dropbox Business?"

  • Why Teams Use Dropbox Business with Microsoft Office 365

    Leading companies who use Microsoft Office 365 recognize the need for the mobile productivity and collaboration capabilities that Dropbox Business delivers. Read on to learn more about why teams use Dropbox Business with Microsoft Office 365.

  • 1 collaboration tool to rule them all -- and keep you secure

    Employees love to stray to their personal emails or use unauthorized tools to share information.

    Let's be clear about what this does: It opens your business up to new security threats, and bogs down IT with unnecessary requests.

    By moving employees to a single platform that's approved by the business, you can bring together tools and better enable collaboration -- and reduce your security threats at the same time.

    Explore how Dropbox Business can help bring all your employees together under the roof of 1 tool, with benefits including:

    Intuitive design
    Performance for mobile employees
    Modern security tools
    And more

Find more content like what you just read:

  • Achieving enterprise-grade security in your collaboration platform

    How do you combine the simplicity of cloud collaboration apps with enterprise-grade security? Download this white paper for an overview of leading collaboration platform, Dropbox Business, which enables organizations to gain control of shared data while meeting the security mandates that challenge enterprises of all sizes.

    Download

  • 8 tips to streamline your workflow

    In this e-book, uncover 8 tips to overcoming day-to-day workflow challenges and learn how to overcome "work about work," so your organization can stay in a creative flow.

    Download

  • CW Buyers Guide: Cloud Storage

    Computer Weekly looks at the variety of cloud storage options for the enterprise, their benefits and the potential security risks and opportunity costs they present.

    Download

  • How 8 organizations use Dropbox to collaborate

    The way modern enterprises work together is often a challenge, resulting in the need for new collaboration strategies and tools. In this report from IDC, explore the business value of Dropbox Business in supporting collaboration. Get an overview of Dropbox Business, and uncover the productivity benefits Dropbox can bring to your organization.

    Download

  • How to build a strong collaborative environment

    With this e-book, explore how collaboration operates as an essential part of your business. Discover the features of a strong collaboration environment, and learn how you can improve your workplace's collaboration culture with Dropbox.

    Download

  • Scale your business without losing speed

    81% of U.S. companies view the international component of their business as important and expect to increase activity in the next year, according to The Business Journal. Read this white paper for the pros and cons of international business expansion, and how to prepare for it.

    Download

  • Solve collaboration and hard-drive related issues with Dropbox

    View this webinar to learn about Dropbox Smart Sync product features and benefits. Glean insight into Smart Sync from Dropbox Product Marketing Manager, Kevin Watt, and find out why Maine Pointe decided to migrate their content from SharePoint to Dropbox Business.

    Download

  • Zoom enters UCaaS market with new cloud PBX service

    In this expert guide, learn about new developments and products for some of the leading vendors in the UC market.

    Download

  • How TITUS Intelligence Protection can help your data security

    One of the primary reasons data security is less adopted than other security areas is that it can be complex, and often places a burden on users in terms of changes to workflows. In this white paper, learn how TITUS Intelligence Protection (TIP) with machine-learning-based classifications can greatly reduce the need for user involvement.

    Download

  • Why the weakest link in security is all of us

    This 2018 Human Factor Report teaches you how to take action against the wide range of advanced threats. View now and learn how to identify and block targeted attacks that travel over email and other threat vectors.

    Download

  • Securing Data, Not Endpoints: The Best Way to Control Consumerization

    Discover why securing the data – rather than the endpoint – is the best way of controlling consumerization in your organization.

    Download

  • Collaborating With Everyone on Workplace

    Digital transformation doesn't work without the right technology to meet people's needs. Learn how Workplace meets that need by empowering employees to work together.

    Download

  • 7 common security mistakes when migrating to the cloud

    The speed of cloud migration is outpacing the speed of security team expansion. How do you keep up? Read on to learn how to prevent such a security regression when migrating to the cloud.

    Download

  • WAN Speak Musings – Volume I

    Analysts Clive Longbottom and Bob Tarzey discuss all things network related in this series of 12 short business focused articles.

    Download

  • How to conquer the varying needs of your collaboration landscape

    In this white paper, explore how to foster an effective collaboration environment within your organization and glean insight into the varying needs of collaboration landscapes and best practices to build a collaborative culture.

    Download

  • Why businesses need a collaboration strategy

    In this white paper, explore how to foster an effective collaboration environment within your organization and glean insight into the varying needs of collaboration landscapes and best practices to build a collaborative culture.

    Download

  • 7 guidelines for modern enterprise file sharing & content collaboration

    Learn about enterprise file sync and share (EFSS) platforms and find out how they have evolved into powerful tools that drive business operations and innovation.

    Download

  • How can you assess your cloud security needs?

    In this e-book, gain a stronger understanding of the 3 most prominent types of cloud services and the questions your organization should ask when building a network security platform.

    Download

  • Email threats: Explore how you can protect your organization

    When it comes to securing email and protecting against cyberattacks, most organizations focus their attention on inbound emails. Although this is a great start, not all attacks are from incoming emails. In this white paper, explore 4 email-related activities that employees often engage in that contribute to the spread of these insider threats.

    Download

  • How employees can jeopardize your cybersecurity

    Your employees can be your greatest asset, or your weakest link when it comes to email security. In this e-book, find several email-related activities that employees often engage in that contribute to the spread of these insider (hidden) threats and discover what your organization can do to protect itself.

    Download

  • Threat protection, visibility and remediation for internal and outbound email

    Your employees can be your greatest asset, or your weakest link when it comes to email security. In this e-book, discover several email-related activities that employees often engage in that contribute to the spread of these "hidden" threats and learn what measures your organization can take to protect itself from these attacks.

    Download

  • Integrate workflows - Focus less on operational and more on the customer

    Dropbox is a great way to streamline team communications and reduce time employees waste on the non-productive aspects of their position and, in combination with a platform like Salesforce, customer service can return as the primary focus. Watch this webcast for more information on how Dropbox and Salesforce work together to integrate workflows.

    Download

  • Uncover the scale of risk in the cloud

    When using software-as-a-service (SaaS), organizations are responsible for the security of their data and need to ensure it is accessed appropriately. In this Cloud Adoption and Risk Report, uncover the largest areas of risk in cloud computing today.

    Download

  • Defining the datacentre needs of 21st century enterprises

    This guide is designed to provide IT leaders with some insight into how their peers are addressing current problems through the use of cloud and colocation, and shine a light on how the analyst community sees the role of the datacentre changing over time.

    Download

  • How employee turnover jeopardizes your data

    Not all employees leaving your business steal data, but according to a recent study, of the 24 million quitters last year that took data from their employers, 90% went unnoticed. Download this data loss protection sheet which highlights a realistic quitting story with a data thief, and learn how management and monitoring can save your data.

    Download

  • A Computer Weekly Buyer's Guide to Microsoft Office 365

    Microsoft Office used to be a simple thing. You'd buy a box of software, install Word, Excel, Outlook and PowerPoint – and that was it. But that all changed with the launch of Office 365. In this 13-page buyer's guide, Computer Weekly looks at Microsoft's subscription-based enterprise software offering.

    Download

  • Mobility Management Selection Guide

    This exclusive paper takes an in-depth look at the criteria you can use to select the optimal enterprise mobility management system that can meet your specific, fast-paced, and consistently changing requirements.

    Download

  • An analysis of SSL/TLS-based threats

    Organizations that are not inspecting all encrypted traffic are at increased risk of infiltration and infection that can spread and wreak havoc. Download this white paper to learn about a multilayer defense-in-depth strategy that can fully support SSL inspection and keep your enterprise secure from SSL threats.

    Download

  • CASB alone isn't enough – so, what are your options?

    Download this white paper to learn about the benefits of a complete web protection platform and why a CASB is no longer enough.

    Download

  • The Future of Desktop Virtualization, Chapter 4

    This expert resource discusses how bring your own device (BYOD) policies, when used in conjunction with virtual desktop infrastructure (VDI), can return control back to IT while reducing the administrative and management headaches commonly associated with user-owned devices in the enterprise.

    Download

  • Top 5 communication tools to deploy for remote workers

    Today's businesses recognize the value of remote and mobile workers. However, working remotely requires a specialized set of tools to stay connected with coworkers and get work done. In this white paper, explore 5 of the top tools you can deploy to overcome common challenges remote workers face.

    Download

  • Presentation Transcript: BYOD: The Risks of Allowing Personal Mobile Devices On Corporate Networks and How to Mitigate Them

    Uncover why MDM and MAM are inefficient at solving the real problem mobile devices present to your network: traffic.

    Download

  • Addressing Data Security In The Cloud And Low Cost Large File Transfer

    The location of cloud storage can play a huge part in cost as well as security. Delivering large files from non-scrutinized locations can compromise sensitive data in more ways than not.

    Download

  • 2019 cybercrime threat report

    In this 2019 Webroot Threat Report, it details the threat activity throughout 2018, and compares the data with that from years past. Tap into the report to get insights on how you can combat cybercrime today and in the future.

    Download

  • How to detect and secure your most valuable data wherever it resides

    The explosion of data and complexity of regulatory governance have made data protection a moving target. In this white paper, learn how TITUS and Dataguise bring together the most comprehensive approach to data protection to enable you to intelligently detect and secure your most valuable data wherever it resides.

    Download

  • Evolution of collaboration: Insight from Dropbox, Slack, and Asana experts

    In this webinar, glean insight into today's collaboration ecosystem with insight from Dropbox, Slack, and Asana industry experts. Learn about the evolution of collaboration, and get a firsthand look at how to optimize your current collaboration landscape.

    Download

  • Achieving real-time application-level visibility

    Download the EMA report, "Understanding the Value of Application-Aware Network Operations" to learn about the benefits true application visibility could have on your day-to-day operations.

    Download

  • Data loss protection through one simple, highly automated workflow

    Insider threats are the fastest growing risk your organization faces, with insider threats growing more than 50% over the last four years and now accounting for nearly half of all data loss incidents. Discover the risks, problems, solutions and more in this Insider Threat Buyers Guide by Code42.

    Download

  • Logging tips that can help save money and enhance security

    Logging and monitoring all relevant events from across the IT environment has ups and downs. Download this white paper for logging tips that can help save money and enhance security at your organization.

    Download

  • How to automate workflows and build powerful business processes

    Many companies predict that it could take up to 3 to 5 years to improve their business processes significantly with automation – and that's simply too long in a world as face-paced as this one. Discover how to accelerate business process automation with a platform that provides integrated LOB systems, flexible process models, and more.

    Download

  • How to choose the right MVP (minimum viable product)

    Read this white paper to learn 5 things to help you choose the right MVP, and produce more of what your customers are looking for.

    Download

  • Unified endpoint management: The modern way to secure and manage your devices

    In this white paper find out how unified endpoint management can help your organization control and secure different devices across diverse platforms from a single console.

    Download

  • 3 keys to creating successful workplace mobility

    In 2019, employees and prospective employees place a huge emphasis on work flexibility; which means businesses need to accommodate, or else lose their recruiting appeal. Download this whitepaper to learn the 3 pillars of digital workspaces, that when met in conjunction, can create the productivity perks your workforce desires.

    Download

  • Empower mobile users with automated workflows and apps

    In this white paper, discover how IT departments and users alike can benefit from business process automation that simplifies the design and rollout of apps for an increasingly mobile workforce. Explore real-world scenarios that illustrate how a business application platform can modernize processes for the better.

    Download

  • Encryption key management: Explore different components

    In today's world, interactions are increasingly happening online which pose security risks when you need to share sensitive data, including encryption keys. In this white paper, learn about the different components of encryption key management, so that you know the right questions to ask when evaluating new and existing encryption technologies.

    Download

  • Challenges With Data Protection in the Cloud

    This expert e-guide from SearchSecurity.com will help you discover the ways you can ensure better protection for your cloud-hosted data. Inside, you'll find out the major challenges involved with cloud security, as well as tips for protecting your intellectual property.

    Download

  • BYOD 101: Combat the Phenomenon’s Top Challenges

    In this e-guide from SearchConsumerization.com, uncover how to implement and enforce policies to improve your BYOD initiatives. Get the answers to your most pressing BYOD questions and also learn how desktop virtualization and application streamlining can help combat BYOD security challenges.

    Download