You've requested...

Share this with your colleagues:

Download this next:

Dropbox Business security features

Eager to invest in a collaboration platform but concerned about data security?

In this white paper, explore your collaboration platform options with Dropbox Business. Get an overview of Dropbox product features, and explore the security a Dropbox Business collaboration platform can offer your organization.

View now, and glean insight into an array of Dropbox security features, including:

  • Two-step verification
  • User provisioning and identity management tools
  • Remote wipe
  • Network control
  • And more

These are also closely related to: "What is Dropbox Business?"

  • Why Teams Use Dropbox Business with Microsoft Office 365

    Leading companies who use Microsoft Office 365 recognize the need for the mobile productivity and collaboration capabilities that Dropbox Business delivers. Read on to learn more about why teams use Dropbox Business with Microsoft Office 365.

  • 8 tips to streamline your workflow

    There’s no question that technology has revolutionized the way people work – mostly for the better. But in spite of these extraordinary shifts, there’s still a lot of “work about work.”

    View this e-book to uncover 8 tips to overcoming day-to-day workflow challenges with Dropbox.

    Read on to explore how Dropbox can help your organization:

    • Conquer large files
    • Work without wi-fi
    • Prevent version control mix-ups
    • And more

Find more content like what you just read:

  • CW Buyers Guide: Cloud Storage

    Computer Weekly looks at the variety of cloud storage options for the enterprise, their benefits and the potential security risks and opportunity costs they present.

    Download

  • How 8 organizations use Dropbox to collaborate

    The way modern enterprises work together is often a challenge, resulting in the need for new collaboration strategies and tools. In this report from IDC, explore the business value of Dropbox Business in supporting collaboration. Get an overview of Dropbox Business, and uncover the productivity benefits Dropbox can bring to your organization.

    Download

  • How to build a strong collaborative environment

    With this e-book, explore how collaboration operates as an essential part of your business. Discover the features of a strong collaboration environment, and learn how you can improve your workplace's collaboration culture with Dropbox.

    Download

  • Scale your business without losing speed

    81% of U.S. companies view the international component of their business as important and expect to increase activity in the next year, according to The Business Journal. Read this white paper for the pros and cons of international business expansion, and how to prepare for it.

    Download

  • Dropbox Smart Sync: Product Overview

    View this webinar to learn about Dropbox Smart Sync product features and benefits. Glean insight into Smart Sync from Dropbox Product Marketing Manager, Kevin Watt, and decide if Smart Sync is right for your organization.

    Download

  • Securing Data, Not Endpoints: The Best Way to Control Consumerization

    Discover why securing the data – rather than the endpoint – is the best way of controlling consumerization in your organization.

    Download

  • 7 common security mistakes when migrating to the cloud

    The speed of cloud migration is outpacing the speed of security team expansion. How do you keep up? Read on to learn how to prevent such a security regression when migrating to the cloud.

    Download

  • How to keep remote employees connected and engaged

    Find out how to connect your collaboration tools with a unified strategy centered around a modernized intranet, designed to keep mobile and remote employees in touch with their colleagues wherever their work takes them.

    Download

  • WAN Speak Musings – Volume I

    Analysts Clive Longbottom and Bob Tarzey discuss all things network related in this series of 12 short business focused articles.

    Download

  • 5 traits of intelligent information management

    Download this white paper to learn about the future of intelligent information management and find out how it enables businesses to manage information based on what it is, rather than where it is stored.

    Download

  • How to conquer the varying needs of your collaboration landscape

    In this white paper, explore how to foster an effective collaboration environment within your organization. Learn how to combine technology and strategy to form an effective collaborative environment, and glean insight into collaboration best practices.

    Download

  • 7 considerations for your next content collaboration platform

    Many organizations underestimate the complexity of their file sync and sharing needs. In this white paper, determine if your organization requires a more advanced file sharing solution, and decide if a content collaboration platform (CCP) is right for you. To learn more, download this white paper, and uncover 7 criteria for selecting your next CCP.

    Download

  • 7 guidelines for modern enterprise file sharing & content collaboration

    Learn about enterprise file sync and share (EFSS) platforms and find out how they have evolved into powerful tools that drive business operations and innovation.

    Download

  • How can you assess your cloud security needs?

    In this e-book, gain a stronger understanding of the 3 most prominent types of cloud services and the questions your organization should ask when building a network security platform.

    Download

  • Email threats: Explore how you can protect your organization

    When it comes to securing email and protecting against cyberattacks, most organizations focus their attention on inbound emails. Although this is a great start, not all attacks are from incoming emails. In this white paper, explore 4 email-related activities that employees often engage in that contribute to the spread of these insider threats.

    Download

  • Defining the datacentre needs of 21st century enterprises

    This guide is designed to provide IT leaders with some insight into how their peers are addressing current problems through the use of cloud and colocation, and shine a light on how the analyst community sees the role of the datacentre changing over time.

    Download

  • Integrate workflows - Focus less on operational and more on the customer

    Dropbox is a great way to streamline team communications and reduce time employees waste on the non-productive aspects of their position and, in combination with a platform like Salesforce, customer service can return as the primary focus. Watch this webcast for more information on how Dropbox and Salesforce work together to integrate workflows.

    Download

  • A Computer Weekly Buyer's Guide to Microsoft Office 365

    Microsoft Office used to be a simple thing. You'd buy a box of software, install Word, Excel, Outlook and PowerPoint – and that was it. But that all changed with the launch of Office 365. In this 13-page buyer's guide, Computer Weekly looks at Microsoft's subscription-based enterprise software offering.

    Download

  • Mobility Management Selection Guide

    This exclusive paper takes an in-depth look at the criteria you can use to select the optimal enterprise mobility management system that can meet your specific, fast-paced, and consistently changing requirements.

    Download

  • An analysis of SSL/TLS-based threats

    Organizations that are not inspecting all encrypted traffic are at increased risk of infiltration and infection that can spread and wreak havoc. Download this white paper to learn about a multilayer defense-in-depth strategy that can fully support SSL inspection and keep your enterprise secure from SSL threats.

    Download

  • Best practices for secure file sharing and content collaboration

    With this research from the Ponemon Institute, concerned IT users can glean expert insight to secure file sharing and content collaboration practices from over 1,000 IT and IT security practitioners around the globe. To learn how you can achieve secure file sharing and content collaboration success within your organization, download this document.

    Download

  • The Future of Desktop Virtualization, Chapter 4

    This expert resource discusses how bring your own device (BYOD) policies, when used in conjunction with virtual desktop infrastructure (VDI), can return control back to IT while reducing the administrative and management headaches commonly associated with user-owned devices in the enterprise.

    Download

  • 10 digital workspace best practices

    Employees now have more leeway in choosing the devices they use and the places they work from than ever before -- which translates to more responsibilities falling squarely on the shoulders of IT. To help embrace these new responsibilities, check out these ten IT best practices designed to empower the business via the digital workspace.

    Download

  • Addressing Data Security In The Cloud And Low Cost Large File Transfer

    The location of cloud storage can play a huge part in cost as well as security. Delivering large files from non-scrutinized locations can compromise sensitive data in more ways than not.

    Download

  • Presentation Transcript: BYOD: The Risks of Allowing Personal Mobile Devices On Corporate Networks and How to Mitigate Them

    Uncover why MDM and MAM are inefficient at solving the real problem mobile devices present to your network: traffic.

    Download

  • Collaboration: Insight from Dropbox, Slack, and Asana

    In this webinar, glean insight into today's collaboration ecosystem with insight from Dropbox, Slack, and Asana industry experts. Learn about the evolution of collaboration, and get a firsthand look at how to optimize your current collaboration landscape.

    Download

  • Microsoft vs. Dropbox vs. Axway: Content collaboration platform showdown

    View this Magic Quadrant from Gartner to compare and contrast content collaboration platforms (CCP) from vendors such as: Microsoft, Dropbox, Axway, and more.

    Download

  • How to automate workflows and build powerful business processes

    Many companies predict that it could take up to 3 to 5 years to improve their business processes significantly with automation – and that's simply too long in a world as face-paced as this one. Discover how to accelerate business process automation with a platform that provides integrated LOB systems, flexible process models, and more.

    Download

  • Research report: Explore key data loss prevention vendors

    This research report provides an analysis of the market for data loss prevention, revealing top players, trail blazers, specials and mature players. Data loss prevention solutions provide electronic data supervision and management to help organizations prevent non-compliant information sharing. In this research report, explore key vendors.

    Download

  • Challenges With Data Protection in the Cloud

    This expert e-guide from SearchSecurity.com will help you discover the ways you can ensure better protection for your cloud-hosted data. Inside, you'll find out the major challenges involved with cloud security, as well as tips for protecting your intellectual property.

    Download

  • Empower mobile users with automated workflows and apps

    In this white paper, discover how IT departments and users alike can benefit from business process automation that simplifies the design and rollout of apps for an increasingly mobile workforce. Explore real-world scenarios that illustrate how a business application platform can modernize processes for the better.

    Download

  • BYOD 101: Combat the Phenomenon’s Top Challenges

    In this e-guide from SearchConsumerization.com, uncover how to implement and enforce policies to improve your BYOD initiatives. Get the answers to your most pressing BYOD questions and also learn how desktop virtualization and application streamlining can help combat BYOD security challenges.

    Download

  • Vulnerability disclosure policies – Understand the basics

    Download this article to find out what a vulnerability disclosure policy (VDP) is, what's included in a good policy, which organizations have a VDP today, and which government agencies have published guidance on VDPs.

    Download

  • BYOD: An Opportunity for IT Evolution

    This E-Guide from SearchConsumerization.com details what BYOD and the Millennial generation can bring to your enterprise and explores why aligning business needs with the tools and technologies of BYOD can put your company one step ahead of the competition.

    Download

  • How to integrate hacker-powered security into your organization

    Leveraging the wisdom and power of the vast white-hat hacker community is a new security expectation. In this white paper, learn the best practices for starting and running effective disclosure and bug bounty programs, and how to integrate hacker-powered security into your organization.

    Download

  • Realizing automation with low-code BPM

    Discover how the synthesis of low-code and BPM is helping enterprises realize automation opportunities at lower cost, reduced risk, and with an incredibly efficient application delivery process.

    Download

  • Here is your 5-minute guide to cyber-consciousness

    Recent studies have pointed fingers at employees, often referring to them as the "weakest link" in cybersecurity. However, more often than not employees haven't received the proper training. Access your 5-minute guide to cyber-consciousness.

    Download

  • Content Collaboration and Processing in a Cloud and Mobile World

    This research from AIIM assesses the drivers for collaboration technology, the strategy choices being made, and the feature organisations are demanding.

    Download

  • Consumerisation and BYOD Purchasing Intentions Europe 2013

    This exclusive Computer Weekly/TechTarget research reveals European organisations plans for BYOD and Consumerisation of IT.

    Download

  • Intelligent info management: How can it give your company a competitive edge?

    Like most vertical markets, today's banks and financial institutions are dealing with the data deluge brought on by digital transformation. In this white paper, learn how intelligent information management (IIM) can help banks and financial institutions overcome the challenges of digital transformation, and give them a competitive edge.

    Download

  • Weighing the Options for an Enterprise Mobility Strategy

    In this E-Guide from SearchConsumerization.com, uncover the importance of an enterprise mobility strategy and learn more about the pros and cons of the top three options today: Mobile device management, mobile application management, and mobile information management.

    Download

  • Managing Mobility Beyond MDM

    This expert SearchConsumerization.com guide takes an in-depth look at mobile device management (MDM) integration and how it can help enable mobile access to enterprise applications and data, improving workforce productivity.

    Download

  • 8 ways to determine if cloud is right for your enterprise

    This e-guide recaps the key benefits of cloud storage and reveals eight points to address when getting started. Read on now to learn more.

    Download

  • Mobile Device Management: Fundamental steps for success

    This expert e-guide from SearchConsumerization.com will highlight a number of ways IT can prepare for the influx of mobile devices into the workplace and lay the foundation needed to successfully support mobility. Learn about setting up your network structure for mobility, fundamental features for success when choosing an MDM system, and more.

    Download

  • Mobile Device Data Protection: Key Findings and Players in the Market

    This E-Guide explores the risks associated with BYOD and quantifies the costs of a lost device, from both a cost and security standpoint.

    Download

  • Top security threats to your SaaS applications

    In today's rapidly evolving threat landscape, businesses require cybersecurity strategies that leverage capabilities delivered by a world-class SOC. Download this white paper to learn how you can establish a comprehensive security strategy for maximum protection.

    Download

  • The insider threat – solved with DRM

    Analysts Bob Tarzey and Bernt Østergaard look at the challenges faced by organisations when it comes to the insider threat and the protection of sensitive information.

    Download