productssolutionssupportpartnerspurchasecompany

   

Executives are reluctant to utilize electronic data communications for their confidential communications because of the risk of improper distribution and discovery. Many executives have been harmed because their sensitive messages have been utilized in ways unintended at the time of writing of the message. Sending messages to trusted partners is risky because the trusted partner often sends it on to their trusted partners for advice. Rapidly, hundreds of people can have a copy of sensitive information and often one of those recipients is not trustworthy.

Customers traditionally protect their information by building barriers to access. Billions of dollars are spent per year on firewalls, virtual private networks, secure data bases, virus blockers, and server hardening. These barriers provide valuable functions. However, they don’t do anything to protect the content of files against misuse by anyone who has access to the file. Anyone who has access to the file can intentionally or by mistake send the information to “the enemy.”

Customers are now starting to recognize the significance of the problem. Most customers are only recently starting to think about the fact that traditional security solutions build a fort around the information but don’t do anything to protect the information from actions of people inside the fort. Forts are no longer useful in the modern military because the enemy can penetrate most any military fort. Similarly, information security forts are no longer adequate to protect against cyber theft.

In addition to compliance with laws and regulations, companies are now recognizing that they must protect their information as a valuable asset. The Wall Street Journal has stated the following summary of the problem. “But now companies are starting to look for ways to keep stuff from getting out. The reason is simple: for all the damage that invading viruses can do to a system, businesses increasingly realize their greater vulnerability is already inside. It’s Marge in accounting or Bert in the call center – employees who have access to valuable trade secrets, financial data or confidential client information and who, intentionally or not, might send it to someone who isn’t authorized to receive it.” Forbes included an article titled, “The Insider, when a top employee is suspected of stealing data, things can get messy.” It states that “Insider network abuse ranks second only to viruses, according to the annual Computer Security Institute – FBI survey. Employees often keep duplicate versions of sensitive data on their PDAs, BlackBerrys and home computers. Of the companies in the FBI study that reported insider abuse – and 80% did – one third didn’t even know how many times their systems had been compromised. Integrity, not ability or the fear of getting caught, is all that separates a conscientious employee from a thief.” Information Week states the key point, “Data breaches are a constant threat and put companies in danger of losing their most valuable asset: customer trust,” is perhaps the greatest concern that companies should have. “The potential black eye that a company could receive is measurable in hard dollars, especially when you tally lost customer business, goodwill with customers, as well as lost future business.” “Despite growing concern over identity theft, it appears that companies aren’t doing all that they can to protect customer data.”

The crucial role that enterprise DRM (eDRM)can play is just starting to be recognized. One of the reasons that eDRM has not been recognized as playing a major role is that most eDRM products are not built to be compatible with the needs. Many industry analysts have observed that effective use of enterprise DRM requires sharing of files of all popular formats with diversely located users who use different systems. They have observed that most eDRM products are designed to work within one enterprise environment on one operating system and for sharing of files in just a few formats. Customers are now asking for an eDRM product that can be easily used to share files in all popular file formats with people around the world.

One of the industry analysts who has stated the importance of these key variables is eWeek writer Jim Rapoza. On April 26, 2004 he wrote that most digital rights management information security products "are tied to Microsoft Corp.'s Office or Adobe Systems Inc.'s Acrobat." He stated that FileSECURE is different. "The result: intuitive applications that enabled us in tests, to manage rights and policies for content access and distribution, protect content in a drag-and-drop authoring client, and read protected content in a simple reader application."

Most products have not been designed to meet these crucial requirements. AirZip FileSECURE has been designed to enable communications with confidence with people anywhere with all printable file formats. AirZip FileSECURE server runs on all popular operating systems including Microsoft Windows, IBM AIX, Hewlett-Packard HP-UX, Apple Mac OS X and Sun Solaris, and Linux. And AirZip FileSECURE clients run on all Windows versions from 98 on.

More about AirZip FileSECURE