Access your Pro+ Content below.
Enterprise digital rights management best practices
This article is part of the Information Security magazine issue of December 2011
Enterprise digital rights management is one of the most powerful data security tools in our arsenal, but it's also one of the most complex and difficult to integrate into workflows. Also called enterprise rights management and information rights management, it allows an organization to set granular, highly secure policies around who is able to read, change or share sensitive documents. Unlike many of our other data security tools, EDRM is embedded in our documents, and thus protects the data no matter where it moves. But this power comes with a cost—and not merely the pricetag. Such granularity can be difficult to configure, and such portability difficult to integrate into your environment. EDRM today also relies heavily on user interaction, which means workflow changes; and anytime you change the way a user performs their job you face serious adoption friction. As a result we often see enterprise digital rights management deployed at the workgroup level, where it is highly effective at protecting the most sensitive of documents...
Access this PRO+ Content for Free!
By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.
Features in this issue
Companies need to factor security risks and incidents in their financial disclosures, agency says.
As the relative security of passwords falters, are they destined for obscurity?
EDRM brings users into security more than any other tool. Are you ready?
Researcher tells a firsthand account of her experience as a member of the final security review team for Windows Vista.
Columns in this issue
Lawmakers continue to wrangle over creation of a national data breach notification standard.
If you’re going to lure topnotch talent, refine your skills.
Cloud computing needs security standards and widely adopted security practices in order to become a viable choice for the enterprise.