-
Section 30.1, Why Security?
-
Section 30.2, Out of the Box, Filr Is Locked Down
-
Section 30.3, Securing the Filr Data
-
Section 30.4, Securing the Filr Site
-
Section 30.5, Securing Filr Data on Mobile Devices
-
Section 30.6, Securing the Filr Desktop Application
-
Section 30.7, Certificates
-
Section 30.8, Sharing
-
Section 30.9, Comments
-
Section 30.10, LDAP-Provisioned Users and Local Users
-
Section 30.11, External Users and OpenID
-
Section 30.12, Proxy Users
-
Section 30.13, File Servers
-
Section 30.14, Audit Trail
-
Section 30.15, Simplified Rights Model
-
Section 30.16, Antivirus
-
Section 30.17, Backup and Restore
-
Section 30.18, NESSUS Scans
-
Section 30.19, Coverity
-
Section 30.20, Encryption