Respond to third-party file-sharing risks
How to remove domains access instantly with Tricent
With rising security incidents, compliance violations, compromised domains, etc. - the ability to mitigate risks and protect your shared files from unauthorized access is a lifesaver.
Problem
- Compromised domains
Your files are severely exposed if your partner gets compromised. You might have shared files containing Intellectual Property (IP), Personally Identifiable Information (PII), or sensitive information that could put your organization at risk. Not being able to deter the attack on your partner’s domain could result in the infiltration of your organizational data. - Discontinued partnerships
Vendors and close partners typically get access to very sensitive data like customer files, financial information, and business projects. When a collaboration ends, removing a partner’s privilege to your files is important to prevent possible data leaks, corruption, theft, etc. This is a compliance requirement (GDPR, CCPA, etc.) and a safety measure to avoid financial, operational, and reputational damages. - External stakeholder malpractice
Geopolitical risks, negligence, non-compliance, or anything else your external stakeholders do that doesn’t prioritize the safety of your files should be considered a risk. For example, security negligence amongst vendors makes them vulnerable to cyberattacks, ultimately putting your shared files at risk.
Solution
With Tricent, you get visibility of all domains with access to your organization’s files. In case of a breach, discontinued partnership, or any other vulnerability, you can instantly remove the entire domain’s access to your files in a few clicks.
Here’s how to do that as an admin:
Tricent designed for Google Workspace:
Go to Insights and Export.
Select Target domain in Show me. And My Organization in Owned by.
Click Search.
Search for the compromised domain.
Click Bulk unshare domain. This will take you to our bulk unsharing tool.
Tricent designed for Microsoft 365:
Go to Insights.
Select External domains and search for the compromised domain.
Select the domain and click Revoke external domain access.