Support the Mission by Enabling External Collaboration

e-Share Blog

As companies transition from “no cloud” to “cloud-first” models, they quickly discover the “external sharing problem.”

e-Share - Timeline

It’s actually much more frustrating when it happens in “cloud first” environments, because sharing is a required consumer feature we all depend on. But sharing is more complicated in the enterprise. Core platforms like Office 365 and GSuite are designed to enable internal collaboration, but offer poor support for external users.

As a result, IT typically turns off these features. Or, if you own IT does not, the IT department at the companies your employees want to share with, typically blocks the incoming links. (There are so many good reasons for this.)

Teams disabled

Here’s the problem. Sharing and collaborating with external parties is an essential business activity. It’s required for partnerships, consultants, design firms … even auditing!

How else would you drive value via strategic outsourcing and/or the network effect? If you want your auditor to make sense of your financial reports, they’ll need to see them, at least. The problem is legacy sharing solutions don’t support external collaboration effectively. They likely require on-premises hardware and/or installation of software or plug-ins by recipients.

Employees who work with partners, strategic vendors, etc will find a way around these limitations if they have no other choice. They know they have to succeed in their mission to get ahead.

Do you want shadow IT taking hold in your organization??

e-Share - Devices

Companies, even large/regulated ones, can support the employee mission by enabling secure external collaboration in concert with existing cloud file storage (OneDrive, Dropbox, Google Drive, Box) and collaboration tools (O365, GSuite, Teams, Slack) by adding e-Share. Our enterprise-grade platform provides the essential elements for secure external collaboration, including:

  • Operating under your corporate domain, with your SSL certificate. Everything is verifiable, and unless a recipient is actively blocking your company, links and notifications will not be blocked. (Sharing from any of the cloud storage providers is likely already blocked, as they are notorious sources for phishing attacks.)

Please, register for a demo to see e-Share in action, and learn how you can deploy it for your organization in just a few days.

Be The Bridge, Not The Blocker With Link Sharing Protocols

e-Share Blog

A reflection from July 4th. When we are on vacation we make it our mission to get the most out of the time we spend away – with families, friends, even hobbies. Back at work, we are re-invigorated and attack the pile of work that inevitably awaits…

This is, as an excellent blog post noted last week, a time that brings “a certain amount of risk”.

Perhaps you have an email from a colleague linking to an article and asking you to take a look.

“If we were entirely rational beings, we’d compute the exact expected outcome of taking each risk in turn. It’d be an exhausting life, and one in which we wouldn’t get much done.”

Laptop typing Photo

So we don’t compute risk every second. This email is from a colleague. They clicked it first, right?

Do you click the link, or not? The reality is that there are two approaches in IT to dealing with this situation. The first is to block the link and protect the user. The second is to provide some sort of method for ad hoc sharing that requires a series of approvals, provisioning of hardware and/or software and/or accounts, and then getting the person on the receiving end to do the same.

So, what if the user trades in information for your company? For example – if they are in sales. They may need a favor from the colleague in the future. A tip. An introduction. A bit of information.

What if they have to read this article to complete their mission? The answer is that if IT offers nothing but prevention, they will turn to some other method. They’ll try to send it via GMail. Or Dropbox. Or This may be problematic.

The good news is that there is a far better way to support this user: deploy e-Share!

Here’s why:

e-Share diagram

1. e-Share’s cloud platform is fully integrated with O365. Your administration and security teams can use our self service platform to set policies that govern sharing. When the user needs to share with an unknown domain they can send an email and it and/or the attachments are automatically secured. Power users can choose from a range of fine-grained options that go way beyond read-only.

2. e-Share operates on your sub-domain, with your SSL certificate, and via single-sign on. Your employees will never see our URL or logo.

e-Share - Smart URL

3. You can train your users to look at URL domains. That’s a much simpler proposition than trying to explain phishing in all it’s glory.

Even if they make a mistake, with e-Share, the worst case scenario is a view-only share which they can immediately recall. Further, if they realize something was shared with the wrong person they can instantly terminate the link. (Even if they don’t, the link expires automatically after a few days.)

Learn about how leading companies use e-Share to drive cross-company collaboration and please, schedule a demo to see how it can help your company.