Enterprise Digital Rights Management

The Need for Rights

Management Grows

Stats You Cannot Ignore

EXTERNAL COLLABORATION ESCALATES BREACHES

Checkpoint

Sensitive data is sent outside the organization every 49 minutes, every day

Checkpoint

In 25% of healthcare and insurance companies, HiPAA protected information was sent outside the organization

Verizon Report

Business partners are implicated in 32% of all data breaches

Websense

24% said the CEO’s confidential data had been breached within past 12 months

Kensington Report

7 million mobile devices are lost every day wordwide

Kensington Report

52% of stolen devices are from the office/workplace

SilverSky

68% of business users have sent an email to the wrong person by mistake

Ponemon Institute

35% of data breaches were due to human error

In an era where outsourcing, cloud computing, BYOD, file-sharing, and collaboration with external parties are normal methods of doing business, sensitive information is sent to third parties on a daily basis, often unprotected. As external collaboration increases, so does the organization’s exposure to the risk of data leakage. Every day, your employees share highly sensitive business information internally, as well as with numerous external collaborators. And while your organization’s success often depends on such collaboration activities, data leakage can easily occur since the information typically leaves your enterprise perimeter unprotected. Its likely you do not know what is happening to your information, particularly who is using (or misusing) the information after it leaves your organization. This is because once information is sent out, you have no control over who can access the information. To make things worse, data leakage can also be caused by your own employees accidentally, or sometimes maliciously. And all of this exposes your enterprise to serious risks: regulatory, legal, reputational, and financial. Consider the following common scenarios:

  • Accessing and downloading documents onto laptops and mobile devices, which, when lost, form the largest source of data breaches in the world
  • Sharing sensitive information with vendors, partners and other third parties, where it is at the highest risk of being stolen, sold, or lost
  • Your employees use cloud-based services (Dropbox, Google Drive, etc.) for sharing files, where the information is almost always stored in a different legal jurisdiction
  • Relying solely on NDA’s to secure your Intellectual Property (IP), even though NDAs don’t secure anything, remaining at best a weak deterrent

Your Information Security team spends a lot of time and money on Identity and Access Management systems for your enterprise systems (ERP, Core Banking, CRM, Data Warehouse, etc.). But what about access controls on the same information once it is extracted or downloaded from these systems? Gartner estimates that as much as 80% of an organization’s information assets exist in the form of such unstructured data: stand-alone files, reports, documents, spreadsheets, presentations, drawings and other important information.

How to Enable Collaboration Without Sacrificing Your Data Security: A New Approach

Since information (documents, spreadsheets, presentations, drawings, etc.) needs to leave the organization to support external collaboration and mobility, organizations need a new way to securely share information and optimize their own agility. Galantis, Inc. is an authorized business partner for Seclore FileSecure DRM technologies. Seclore FileSecure enables granular control of access rights for individual files, as illustrated below.

  • Who can open and use the file (people, groups)
  • What action they can perform on the file (view, print, edit, copy, forward, download)
  • When they can access the file (pre-set expirations or remotely revoked)
  • Where files can be accessed (by private and public IP addresses)

Galantis, Inc. can help your organization enable DRM systems – click here for more information.

Contact us
  1. (required)
  2. (valid email required)
  3. (required)
  4. (required)
  5. Product of interest


  6. (required)
 

How to Make ECM Systems Even Better

ECM (Enterprise Content Management) forms the bedrock of content management in today’s enterprise. However, not all of your information stays within your content management systems all the time. Users download countless files on their computers or mobile devices to view and work on them. They share them with other employees and to users outside your enterprise such as contractors, vendors and business partners. Your content management system leaves your information at risk once it has been downloaded. Seclore FileSecure Information Rights Management (IRM) solves this problem by integrating with your ECM system. Seclore FileSecure ‘sits at the gates’, monitoring every downloaded file and protecting it just before it leaves your content management system’s boundary. This ensures that your files remains as secure outside your content management system as they were inside it.

Seclore FileSecure offers pre-built connectors for: IBM FileNet, Microsoft SharePoint, EMC Documentum, and Newgen Omnidocs As an authorized business partner for both IBM FileNet and Seclore FileSecure technologies, Galantis, Inc. is uniquely well-qualified to assist your organization in enabling DRM in ECM applications. For more information, click here.