Locklizard
  • Products
    • DRM software
      • Safeguard PDF Security
      • Safeguard Enterprise
      • DRM Software Features
        • Restrict PDF use
        • Watermark PDF
        • Expire PDF
        • Revoke PDF
        • Disable Print
        • Track PDF
    • Secure PDF Viewers
      • Viewer Overview
      • Viewer Demo
      • Web Viewer
      • USB Viewer
    • Add-ons
      • All Add-ons
      • Web Publisher
      • Safeguard Portable USB
      • Ecommerce API
      • Command Line
      • Own Branding
      • Custom Email
    • Purchase & Pricing
    • Book a Demo
  • Solutions
    • Industry sectors
      • All Industries
      • Auctions
      • Engineering
      • Government
      • Healthcare
      • Libraries
      • Mergers & Acquisitions
      • Publishing Ebooks
      • Publishing Media
      • Publishing Standards
      • Membership Associations
      • Reports & Analysis
      • Tax Advisors
      • Training & Education
    • Vertical sectors
      • All Sectors
      • Board Documents
      • Internal Company Use
      • Large Publishers
      • Small Publishers
    • Business processes
      • Processes Overview
      • Secure Document Sharing
      • Sell Documents Securely
      • Document Retention
      • Prevent Document Leakage
      • Internal Document Control
      • Regulatory Compliance
      • Secure PDF Forms
      • Secure Data Rooms
      • Data Room Security
      • Application Integration
    • Business benefits
    • Regulatory compliance
      • Compliance Overview
      • NIST & DFAR Compliance
  • Downloads
    • Free 15 day trial
    • Viewers
      • Windows Viewer
      • Mac Viewer
      • iOS Viewer
      • Android Viewer
    • Writers
    • Manuals
  • Support
    • Support
    • FAQs
    • Guides
    • Videos
    • White papers
  • About Us
    • Contact us
    • Our customers
      • Customer Overiew
      • Case Studies
      • Testimonials
    • Our technology
      • What is DRM?
    • Blog
    • Why Locklizard?
      • Competitors
      • PDF DRM protection
      • Password protect PDF
      • Product Awards
  • Click to open the search input field Click to open the search input field Search
  • Menu Menu

Document Encryption & DRM

in Blog, Document Security, DRM, PDF Security

Document DRM: Replacing Encryption as the Standard for Document Protection.

Encryption is used to protect files but does not control the distribution of information – once a user can decrypt a file they can do what they like with it.  DRM is better able to protect content from copying & redistribution.

Encryption is the tool we have used historically to protect information from getting into the wrong hands.  But changes in the use of information are forcing us to look at more sophisticated methods of controlling the distribution of information – Document Rights Management (DRM) in an age when copying and distributing vast amounts of information is a trivial exercise.

For many centuries encryption has been the tool of choice for protecting sensitive and confidential information – secrets.  The ancient Egyptians used encryption to protect military information as well as trade messages.  And the information was protected when being transferred or being at rest.

The limitations of encryption for information protection

Today the commonest use of encryption is the ubiquitous Secure Sockets Layer (SSL) used to protect information being transferred over the Internet.

And very successful it is, except that it only protects the information whilst it is travelling and not when it is at rest on a computer or server.

But the needs of government and industry have also changed, making new demands and requirements.  Encryption protected information from being disclosed to the unauthorised, and prevented forgery, but it did not stop the recipient from doing exactly what they wanted once they had decrypted the file.  Control of Intellectual Property (IP), distribution of trade secrets, transmission of personal data, managing technical know-how such as engineering design are just a few examples of information residing in documents that has to be protected.  And that can also include proof of validity and prevention of falsification.

These are not addressed by pure cryptography because it does not address questions about the identity of the user or what they are permitted to do with the content of the document.  These require additional controls that can circumscribe the ability of the authorised user to ignore desired controls and process the content in any way that suits them.

Document protection beyond encryption

It is not unreasonable to take the view that internal distribution of corporate information is subject to mistakes (people get the wrong mail, are on the wrong distribution list, think that others should be aware of some document content, think it would be interesting to compare with outside opinions, and so on) without worrying about deliberate attempts to steal information or pass it on to competitors or the press, which could be far more serious.  As we noted, document encryption on its own is poorly equipped to solve these issues because it was not designed to protect the content from further usage but rather the file containing the document(s).

The document DRM controls that are emerging as ‘standards’ required for modern document protection include restricting access by location, by date or time, by device rather than relying on user credentials, as well as preventing making non-DRM protected copies of protected documents.

Document DRM also addresses copying by other means with active controls to prevent unauthorized use of content:

  • stopping sharing by locking document use to only authorized devices
  • stopping Print Screen or screen grabbing
  • stopping editing
  • stopping copy and paste
  • stopping printing
  • ability to add dynamic watermarks that disclose the source of unauthorised activity

Microsoft have pointed out that pure encryption cannot enforce controls on its own.  If you choose to allow document reading on screen you expose a document to being photographed, and if you allow printing you cannot prevent photocopying.  But you can take steps to make these unattractive to the authorised user by adding watermarking.

Document DRM application integration

Generally adding these DRM controls requires proprietary architectures, because in the past the urgency to develop product and get to market has been more important than including specialist features that do not translate immediately into more product sales or higher performance.

Also, Document DRM applications must be resistant to tampering as a result of using system level debugging tools or not leaving uncontrolled temporary working files scattered around if the application does not close in an orderly manner, and not permitting caching in the system paging file.  These again are rarely the subject of interest in applications product development where application performance and speed of operation are essentials that must be achieved first.

It may seem strange, but it is almost impossible to reverse engineer security functionality into applications, because they simply were not designed to operate in a secure manner and using functions that are often portrayed (or considered) as detrimental to functionality and ease of operation.  Security is perceived to be a restriction on the system user to be able to do what they wish.

This can contribute some operational difficulties where management policy and standards (which will always include implementing systems that confirm to privacy regulations) insist on controls that limit access and authority over the document content.

Document DRM Security replacing encryption for document protection

Document DRM has been evolving steadily for a number of years now and products like Safeguard Enterprise incorporate the higher-level protection features, as well as including user licensing controls, document licensing controls and usage monitoring to complete the overall architecture.  Other security functions include methods of device authentication and automated cryptographic key management to avoid users having to grapple with highly technical complexities.

Document DRM functionalities have certainly replaced pure encryption as the standard for document protection.  However, they are still a long way from being a fully specified API with reliable hooks into wide ranges of applications.  Also, they have some way to go to trying to address the latest thinking in collaboration documents, where multiple authorised recipients are able to interact with a single document and Document DRM protection is applied on-the-fly.  In particular much investigation remains to be done addressing the requirement for ‘transitive trust’ where rights to change the Document DRM may be given by authorised users.  The current Document Digital Rights Management controls and functions are well established and the implementations reliable where they do not rely on integration into third party applications.

Tags: document drm, document encryption, document protection, document rights management, document security, encryption, information protection, protecting documents, protecting sensitive information, secure documents, share document securely, Share sensitive content securely
Share this entry
  • Share on Facebook
  • Share on X
  • Share on WhatsApp
  • Share on Pinterest
  • Share on LinkedIn
  • Share on Tumblr
  • Share on Reddit
  • Share by Mail

Free Trial

“Fantastic product… outstanding support.”

“We would recommend Locklizard to others”

“The clear leader for PDF DRM protection”

“Our ebook sales have gone through the roof”

“Simple & secure – protects IPR from theft”

Trusted by:

Protect IPR

See why thousands of companies use Locklizard to safeguard their documents and increase revenue streams.

  • Our Customers
  • Customer Testimonials
  • Customer Case Studies
  • Locklizard vs Competitors

Latest Posts

  • Cloud Document Collaboration & Document SecurityFebruary 18, 2025 - 10:22 am
  • Stopping Screen Sharing & Recording of DocumentsJanuary 30, 2025 - 10:58 pm
  • ISO 9001 and Document SecurityJanuary 8, 2025 - 9:02 pm
  • How to expire links for file sharing and downloadsDecember 17, 2024 - 10:14 pm
  • Digital Libraries, Controlled Digital Lending & eBook DRMNovember 30, 2024 - 4:19 pm
PDF DRM Features
  • Protect PDF files
  • Stop PDF sharing
  • Stop PDF copying
  • Restrict PDF editing
  • Add PDF watermarks
  • Disable PDF printing
  • Stop screenshots
  • Expire PDF files
  • Revoke PDF files
  • Lock PDF to devices
  • Lock PDF to IP
  • Track PDF opens

How To Guides

How to stop sharing screen
How to expire download links
How to sell study notes
How to print to PDF
How to protect Autocad files
How to protect a document
How to unlock a protected PDF
How to expire Excel files
How to watermark in Excel
How to protect Excel files
Save a Google Doc as PDF
How to share a PDF online
How to insert PDF into Word
How to edit a protected PDF
How to convert ePub to PDF
How to prevent PDF download
How to share Google Docs
How to prevent PDF download
Enforce do not copy distribute
Share sell PDF in WordPress
How to remove a watermark
How to add security to PDF
Publish digital publications
How to share a PDF as a link
How to timestamp a PDF
Insert PDF into Google Doc
How to convert Word to PDF
How to convert PDF to Word
Share securely in SharePoint
How to encrypt email in Gmail
How to encrypt PDF files
How to recall unsend an email
How to watermark PowerPoint
How to lock a Word document
How to santize PDF files
How to lock a Google doc
Prevent PDF security removal
Protect Word without password
Add a dynamic watermark
Password protect Google Doc
Add a watermark in Word
Make a PDF non editable
How to create a stamped PDF
How to prevent ebook piracy
Password protect a Word doc
How to protect a PDF securely
How to revoke document access
Change PDF security settings
How to disable printing of PDFs
Sell online courses securely
How to add security to a PDF
Encrypt a PDF without Acrobat
Share documents securely
How to prevent PDF sharing
Protect confidential documents
How to publish ebooks securely
How to restrict PDF editing
How to password protect a PDF
How to protect ebooks
How to sell Reports securely
How to make a PDF read only
How to send a PDF securely
How to watermark a PDF
How to lock a PDF from editing
How to encrypt a PDF
How to make a PDF expire
How to password protect a PDF
How to protect online courses
How to email a PDF securely

Try Safeguard today

Start protecting your PDF files and documents from sharing & piracy

PRODUCTS

DRM Software
Safeguard
Safeguard Enterprise

Add-ons

  • eCommerce API
  • Command Line
  • USB Protect
  • Web Publisher
  • Own Branding
  • Custom Email

Secure PDF Viewers

  • Web Viewer
  • USB Viewer

SECURITY FEATURES

Stop copying, editing, saving
Disable PDF Prints
Block Screenshots
Disable Copy Paste
Dynamic Watermarks
Expiry & Self Destruct
Revoke Documents
Device Locking
Location Locking
Track PDF Use

PRICING

Purchase & Pricing

RESOURCES

FAQs
Locklizard Blog
Knowledgebase
Security Guides
White Papers
Viewer Demo
Videos

DOWNLOADS

Secure Viewers

  • Windows
  • Mac OS X
  • iOS
  • Android

Writers
Product Manuals
FREE Trial

DOCUMENT SECURITY

Share Documents Securely
Protect Online Courses
Stop Ebook Piracy
Document Encryption
Secure PDF Distribution
Protect Confidential Documents
Ebook DRM

Protect PDF Files

  • PDF Copy Protection
  • Lock PDF files
  • Encrypt PDF
  • Secure PDF
  • PDF DRM

INDUSTRY SECTORS

Training & Elearning
Publishing Ebooks
Publishing Standards
Online Libraries
Membership Associations
Engineering
Government
Healthcare
Mergers & Acquisitions
Secure Reports From Theft

  ABOUT US

About Us

Our DRM Technology

  • What is DRM?

Customers

  • Case Studies
  • Testimonials

Locklizard vs Competitors

  • Secure Data Rooms

Company Brochure

  CONTACT

sales@locklizard.com
support@locklizard.com

Business Hours:
US: 8AM to 17.00PM EST
UK: 9AM to 17.30PM GMT

© Copyright 2004-2025 Locklizard Limited. All rights reserved.Privacy Policy|GDPR Policy|Cookie Policy|SITE MAP

Link to: Microsoft RMS Document Security Link to: Microsoft RMS Document Security Microsoft RMS Document SecurityLink to: Document DRM, DCMA & EUCD Link to: Document DRM, DCMA & EUCD Document DRM, DCMA & EUCD
Scroll to top Scroll to top Scroll to top