Sort results by: Published date | Company name
Showing items 1-6

Keep Users Happy by Integrating IT Operations and IT Support [ Source: BMC Software ]

August 2013- The popularity of bringing your own device to work (BYOD), and interactions with social media, users are expecting and demanding far more in terms of IT support. They want services to be available when and where they need them. They want to accomplish their tasks as quickly as possible. And, when they have problems, they expect IT to fix them right then and there. In short, they want a positive experience in all their interactions ...

Document Security Compliance: Managing Information Risk in the Extended Enterprise [ Source: Brainloop ]

October 2010- This white paper is authored by Michael Rasmussen of Corporate Integrity and examines how the distributed nature of working with confidential documents in any kind of collaborative setting, whether inside or outside the organization between employees, auditors, or vendor suppliers, poses a serious security risk. Traditional IT security tools cannot protect documents outside the firewall. Intellectual property, trade secrets, financial, and legal papers, customer lists and other highly sensitive data must be managed under a ...

Document Security - A Guide to Securing Your Documents [ Source: LockLizard ]

August 2007- When we talk about document security we can have many different ideas as to what security is actually wanted or needed, and what it is there to achieve. In this article we will look at the three principal approaches used today, how they rely upon each other and where they differ. The principal approaches are encryption, DRM and collaboration. This paper explains what components make up a document security solution and which one is right ...

Information Leakage: What it is, and how Digital Rights Management (DRM) can Prevent it [ Source: LockLizard ]

August 2008- This paper covers what information leakage is and why it has become so prevelant. It discusses why DRM (Digital Rights Management) is required to prevent information leakage from within and outside of the enterprise and why encryption and access control are only effective inside the enterprise.

Introduction to Digital Rights Management - DRM [ Source: LockLizard ]

August 2007- This paper covers the technology called Digital Rights Management or DRM, what it achieves and how this benefits your business. It covers the demand for DRM in the protection of intellectual property and the use of encryption and cryptography in protecting and controlling digital content. It compares DRM controls against IT controls, charging mechanisms, and the use of DRM in various industries. Most importantly it covers how DRM can be made to work for your ...

Distributed Digital Rights Management: The EduSource Approach to DRM [ Source: ODRL Initiative ]

January 2008- This paper describes the design and implementation of the Distributed Digital Rights Management (DDRM) system as undertaken by the eduSource project, a national network of learning object repositories built by a consortium of universities and other agencies in Canada. DDRM is foremost a system of rights expression, with transactions managed by a set of brokers acting on behalf of purchasers and providers. Rights are described using ODRL, contained in files managed by the provider broker, ...