Access "Digital Rights Management: SealedMedia's Enterprise DRM 5.0"
This article is part of the November 2006 issue of Symantec 2.0: Evaluating their recent acquisitions
DIGITAL RIGHTS MANAGEMENT Enterprise Digital Rights Management 5.0 REVIEWED BY MIKE CHAPPLE SealedMedia Price: Starts at $50,000 for the core system with $50-$200 per-user license fees @exb @exe Digital rights management is a hot issue. Proliferation of portable media, mobile computers and ubiquitous network access poses substantial risk to proprietary information. SealedMedia's E-DRM offers a flexible, scalable approach to solving this problem, combining an intuitive administrative interface with a mostly transparent user agent. Policy Control A E-DRM's granular policy controls are impressive. In addition to the privileges you'd expect, such as open, print, copy and edit, E-DRM allows you to control the use of formulas, force change tracking and limit the ability of users to annotate documents, among other rights. Content owners may specify the duration of offline licenses as well to protect content on devices—typically laptops—that may be lost, stolen, or kept by former employees. The core system, as shipped, allows you to protect commonly used content ... Access >>>
Premium Content for Free.
New business opportunities feed appetite for managed VPN services
Neil Roiter explores secure remote access possibilities.
- Viewpoint: Three cheers for free and open source software
- Events: Information security conferences for November 2006
SPI Dynamics' WebInspect 6.1 Product Review
Defend against Web application attacks and improve security. Learn about SPI Dynamics' WebInspect 6.1 product installation, configuration and reporting.
Security information management review: Network Intelligence's enVision
A review of SIM product: Network Intelligence's enVision
Recent Releases: Security product briefs, November 2006
Read about security products released in November 2006.
Consul Risk Management's InSight Suite v7
Business Survival 101: How to Perform a Business Impact Analysis
by Ed Moyle, Contributor
A business impact analysis can be a manual that helps your company weather disasters.
by Dennis Fisher
John Thompson and Symantec are staking their claim as one of Silicon Valley's leading innovators. Will they succeed?
- New business opportunities feed appetite for managed VPN services
Intrusion Detection: Arbor Networks' Peakflow X 3.6
Arbor Networks' Peakflow X 3.6
Digital Rights Management: SealedMedia's Enterprise DRM 5.0
SealedMedia's Enterprise Digital Rights Management 5.0
More Than Meets the Eye
You may think you're guarding your assets, but malicious insiders are using steganography to slip closely guarded company secrets out of your organization.
Voltage SecureMail Desktop product review
Product review of Voltage Security SecureMail Desktop email encryption security tool pricing, cost, setup, configuration and password policy features.
Symantec unveils Security 2.0 initiative
by Bill Brenner, Senior News Writer
As part of Security 2.0, Symantec unveiled new products and partnerships with VeriSign and Accenture to help customers secure their databases, manage risk and fight ID theft.
Security Service Provider Product Review: MessageLabs, Postini
Get the latest news on managed security service providers MessageLabs and Postini products. Pricing information, URL filtering, malware protection and other features are discussed.
Secure Reads: The Security Risk Assessment Handbook
Read a quick review of The Security Risk Assessment Handbook.
Optical network security: Inside a fiber-optic hack
Fiber-optic networks aren't hack-proof: A savvy attacker can crack them with ease.
- Intrusion Detection: Arbor Networks' Peakflow X 3.6
Editor's Desk: The ultimate insider threat
Walk the Line
Perspectives: Pandemic planning for remote access
Shared infrastructure, such as power and water, must be operating, otherwise, enterprise business continuity plans in the event of a pandemic are useless.
Ping: Avi Rubin
Face-Off: Schneier, Ranum debate security regulations
Do federal security regulations help?
- Editor's Desk: The ultimate insider threat
More Premium Content Accessible For Free
Enterprises leverage open source software for the perceived quality of the code, but the Heartbleed flaw has made many question their use of ...
The network of today's enterprise is larger and more diverse than ever, which means there's more for hackers to attack. So as enterprises update ...
In the rush to capitalize on big data, many companies forget that developing an ecosystem of structured and unstructured data means higher risk of ...