IRM Secure

 Information Rights Management (IRM) allows the limit-less exchange of information, both inside and outside companies. Protection can be changed remotely, thus conforming to your terms and conditions. This process ensures that information can be blocked or destroyed when the situation demands or changes.

What do IRM systems offer?

Protection

Protect. Your confidential documents (pictures, MS Office, PDF documents, videos, audios files etc. ) automatically or manually with a click of a mouse.

File Format

IRM programs support a variety of file formats. Microsoft, PDF, images and text formats are the standards of all providers. Of course e-mails, CAD drawings data and more can be protected. Most popular file extensions are supported.

Control

Check the use and users of your protected documents. Change given permissions at any time, even after documents have already been distributed.

Mobility

Readily available on most mobile devices and supported by almost all manufacturers. You can open protected documents on iOS and Android platforms and encrypt. This way all your data remains protected mobile safely.

Tracking

Keep track and monitor the use of all your confidential documents. Especially important for documents that fall under the governmental jurisdiction (Pipeda)

Connectors

Through connectors, an IRM system integrates into third party programs and data can be protected automatically. Protect your documents for example, automatically as soon as it leaves SharePoint enviourment.

Data Theft: The invisible danger

The number of hack attacks have increased year by year, the risk and awareness has not. According to a study has for the EY CEOs and senior management of IT security and data protection companies during an interview, 14 percent responded having discovered in the last three years concrete evidence of espionage and theft.That is twice as many cases as two years ago.

 

  • Affected 51%
  • Probably Affected 21%
  • Not Affected 28%

Particular Problem: The insiders

The victims of data theft – do not suspect its own employees.Nach a study by the Federal Office for the Protection of Privacy, 70 percent of data thieves are not outsiders and be found within the corporate boundaries. Especially in small to medium companies in this safety aspect is not a high priority. The risk and thought of being spied on by our own employees often appears inconceivable.  

Every second business is affected.

Slightly more than half (51 percent) of all companies surveyed by the Bitkom study show they have been a victim of espionage, sabotage and data theft within the last 2 years. 28 percent of respondents say that their company is likely to be affected by these statistics.  

%

Employee Data Theft

Whose hands are your confidential email attachments in

Whose hands are your confidential email attachments in? According to the American Bar Association in 2012, 90% of IT respondents confirm they had a breach of data security. In the same study 71% of respondents said that their organization likely or very likely had experienced a theft or loss of email attachments. Those numbers would only be higher now that hackers are getting more and more sophisticated and prevalent. At your own firm how do you share confidential files with clients? By email? Thumb drive? On Dropbox, Drive or some other file sharing platform? None, according to experts can give you peace of mind. Even handing files off to clients face to face is safe. Why?             Because once your confidential documents, images and files are in anyone’s hands but yours you’ve lost control of them. They can be shared, duplicated, changed and even destroyed without your knowledge or consent. Example: Email attachments: The files you attach to an email are at risk during transmission but the risk doesn’t end when they land safely in the inbox of your client. Those files can now be downloaded, printed and shared. Your confidential documents can fall into the hands of people who are definitely on the “no fly” list when it comes to having access to your information. Drive, Dropbox, the personal hand-off of files and thumbdrives are no better. Once you share your files they are out of your control. You have no way to pull them back in or revoke access. Until now.                   Now there is a way to share your files and keep 100% control of them. You can...

Your data. Now appearing on your competitor’s bulletin..

Your data.  Now appearing on your competitor’s bulletin board or a public bus stop near you. Many companies aren’t clear on what data is confidential. Worse, many believe there is no sensitive information in their organization. In a lecture on ”Intellectual Property Protection” a participant suggested that his company’s data would be “Uninteresting for data thieves, including our design templates which, if received by competitors, would lead to only minor damage.” The lecturer replied: “If I understand you correctly, you’d be fine with your organization’s data publicly posted at any bus stop or bulletin board?” Three weeks later, the lecturer’s phone rang. The participant, after pondering the idea of their data being shared with the general public wanted to talk. They were now keenly aware that indeed, they did have data they did not want shared with anyone but authorized personnel. They, like many companies, have data including price calculations, board meetings, planned product innovations, offer documents, visit reports, contracts and identity documents that are currently unprotected. Imagining those documents freely shared with their competitors and the public prompted them to evaluate their document security and make changes rapidly. What data and documents do you have that you want to closely guard and control? What would you never want shared on a public bulletin...

Object of Desire: Know-How

Of course, larger companies (> 1000 employees) are a popular destination for data theft and piracy. But small companies that are still the global market leaders in their segment through their innovations are victims of data theft. These, hidden jems ‘ often do not have the resources that of a large company to ward of data theft or recognize the dangers at all.

The conservative estimate of the BITKOM study comes from a total loss of 51 billion euros as a result of digital industrial espionage sabotage and data theft. The largest share of these are the damage caused by Plagiarism.

Total Damage ( $USD BIL)

Plagarism ( $USD BIL)

Patent Infringements ($USD BIL)

Loss of Competitive Advantage ( $USD BIL)

Excerpt from the BITKOM study (espionage, sabotage and data theft). The figures are for a period of 2 years.

Information Rights Management

Information Rights Management Systems are applications for the protection of confidential information of which goes beyond the traditional data protection solutions.  It allows control of the protected objects regardless of where they are located.

Protection

Corporate know -how effectively protected

Control

No matter where your data

Tracking

Ability to see the uses of and violation attempts

Protocols

Access to confidential board meetings and decisions can be limited to a few authorized persons. Even the IT department can not open that data.

Research Data

Protect confidential research data, patents and confidential documents with IRM. Protected documents can not be stolen even from their own employees.

Instructions

Keep control of your manuals.

Disable old or faulty versions that can no longer be opened then.

Projects

Share confidential information with external parties for the duration of a project. Upon completion, you can withdraw editing rights of remote workers. (outsourced call centers)

Publications

Sell publications or reports in digital format? By Information Rights Management (IRM) you can prevent unauthorized disclosure.

Compliance

Through the provisions and guidelines set forth in the Data Protection Act companies are obliged to protect personal data. IRM systems are a valuable tool here.