IRM SECURE

Features And Benefits

  1. Support For Most Dominant File Formats

    IRM Secure FileSecure supports hundreds of file formats, including the most dominant enterprise document formats i.e.:

    • All MS-Office documents (doc., docx., xls., xlsx., ppt., pps., ppt.)
    • Open Office documents (odt., ods., odp., odf., odg.)
    • PDF
    • Text and Text based formats (txt., csv., xml., html.)
    • Images (Jpeg., BMP., TIFF., GIF., etc.)
    • ngineering design (dwg., dxf., dwf.)
  2. Compatibility With Existing Enterprise Server Infrastrcuture

    Support for most common database systems like Oracle / MS-SQL as well as web and application servers like Websphere, Weblogic and Apache reduces the management overhead and allows enterprises to have consistent infrastructure.

  3. Protect Documents Within And Outside Of The Enterprise

    Documents can be configured and used within an enterprise, as well as outside its physical boundaries (e.g. by customers, partners and mobile employees). No restrictions for valid document usage.

  4. Setting Specific Usage Permissions For Documents Control
    • Who (people, groups, teams …)
    • What (read, edit, print, distribute …)
    • When (dates, duration…)
    • Where (locations, IP addresses…) can use the documents. This granular usage policy definition allows setting very specific rights for each document as it flows within and outside of the enterprise.
  5. No Restrictions On Method Of Document Distribution

    Documents can be distributed through existing channels like email, CDs, File Shares, pen drives, FTP, etc. So no process change is required. In most cases, the need for a separate secure channel for distribution is removed by the use of IRM Secure FileSecure, thereby reducing overheads.

  6. Support For “Offline” Usage

    Users can be provided Offline usage permissions whereby the user has to open the document by connecting to the policy server, at least once, before he/she disconnects. From then on, the document will be available for the user on the machine that it was last accessed with connection to the Policy Server, without having to re-connect. This helps users who are traveling keep accessing documents without any hindrance.

  7. Prevention Of Screen Capture

    IRM Secure FileSecure prevents capture of information by screen grabbing through “Print Screen”, as well as screen capture tools like Snag-It, etc. It also prevents online screen sharing via online meeting software.

  8. Multiplicity Of Clients

    Documents can be protected from within the desktop, from the server or any other central repository of documents. This helps to adhere to organizational processes and aids in maintaining little or no change in current processes or user experience.

  9. Enhanced User Experience

    IRM Secure FileSecure’s ease of use helps in maintaining and enhancing end user experience while protecting documents and using protected documents. Simple but powerful features like using registered credentials for authenticating, allowing automatic protection of documents, using template-based document protection rights and a host of other features enable users to ensure persistent security without the hassles of lengthy procedures or long learning curves.

  10. Dynamic Rights Management

    Dynamic usage permission definitions means that document usage policies can be changed even long after document distribution and can constantly reflect business status and relationships, i.e. documents shared with vendors can be rendered useless once the project is over.

  11. Full Audit Of Authorized Activities & Unauthorized Attempts On The Document Within And Outside The Enterprise

    Central availability of the audit trail of all activities on the document ensures that deviations can be caught early on as well as compliance to regulatory frameworks (like SOX, HIPAA, Basel 2, etc.) are easy to be complied with. These activity logs can be configured in different formats which help to address various regulatory reporting requirements.

  12. Auditing Of All Administrator Activities With Maker-Checker

    Complete auditing of all activities of administrators can be obtained from the system. Critical administration activities can be concluded only after approvals before they are made applicable. This helps to adhere to organizational policies and reduces any risks of misuse.

  13. Template-Based Credentials

    Credential templates like “Board Communication”, or “Sales Plans” can be defined, thereby reducing the need for end users to make policy decisions. Also, individual users can create and maintain their own pre-defined templates. This helps in enhancing the user experience, reducing errors while providing and maintaining permissions on multiple documents at a time.

  14. Manual And Automated Protection Of Documents

    Documents can be protected manually on user desktops, as well as automatically within servers. IRM Secure FileSecure ensures that permissions provided to parent folders are available to be inherited by child folders while providing an option to maintain different permissions too.

  15. Web Based Administration

    Administrative functions like user rights management, compliance reports, etc. can be performed using a web-based interface.

  16. LDAP Integration

    Out-of-the-box support for LDAP systems, like Active Directory, enables speedy deployment and removes the need for maintaining multiple user repositories.

  17. Integration With Other User Repositories

    Easy integration with non-LDAP based user repositories enables simultaneous multiple user authentication mechanisms. E.g. authentication of internal employees via LDAP, and Customers via CRM system helps in re-using the existing infrastructure and provides ease of user management.

  18. Integration With Enterprise Systems

    Possibility of integration with existing enterprise systems enables the generation of protected documents directly from within applications. API or Webservices-based integrations are possible with other systems, e.g. ERP, Workflow Management, Knowledge Management, DLP, Disk Encryption Software, etc., which help in providing end-to-end protection of sensitive data by using complementing technologies.

  19. Easy Installation

    Network based installers (MSI) enables speedy deployment of the technology over large networks and computers. Also, rapid installation and configuration of Policy Server helps in quick deployment.

  20. High Availability

    The Policy Server can be configured for high availability using hardware load balancers and high availability deployment of database and web server.

  21. Controlled Redistribution And Forwarding

    IRM Secure FileSecure enables providing “redistribution” rights to users such that the document can be forwarded to others by allowing only a subset of the permissions that the user has. This ensures that the owner of the document has full control even if he has provided forwarding or redistribution rights to someone else.