Locklizard
  • Products
    • DRM software
      • Safeguard PDF Security
      • Safeguard Enterprise
      • DRM Software Features
        • Restrict PDF use
        • Watermark PDF
        • Expire PDF
        • Revoke PDF
        • Disable Print
        • Track PDF
    • Secure PDF Viewers
      • Viewer Overview
      • Viewer Demo
      • Web Viewer
      • USB Viewer
    • Add-ons
      • All Add-ons
      • Web Publisher
      • Safeguard Portable USB
      • Ecommerce API
      • Command Line
      • Own Branding
      • Custom Email
    • Purchase & Pricing
    • Book a Demo
  • Solutions
    • Industry sectors
      • All Industries
      • Auctions
      • Engineering
      • Government
      • Healthcare
      • Libraries
      • Mergers & Acquisitions
      • Publishing Ebooks
      • Publishing Media
      • Publishing Standards
      • Membership Associations
      • Reports & Analysis
      • Tax Advisors
      • Training & Education
    • Vertical sectors
      • All Sectors
      • Board Documents
      • Internal Company Use
      • Large Publishers
      • Small Publishers
    • Business processes
      • Processes Overview
      • Secure Document Sharing
      • Sell Documents Securely
      • Document Retention
      • Prevent Document Leakage
      • Internal Document Control
      • Regulatory Compliance
      • Secure PDF Forms
      • Secure Data Rooms
      • Data Room Security
      • Application Integration
    • Business benefits
    • Regulatory compliance
      • Compliance Overview
      • NIST & DFAR Compliance
  • Downloads
    • Free 15 day trial
    • Viewers
      • Windows Viewer
      • Mac Viewer
      • iOS Viewer
      • Android Viewer
    • Writers
    • Manuals
  • Support
    • Support
    • FAQs
    • Guides
    • Videos
    • White papers
  • About Us
    • Contact us
    • Our customers
      • Customer Overiew
      • Case Studies
      • Testimonials
    • Our technology
      • What is DRM?
    • Blog
    • Why Locklizard?
      • Competitors
      • PDF DRM protection
      • Password protect PDF
      • Product Awards
  • Click to open the search input field Click to open the search input field Search
  • Menu Menu

Protecting & viewing multiple file types / document formats with DRM

in Blog, Document Security, DRM

Are native applications an advantage for DRM protected documents?

There are many DRM confidential content control systems available that appear, at least from the literature of their suppliers, to be able to apply DRM content control to many different types of files.

Here it seems we need to give some careful thought as to exactly what claims are being made (for Europeans consider examining the UK Brexit claims before and after the poll?).  Rather like the politicians, it seems to depends on exactly what you mean by applying control(s).  To be explicit we are talking here about access to content and nothing else.  Now if we take the argument that we are just protecting content, then it follows that there are the following distinct ways of protecting multiple file types when adding DRM controls to data content:

  1. Produce several custom viewing applications, one for each file type, so that the feature/functionality/processing is reproduced and the recipient experience is maintained as if they were using the original file type application (if you want to process an .xlsx file reproduce the whole functionality of Microsoft Excel);
  2. Convert different document types into a meta-form (flash has been very popular, as has PDF) but prevent any further altering of the original because you are not reproducing all the functionality of the original application;
  3. Stick a plug-in (or as some say add-in) in the application and be very careful it can’t be hacked or messed up following an application update.  And good luck.  Plug-ins are notorious for causing security issues and breaking, especially when applications are updated by the original product manufacturer.

Method 1 is very elegant but it is also very expensive.  Designing the functionality of Excel is a non-trivial undertaking, as Microsoft would confirm (even when they hid a complete copy of flight simulator in the code).

If you try enveloping the file and releasing it back to the normal application the real problem is created by the presence of a lot of code capable of carrying out actions (such as Save, Copy, Print) that you are trying to control.  And all the attacker wants to do is get hold of those commands and the security has gone.  So if your Viewer is trying to stop access to functions that are there, the attacker has something obvious to aim at.

Method 2 is the most reliable.  There are several reasons why.  You can get Systems Development Kits (SDKs) for rendering popular file formats to screen, and they allow a Viewer developer to constrain the functionality that is exposed, and how it is exposed.  So exposing undesirable functionality can be more readily avoided.  And the other great problem, the habit of applications to make disk copies locally for speed of processing, can be avoided because the Viewer provider, and not the subject application, is in control of processing and is able to avoid known security weaknesses, but only because they have taken control.

Method 3 is potentially the worst option.  You may be compromising the security of the application and face a stream of annoyed users as and when a product update stops it from working and users viewing your DRM protected documents.  Plug-ins or add-ins may be attacked directly because many products allow for developer type operation, a mode that allows an attacker to ‘see’ the code he is trying to defeat.  And all the original functionality (save, print, etc.) is accessible in the underlying code which the plugin tries to prevent the user from accessing.

But when it comes to it, if none of the methods offer editing capability then what advantages do you get from using the native application?

Well the answer is none – you are actually at a disadvantage.  The native applications have all the functionality available to defeat the controls you might want to apply.  And more widely used file formats such as the ubiquitous PDF for example can be viewed on Linux, Mac and mobile operating systems, which cannot be said for Microsoft Office files using ODF (older formats can be processed just fine).  So using a native application will actually limit who can use your protected documents.

So if you think that you are looking at systems that claim to protect multiple file types, be sure to check out what functionality is available with the protected files.  Likely you will find that what is really meant is several different file formats can be converted to a specific secured format for presentation to the recipient, and not for editing at all – defeating the whole purpose of supporting multiple file types (users expect to have the functionality of the native application available).

Do not confuse DRM controls with network access controls, commonly used by network management and operating system tools.  These are often limited to basic access controls  Read, Write, Append, Delete, Execute.  These may well function adequately for internal document collaboration but do not cut it when documents have to go outside of the domain of control of the originator.  For that you need custom viewing applications and a format that gives a reliable rendering of content to screen.

Tags: document drm, document security, drm, multiple document formats, multiple file types
Share this entry
  • Share on Facebook
  • Share on X
  • Share on WhatsApp
  • Share on Pinterest
  • Share on LinkedIn
  • Share on Tumblr
  • Share on Reddit
  • Share by Mail

Free Trial

“Fantastic product… outstanding support.”

“We would recommend Locklizard to others”

“The clear leader for PDF DRM protection”

“Our ebook sales have gone through the roof”

“Simple & secure – protects IPR from theft”

Trusted by:

Protect IPR

See why thousands of companies use Locklizard to safeguard their documents and increase revenue streams.

  • Our Customers
  • Customer Testimonials
  • Customer Case Studies
  • Locklizard vs Competitors

Latest Posts

  • Cloud Document Collaboration & Document SecurityFebruary 18, 2025 - 10:22 am
  • Stopping Screen Sharing & Recording of DocumentsJanuary 30, 2025 - 10:58 pm
  • ISO 9001 and Document SecurityJanuary 8, 2025 - 9:02 pm
  • How to expire links for file sharing and downloadsDecember 17, 2024 - 10:14 pm
  • Digital Libraries, Controlled Digital Lending & eBook DRMNovember 30, 2024 - 4:19 pm
PDF DRM Features
  • Protect PDF files
  • Stop PDF sharing
  • Stop PDF copying
  • Restrict PDF editing
  • Add PDF watermarks
  • Disable PDF printing
  • Stop screenshots
  • Expire PDF files
  • Revoke PDF files
  • Lock PDF to devices
  • Lock PDF to IP
  • Track PDF opens

How To Guides

How to stop sharing screen
How to expire download links
How to sell study notes
How to print to PDF
How to protect Autocad files
How to protect a document
How to unlock a protected PDF
How to expire Excel files
How to watermark in Excel
How to protect Excel files
Save a Google Doc as PDF
How to share a PDF online
How to insert PDF into Word
How to edit a protected PDF
How to convert ePub to PDF
How to prevent PDF download
How to share Google Docs
How to prevent PDF download
Enforce do not copy distribute
Share sell PDF in WordPress
How to remove a watermark
How to add security to PDF
Publish digital publications
How to share a PDF as a link
How to timestamp a PDF
Insert PDF into Google Doc
How to convert Word to PDF
How to convert PDF to Word
Share securely in SharePoint
How to encrypt email in Gmail
How to encrypt PDF files
How to recall unsend an email
How to watermark PowerPoint
How to lock a Word document
How to santize PDF files
How to lock a Google doc
Prevent PDF security removal
Protect Word without password
Add a dynamic watermark
Password protect Google Doc
Add a watermark in Word
Make a PDF non editable
How to create a stamped PDF
How to prevent ebook piracy
Password protect a Word doc
How to protect a PDF securely
How to revoke document access
Change PDF security settings
How to disable printing of PDFs
Sell online courses securely
How to add security to a PDF
Encrypt a PDF without Acrobat
Share documents securely
How to prevent PDF sharing
Protect confidential documents
How to publish ebooks securely
How to restrict PDF editing
How to password protect a PDF
How to protect ebooks
How to sell Reports securely
How to make a PDF read only
How to send a PDF securely
How to watermark a PDF
How to lock a PDF from editing
How to encrypt a PDF
How to make a PDF expire
How to password protect a PDF
How to protect online courses
How to email a PDF securely

Try Safeguard today

Start protecting your PDF files and documents from sharing & piracy

PRODUCTS

DRM Software
Safeguard
Safeguard Enterprise

Add-ons

  • eCommerce API
  • Command Line
  • USB Protect
  • Web Publisher
  • Own Branding
  • Custom Email

Secure PDF Viewers

  • Web Viewer
  • USB Viewer

SECURITY FEATURES

Stop copying, editing, saving
Disable PDF Prints
Block Screenshots
Disable Copy Paste
Dynamic Watermarks
Expiry & Self Destruct
Revoke Documents
Device Locking
Location Locking
Track PDF Use

PRICING

Purchase & Pricing

RESOURCES

FAQs
Locklizard Blog
Knowledgebase
Security Guides
White Papers
Viewer Demo
Videos

DOWNLOADS

Secure Viewers

  • Windows
  • Mac OS X
  • iOS
  • Android

Writers
Product Manuals
FREE Trial

DOCUMENT SECURITY

Share Documents Securely
Protect Online Courses
Stop Ebook Piracy
Document Encryption
Secure PDF Distribution
Protect Confidential Documents
Ebook DRM

Protect PDF Files

  • PDF Copy Protection
  • Lock PDF files
  • Encrypt PDF
  • Secure PDF
  • PDF DRM

INDUSTRY SECTORS

Training & Elearning
Publishing Ebooks
Publishing Standards
Online Libraries
Membership Associations
Engineering
Government
Healthcare
Mergers & Acquisitions
Secure Reports From Theft

  ABOUT US

About Us

Our DRM Technology

  • What is DRM?

Customers

  • Case Studies
  • Testimonials

Locklizard vs Competitors

  • Secure Data Rooms

Company Brochure

  CONTACT

sales@locklizard.com
support@locklizard.com

Business Hours:
US: 8AM to 17.00PM EST
UK: 9AM to 17.30PM GMT

© Copyright 2004-2025 Locklizard Limited. All rights reserved.Privacy Policy|GDPR Policy|Cookie Policy|SITE MAP

Link to: Help – Safeguard Admin 4 – My Account Tab Link to: Help – Safeguard Admin 4 – My Account Tab Help – Safeguard Admin 4 – My Account TabLink to: Help – Safeguard Admin 4 – Customer Tab – Manage Details Link to: Help – Safeguard Admin 4 – Customer Tab – Manage Details Help – Safeguard Admin 4 – Customer Tab – Manage Details
Scroll to top Scroll to top Scroll to top