Many document management systems enable organizations to access their files and documents remotely.  It creates an environment in which workers can collaborate across locations while staying organized and maintaining secure control over critical intellectual property assets.

Secure access is paramount when managing confidential files, as proprietary drawings and documents are at risk of theft by nefarious criminals, competing organizations, and other bad actors.  Fortunately, there are several methodologies organizations can use to ensure their files and documents are safe and secure within the system and only accessible by permitted users.

Multifactor Authentication

Multifactor authentication (aka,. two-factor authentication) is a security technology that requires users to use multiple methods of authentication from several categories of credentials.  It utilizes a combination of factors, including passwords, biometric verification, or security tokens.

The most common form of multifactor authentication is Google’s 2-Step Verification, which provides users with a unique, time-sensitive password that changes every minute.  This requires users to have a security key, often provided on a user-specific device.

Multifactor authentication provides excellent protection against brute-force attacks, in which attackers try various passwords and usernames to eventually make their way into the system.  These attacks are often automated, allowing attackers to try thousands, if not millions, of password combinations to gain access to the system.

Limiting Login Attempts

As an additional measure, EDMS admins can limit the number of logins attempts from a single device. This further reduces the risk of a brute-force attack, as the attacker will have a limited number of chances to guess the password.  Combine this with additional two-step verification, and the attacker will have little to no opportunity to gain access to the system.

IP Whitelisting

Attackers from all over the world will often try to access the system, so organizations need to limit access to the system based on the geographic location of each user.  IP Whitelisting allows users from administrator-approved locations to gain access to the system while restricting people in unapproved locations from attempting to login to the system.

IP Whitelisting is an aspect of multifactor authentication, perfect for organizations that only want users to access the system from a specific geographic location.  It's great for in-office employees and companies that operate on a regional scale.

System Access Control

Since not all workers carry the same responsibilities, some workers need to be granted access to certain projects within the document management system, without having access to all the files within the system. Access control enables organizations to access files that are pertinent to their role, without granting them access to the remainder of the files within the system or to functionality related to files, such as downloading and printing.

With ImageSite, system administrators can define users based on their roles and responsibilities, and provide them with access to the specific projects, folders, or files.  Additionally, system admins can control access at the file metadata level, making it easier for them to provide access to files per role.

ImageSite and Engine-Box

ImageSite and Engine-Box (the Cloud version of ImageSite) are eQuorum’s robust workflow and document management solutions, created to help workers manage their essential workflows while maintaining complete control over their engineering files and documents.  Not only do they provide a secure collaboration site for workers, but they also help organizations manage document distribution with third parties like vendors, contractors, and customers.

Both systems are offered at a competitive price, enabling organizations to get a quick return on their investment by providing the features and functionality needed to help organizations improve efficiency, productivity, and collaboration.  Companies can choose from concurrent user subscriptions or named user subscriptions, ensuring organizations have subscription options that make sense for their business.

For more information about ImageSite and Engine-Box, visit www.eQuorum.com.