How to Enable Two-Factor Authentication on Confidential Documents

This is the twelfth installment in our How-To series: an ongoing set of product posts full of tips and tricks for getting the most out of Vera.

Public. Restricted. Top Secret. You know the drill.

If you’re like most organizations, you have a similar schema to classify confidential data. But how do you add additional protections to your most sensitive content? And how do you make sure competitors can’t access your strategic plans if they do get their hands on them?

Leave a Reply

Your email address will not be published.