Securing documents in the cloud

Document security in the cloud.

Everyone knows the ubiquity of the cloud – a big empty space just waiting for you to fill it up with all sorts of goodies that you want to be able to share with the right friends or business partners, or customers, and who may well equally want to share their information with you. Read more

Which documents should be protected?

Defining sensitive documents to protect.

Surprisingly few organizations classify their information in order to help them protect it from unauthorized disclosure.  Usually improper disclosures get noticed when personal data are disclosed, and that can mean litigation involving a corporate authority and the public, and bags of adverse publicity. Read more

Revoke document access with DRM security

Document Revocation & Expiry.

Document revocation is an important step in the information architecture coming somewhere between security and disposal.  You can either revoke documents automatically using document expiry controls, or manually by suspending users, documents, or individual user access to specific document(s). Read more

Why lock documents to specific devices, countries, IPs?

Locking Documents for IPR control.

Although one of the primary requirements in PDF DRM (Digital Rights Management) is to identify the authorized user of a document, and make sure that only that person can use protected documents, it is relatively difficult to identify people, and although the IT industry has been working on improving the well out of date ID/Password combination, it is still in common use for flexibility of operation when better tools are available. Read more

Document Security Solutions – Encryption, DLP, ERM, IRM, DRM

Choosing the right Document Security.

Abraham Maslow said in 1966, “I suppose it is tempting, if the only tool you have is a hammer, to treat everything as if it were a nail.”  And that is disturbingly true for most of us – especially product manufacturers who want to sell the security silver bullet (aka snake oil) to cure all ills.

So if you want to ‘secure’ a document, immediately four types of security vendor will be extolling their virtues and wares: Data Leakage Prevention (DLP), Encryption, Digital Rights Management (DRM) and Enterprise Rights Management (ERM) or Information Rights Management (IRM). Read more