tag:blogger.com,1999:blog-4088979.post116113549770099623..comments2023-10-16T06:06:25.012-04:00Comments on TaoSecurity Blog: Enterprise Rights ManagementRichard Bejtlichhttp://www.blogger.com/profile/13512184196416665417noreply@blogger.comBlogger2125tag:blogger.com,1999:blog-4088979.post-1163549706993913672006-11-14T19:15:00.000-05:002006-11-14T19:15:00.000-05:00Richard, I'm glad to hear that the article resonat...Richard, I'm glad to hear that the article resonated with you. As one of the companies covered in the Secure Exchanges piece (<A HREF="http://informationsecurity.techtarget.com/magItem/0,291266,sid42_gci1219724_idx6,00.html" REL="nofollow">"Protective Coating"</A> - Page 6 of the online article), <A HREF="http://www.liquidmachines.com" REL="nofollow">Liquid Machines</A> agrees that security requirements are being narrowed down to the information itself and that ERM or <A HREF="http://www.liquidmachines.com" REL="nofollow">Enterprise Rights Management</A> is the model to get us there. <BR/><BR/>An interesting point to debate is what happens to original files when security is applied. Some products end up leaving the original behind unprotected when a new file type is created in order to apply the security. After all, if you're only protecting copies of information, your original files (and hence your sensitive data or intellectual property) remain as vulnerable as they were when you started. <BR/><BR/><A HREF="http://www.liquidmachines.com/content1063.html" REL="nofollow">Liquid Machines' Document Control ERM solution</A> applies a "policy" to the document itself, without changing the file type, eliminating the risk associated with leaving an original copy behind. <BR/><BR/>In the article, Fairfield Greenwich Group, a financial services company, chose Liquid Machines for its ease of use (see excerpt below) and the fact that the protection travels with the data - meaning if an authorized user copies any portions of a protected document, the target document will either have the same policy applied, or it won't be pasted. <BR/><BR/>Excerpt:<BR/><EM>After poring through IT magazines, he chose ERM software from Liquid Machines for its ease of use.</EM> <BR/><BR/><EM>Liquid Machines software installs a pull-down menu on Microsoft Office applications and Adobe Acrobat. If authors of documents feel they need to protect them with ERM, they click on the pull-down menu to set the policies.</EM><BR/><BR/>Using just three policies, Fairfield Greenwich was able to protect their most sensitive documents, helping them meet several regulations including requirements set by the Securities and Exchange Commission.Anonymousnoreply@blogger.comtag:blogger.com,1999:blog-4088979.post-1162241969475564112006-10-30T15:59:00.000-05:002006-10-30T15:59:00.000-05:00This comment has been removed by a blog administrator.Anonymousnoreply@blogger.com