

This makes it easy to share edits to a document, but it also creates risks when anyone can add participants and edit documents beyond your control. Work tools like G-Suite, Office 365, Box, and Dropbox allows users to send documents, render in a browser or app, collaborate inline/online and store/share in public share drives.In addition, the recipient of your emails can always easily (features are available in any email client) print your communications with attached and verifiable timestamps with you having no visibility or control over these actions.Ĭan we collaborate on a document prepared in a word format, revise, and then store? With email, you only control retention on your end, the terms of storage on the receiver’s end are entirely out of your control, which creates unnecessary risks and uncertainty.Important to note, unlike email, if you set strict policy controls using Wickr - let’s say as 30-day retention - it in fact means that communication will be deleted with mathematical certainty from all devices that received or sent the communication.As retention is enabled through 3rd party archiving solution, customers are responsible for protecting retained communications outside of their Wickr network. For example, when a litigation hold is issued for specific users on a legal team, admins have an ability to quickly enforce a preservation policy for a specified period of time and a group of staff. For highly regulated industries and teams, Wickr Enterprise administrators (on-premise deployments and dedicated hosted environments) can leverage the compliance capability to enable archiving of specific types of communications on the network in a manner that is transparent to all participants.Wickr users can increase the protection of their messages and files by using the Burn On Read timer for particularly sensitive business information.Retention can be customized for different groups of users or teams (Security Groups) depending upon internal policies and compliance requirements.In Wickr, administrators can enforce policies for message retention similar to email retention policies.What about enforcing strict retention policies and controls? For Wickr Me, finding users can be accomplished by searching for their Wickr Me username and adding to your contact list.For AWS Wickr, finding AWS Wickr contacts can be accomplished by searching for their email address and adding them to your contact list.From here, the app will show which of your contacts are on Wickr so you can communicate with them securely. When setting up your Wickr app for the first time, you’ll be prompted to allow the app to “Access Contacts”. With email you can import contact lists to connect to your existing contacts.I can easily connect with people using email, how easy is it to connect to Wickr users I want to communicate with?
#Wickr pro attachment size download
Once created (usually no more than 3 min), the network administrator sends emails inviting end users to download and activate their AWS Wickr apps on mobile or desktop.

For AWS Wickr- the enterprise product - a network administrator starts by setting up an administrator account.
#Wickr pro attachment size free

