Locklizard Enterprise Rights Management
Locklizard have taken a simplified approach to protecting confidential and sensitive documents that requires less management overhead and protects information and its use throughout its life cycle.
There are no policies, public key, or directory systems to configure. You apply document controls (such as stopping printing, expiry, etc.) when documents are protected using a simple tabbed interface and assign user access via a simple to use administration system. All key management is handled by the system and there are no insecure passwords or plugins. A wide variety of document controls can be implemented and changed on-the-fly for individual users. For example, you can protect a document with zero prints (so no one can print it) and then enable individual users to print it. Similarly, you can set a document to expire on a specific date, but change this date for specific users. The key document controls – stopping sharing, copying, editing, printing, etc. – remain part of the document and are always enforced regardless of where your documents are located.
Locklizard locks the use of confidential and sensitive documents to authorized user’s devices and you can further prevent use outside authorized locations (e.g. the office). This enables you to easily protect confidential documents in the workplace, controlling the use of sensitive and confidential documents on BYOD where they could potentially be used by others in locations not under your control. By locking document use to machines and locations, Locklizard ensures your confidential not for distribution documents are tightly controlled.
If you want to allow users to print confidential documents then you can add dynamic watermarks with user identifiable information that are applied to printed copies. This helps discourages users from sharing printouts with others.
Locklizard enables you to share sensitive and confidential documents securely with third parties and to protect confidential documents from disclosure. You have full control over document access and use at all times. You can track and log document use and instantly revoke access when required.