
This was notably the case for Microsoft Active Directory Right Management Services (AD RMS), an information protection technology that enables AD RMS-enabled applications such as Microsoft Office to protect digital content from unauthorized use, both online and offline, inside and outside of the organization's boundaries. Deploying on-premises IPC can be challenging and/or require significant knowledge to be done right. Users would not be satisfy if the protected document they are trying to read couldn't be open because an Information Protection element is not responding or if it isn't supported on their devices. Also user's expectation is high and they are not tolerating any downtime. This can be explained by previous lack of interest of Business Decision Makers or by the complexity generally observed when deploying such a far-reaching solution. One should note that IPC is available for more than a decade but only few organizations are using this kind of solution. Control goes a step further by granting people access while removing their abilities (for example, to edit, copy, or print) in accordance to usage policy. Control is « limit the usage of the information ». The document is unlocked (in fact decrypted) if the user is authorized to access it. Protect is « Prove who you are » before granting access. All of these categories aim to prevent an accidental and unauthorized distribution of sensitive information. Note IPC is also known as a different set of names including: data leakage prevention, data loss protection, content filtering, enterprise rights management, etc. These challenges demand effective Information Protection and Control (IPC) systems, which are not only secure but are also easy to apply, whether it's to e-mail messages sent or documents (of all types) accessed from various devices, inside an organization or outside the organization to business partner organizations/individuals. Various exposure risks data is subject to notably when stored on non-managed devices, or in the cloud.Įach of these capabilities poses different challenges. Consequently, IT needs to make sure that proper policies and technologies are in place with specifically the ability to protect and control access to sensitive corporate files from: Leaks of confidential information can result in lost revenue, compromised ability to compete, unfairness in purchasing and hiring decisions, diminished customer confidence, and more. Users indeed expect to be able to collaborate seamlessly with any business user not only within the organization but also outside.Ĭonsidering the above, information leakage can be a serious threat to organizations. Furthermore, as of today, information workers are not just more mobile than ever before, but they are also more demanding on external collaboration. Mailboxes have transformed into repositories containing large amounts of potentially sensitive information. With the time, the type, volume and sensitivity of information that is exchanged has changed significantly. Today, information workers are highly interconnected and, with the consumerization of IT, more and more of them are using the device of their choice to access e-mails and work-related documents from just about anywhere. Every day, information workers use e-mail messages to exchange sensitive information such as financial reports and data, legal contracts, confidential product information, sales reports and projections, competitive analysis, research and patent information, customer records, employee information, etc.Įver more powerful devices, converging technologies and the widespread use of the Internet have replaced in mobility situation what were (controlled and managed) laptops in past years.
