Information Rights Management (IRM)
Information Rights Management (IRM) protection allows business users to persistently control whether, when and how documents are accessed, no matter where they reside; allowing information to be safely shared across enterprise boundaries.
The power of IRM comes when the documents are actually opened in applications such as Word, PowerPoint, Excel, or Adobe Reader. The IRM technology first determines the user's identity and then applies policy based controls to limit what the user can do with a document, such as print, edit, cut and paste or even screen grab. Because the document contents never needs to leave the control of the IRM solution data is persistently protected.
As the access rights are stored in the server and not in the document, the user's rights can be changed even after the document has been delivered. Users who no longer require access to your information can have their rights revoked completely, so they can no longer open the content; effectively allowing you to 'recall' documents.
Information Rights Management is ideal for any sensitive communications between organisations. Such as :
- Executive and director level communications
- Partner communication and collaboration
- Mergers and acquisitions
- Research and development
How does IRM work?
A central server is used to manage users, policies and encryption keys. A desktop component is required wherever the protected documents are to be created or used. This component confirms the identity of users, obtains their rights from the central server and then controls the users' interactions with the secured documents, all the while recording user activity.
Note: The detailed capabilities of each IRM vendor implementation can vary significantly.
How we can help you?
We can help you assess and select appropriate IRM and DLP solutions for your business, helping you understand the merits of each, and how to apply either or both to best effect.
Please contact us to discuss your requirements.