Access "Enterprise digital rights management best practices"
This article is part of the December 2011 issue of An insider look at the Windows Vista security review
Enterprise digital rights management is one of the most powerful data security tools in our arsenal, but it's also one of the most complex and difficult to integrate into workflows. Also called enterprise rights management and information rights management, it allows an organization to set granular, highly secure policies around who is able to read, change or share sensitive documents. Unlike many of our other data security tools, EDRM is embedded in our documents, and thus protects the data no matter where it moves. But this power comes with a cost—and not merely the pricetag. Such granularity can be difficult to configure, and such portability difficult to integrate into your environment. EDRM today also relies heavily on user interaction, which means workflow changes; and anytime you change the way a user performs their job you face serious adoption friction. As a result we often see enterprise digital rights management deployed at the workgroup level, where it is highly effective at protecting the most sensitive of documents. By following these best ... Access >>>
Premium Content for Free.
SEC guidance clarifies cybersecurity disclosure requirements
by Marcia Savage, Editor
Companies need to factor security risks and incidents in their financial disclosures, agency says.
Enterprise digital rights management best practices
by Rich Mogull
EDRM brings users into security more than any other tool. Are you ready?
- SEC guidance clarifies cybersecurity disclosure requirements by Marcia Savage, Editor
Alternatives to passwords: Replacing the ubiquitous authenticator
by Ron Condon, UK Bureau Chief
As the relative security of passwords falters, are they destined for obscurity?
Chris Paget on Vista final software security review
by Chris Paget, Contributor
Researcher tells a firsthand account of her experience as a member of the final security review team for Windows Vista.
- Alternatives to passwords: Replacing the ubiquitous authenticator by Ron Condon, UK Bureau Chief
The ongoing debate over a federal breach notification law
by Marcia Savage, Editor
Lawmakers continue to wrangle over creation of a national data breach notification standard.
Good information security leaders must be good security recruiters
by Lee Kushner and Mike Murray
If you’re going to lure topnotch talent, refine your skills.
The need for cloud computing security standards
by Amy Larsen DeCarlo, Contributor
Cloud computing needs security standards and widely adopted security practices in order to become a viable choice for the enterprise.
- The ongoing debate over a federal breach notification law by Marcia Savage, Editor
More Premium Content Accessible For Free
You can fight compliance or embrace it, but one way or the other, you can’t escape it. Increasingly, smart organizations are not just accepting ...
Antivirus and intrusion prevention aren’t the threat detection stalwarts they used to be. With mobile endpoints and new attack dynamics, enterprises ...
The world in which successful IAM programs must be implemented is increasingly complex, a mix of legacy on-premise IAM infrastructures, cloud-based ...