content security protection

Content Security & Protection

Digital Content Security & Content Protection

  Free Trial & Demo

“Fantastic product… outstanding support.”

“We would recommend Locklizard to others”

“The clear leader for PDF DRM protection”

“Our ebook sales have gone through the roof”

“Simple & secure – protects IPR from theft”

Trusted by:

   Securing and protecting digital content


Content protection and content security are closely related topics.  Content protection is preventing availability or use of content by those not authorized.  Content security is preventing any user (authorized or not) from being able to alter content without detection.

   Digital content security technology

There are many ways to protect content. The main technologies in play today include encryption, digital signatures, JavaScript, and DRM. Often, some combination of these techniques is used.

JavaScript security

Some systems use restrictions, permissions, or JavaScript to secure content; however, there are often easy ways to bypass these controls.  Some software developers provide free JavaScript scripts to control PDF expiry, but they can be disabled by turning off JavaScript in the PDF Reader.

Encryption

Typically, AES encryption is used to scramble content so that only the intended user(s) may decrypt and use it.  This has advantages.  Today’s encryption systems are good, reliable, and fast.  Key management and distribution, however,  is rather less so. Human beings are not very good at security, particularly when they do not understand how it works, they see it as an inconvenience, or do not mind giving their credentials to others (much like they let other people use their credit cards).

Though encryption protects the digital content whilst it is winging its merry way around the internet, it doesn’t protect it from users who are authorized to view it, and this is not a good thing.  The authorized user can choose whether they want to continue the content protection or not. They can also modify the document at their leisure, which is often undesirable to the owner.

Continuing content protection can be achieved by using DRM or certificate mechanisms rather than just encryption.

Certificate encryption

Other methods to secure digital content generally also use cryptography, usually involving a digital signature.  This involves selecting the content to protect and then running a one-way digest, a mathematical algorithm that generates a unique numeric value for that content.  To check that the content has not changed, you run the digest again and compare the results.  If they are the same, you consider that the document is authentic – it comes from the identity claimed and has not been altered.

Unfortunately, in 2011, it came to light that fake identities had both been created and stolen, allowing serious hackers to impersonate valid organizations. Again, the question of potential weaknesses in key management and distribution has created problems for mechanisms relying on these identities.

Using DRM to secure and protect digital content

DRM allows the owner to protect content after it has arrived at an authorized user, so the content protection survives, rather than being replaced by whatever the recipient (a hacker, perhaps) arbitrarily decides.

DRM also provides methods to secure digital content.  Generally, secure content keys are well-managed because the DRM does its own key creation and distribution and does not rely on third parties. It does not fail to secure content because the third parties fail.  There are DRM methods using PKI, but they pass on the difficulties of management to the unskilled publisher, which is not very helpful, since hiring security specialists is expensive.

To summarize, content security and content protection can be achieved in a number of ways, but unless that is done using DRM technology, you will not secure content or protect content in ways that are actually valuable.

   Why Locklizard for document protection software?

Locklizard ensures your digital content cannot be copied or shared.

  • No Passwords

    There are no passwords or codes for users to enter, so they cannot be shared.  Keys are transparently and securely transferred to authorized devices and locked to those devices.

    Unlike secure deal rooms, users cannot share access information, and therefore your ‘protected’ documents with others.

    Having no passwords also solves the password  management headache – Locklizard securely and transparently delivers document keys to a secure keystore locked to each device.

  • Secure Distribution

    Full control over document distribution:

    • Protect documents on your local computer – no uploading of unprotected files to a server where they could be exposed to attack.  You retain full control over unprotected documents and ensure they can never be exposed to the wrong people.
    • Distribute secure documents just like any other file – upload them to a cloud server, your website, send by email or distribute on a USB, etc.
    • You are not forced to use yet another system where you have to manage user passwords or use a fixed document structure for displaying your protected documents – easily integrate protected documents with your existing systems and automate document protection and administration.
  • DRM Controls

    A wide range of digital rights management controls to ensure documents cannot be copied or shared and you retain full control over them at all times.

    • Block screenshots – stops users from taking high-quality screen grabs using screen grabbing tools.  Cloud-hosted secure dealing room systems CANNOT stop screen grabbing because they do not install any software on the client device.
    • Disable printing (or limit the number of prints).  If printing is allowed, then we automatically prevent printing to file drivers (e.g. PDF files)– this is NOT possible to prevent with cloud-hosted secure dealing room systems.
    • Expire documents after a number of days use, views, prints, or on a fixed date.
    • Revoke documents and user access instantly (regardless of where they are located).
    • Track how documents are used by whom and when – know who you are actually tracking compared to shared emails and IP addresses.
    • Allow offline use with full protection– no forcing of users to be online to view protected documents.
  • Device & location locking

    Control the devices and locations your protected documents can be accessed from.

    • Automatically locks document use to authorized devices to prevent sharing.
    • Control the number of devices for each user that your protected documents can be used on.

    • Lock use to locations to control where your protected documents can be used from (e.g. office only).  This enables you to easily control BYOD use since documents on a mobile device will be available for use in the office but not when taken home.
  • Dynamic Watermarks

    Add dynamic watermarks to viewed and/or printed pages.  Dynamic variables are replaced by user data at print/view time.

    You only have to protect a document once for all users rather than having to protect documents individually for each user in order to display unique user information (name, email, etc.).

  • Secure Viewers

    • Installed Viewers provide stronger security than cloud-based systems – no uncontrolled browser environment where users can easily circumvent security controls.

    • We don’t expose user’s systems to attack by forcing users to enable JavaScript or turn off security functionality in Adobe Acrobat or other applications.
    • We don’t use or allow plugins since they easily break and can be used to bypass security.

    • No decrypting of files on a server or use of temporary files – documents are decrypted locally by the Viewer in memory so they cannot be compromised.
    • Unlike slow browser environments, large and complex documents are displayed instantly with fast scrolling and search.

    • You can also publish documents securely for zero installation viewing on USB devices (totally offline) or viewing in a Browser.
    • DRM controls are always enforced for both online and offline documents regardless of their location.

  • Simple to use

    Our document security software is simple to use – secure documents by right clicking on them in Windows Explorer.

    You only have to protect a document once for all users to control individual expiry access etc.

    Manage users and document access via our web-based administration system.

    Automate document protection, and automate administration (user management and document access) with our command line and API tools.

    Once users have clicked on a link to activate their license they don’t need to do anything else (i.e. enter a password, login, etc.) to open documents that they have been authorized to view.

  • Cost Savings

    Perpetual licenses save thousands – 3 year use would be a $11,800 saving compared to a $500 monthly fee.

    Host on premise in your own environment or use our ready-to-go AWS hosted systems.

   Download content security protection software

Download content security software with digital rights management (DRM) controls that protects content from being copied and shared.  Prevent unathorized use and misuse of your content by controlling what users can view your content, what they can do with it (copy, print, etc.) and when it can no longer be viewed (expire).  DRM content security software that ensures the security and use of your content.

   FAQs

What is a content security policy?

Content security policy is (CSP) is a HTTP response header standard supported by most modern web browsers. It’s designed to enhance security by preventing many cross-site scripting (XSS), clickjacking, and other injection attacks. Web admins can use it to define rules on which sources are allowed to read and execute on their pages.

Will a content security policy protect my documents from misuse?

No. Though the name may cause some confusion, CSP is there to prevent attacks on the user, not protect you from a user trying to share or misuse their content. CSP cannot prevent users from downloading, copying, distributing, or screenshotting your content, and it does not provide document-level DRM or encryption.

What are the key features to look for in content security software?

The ability to protect content in transit, at rest, and in use, including preventing screenshots, printing, saving, and editing. You should also look for software that does not use passwords and does make encryption keys visible to the user so that they cannot share them

What industries benefit most from using content security software?

Most industries can benefit from content security software, but the main ones regarding documents are training & education, reports & market analyses, legal, healthcare, finance, engineering, publishing, and government.

Customer Testimonials