-
Section 32.1, Why Security?
-
Section 32.2, Out of the Box, Filr Is Locked Down
-
Section 32.3, Securing the Filr Data
-
Section 32.4, Securing the Filr Site
-
Section 32.5, Securing Filr Data on Mobile Devices
-
Section 32.6, Securing the Filr Desktop Application
-
Section 32.7, Certificates
-
Section 32.8, Sharing
-
Section 32.9, Comments
-
Section 32.10, LDAP-Provisioned Users and Local Users
-
Section 32.11, External Users and OpenID
-
Section 32.12, Proxy Users
-
Section 32.13, File Servers
-
Section 32.14, Audit Trail
-
Section 32.15, Simplified Rights Model
-
Section 32.16, Antivirus
-
Section 32.17, Backup and Restore
-
Section 32.18, NESSUS Scans
-
Section 32.19, Coverity
-
Section 32.20, Encryption