Prevent Document Leakage with Document DRM
Using Document DRM to stop document leakage & control use
Information leakage is thought to be one of the most pressing problems for government and industry today. The enemy is within more often than we like to think. Although the case of Snowden has been probably the most widely publicised example of an employee being able to walk out of the door with the secrets of their employers, the problem exists across all organizations, whether commercial or governmental.
Although IT departments make great efforts to prevent sensitive information leaving the organization by such methods as scanning email and attachments for information, the fight to control Bring Your Own Devices (BYOD) such as intelligent mobile phones and tablets that can synchronise directly with corporate folders and email, is already lost. Users can seamlessly link to the corporate network by phone, café or hotspot, regardless of who else they may be connected to. And when they leave for the day, or leave the job, all the files they have been using go with them.
Ordinary access controls do not solve these problems because the files are on their storage and can be copied and passed on. So they can give them to anyone else, modify them and they still look authentic, and sell them to the highest bidder.
However, document DRM can provide many of the answers to solve these problems.
Locklizard DRM controls include the ability to suspend or cease the user’s access at any time. Controlled documents are encrypted unless they are being read in memory, so it is impossible to edit them or give an uncontrolled copy to somebody else. Other features allow logging when documents are used or printed, and document expiry controls ensure end dates or the number of uses cannot be exceeded.
You can limit what devices users can use (i.e. Windows only) and specify an IP address or range of IP addresses that the device must be using before documents can be accessed. And if an employee leaves or you suspect suspicious activity then you can instantly revoke user access to your protected documents. You can therefore effectively reduce potential exposure through BYOD devices that are used in the workplace because controlled files will not open except at work.