Adobe and IBM are partnering to secure digital documents.
The new cryptography capabilities within Adobe Acrobat 6.0 coupled with IBM's "embedded security subsystem" will boost security within documents created with Adobe Systems Inc.'s Acrobat software, the companies say. IBM's embedded security subsystem comes standard in recent IBM notebook and desktop PCs.
PDF document security will be created using digital signatures and document-access control using public key infrastructure, a form of cryptography.
Through PKI, users of the new technology can ensure that the sender is who he or she claims to be and that the content of the document hasn't been changed. For instance, the recipient of a contract created in Acrobat and digitally signed with digital credentials stored on IBM's security chip would have high assurance that the document was legitimate. Because the private security credentials remain secure on the chip, they're much more difficult for hackers to tamper with than digital certificates sitting open on a hard drive.
IT's Reputation: What the Data SaysInformationWeek's IT Perception Survey seeks to quantify how IT thinks it's doing versus how the business really views IT's performance in delivering services - and, more important, powering innovation. Our results suggest IT leaders should worry less about whether they're getting enough resources and more about the relationships they have with business unit peers.
What The Business Really Thinks Of IT: 3 Hard TruthsThey say perception is reality. If so, many in-house IT departments have reason to worry. InformationWeek's IT Perception Survey seeks to quantify how IT thinks it's doing versus how the business views IT's performance in delivering services - and, more important, powering innovation. The news isn't great.
InformationWeek Must Reads Oct. 21, 2014InformationWeek's new Must Reads is a compendium of our best recent coverage of digital strategy. Learn why you should learn to embrace DevOps, how to avoid roadblocks for digital projects, what the five steps to API management are, and more.