Summary of Protect The Content, Not The Location
Anywhere Security For A Hyper Connected World
AIIM/Vera © 2015
In today’s collaborative business world, passwords and firewalls aren’t enough to keep sensitive business documents safe.
In this white paper, the Association for Information and Image Management provides a well-balanced overview of how information rights management (IRM) systems counteract weaknesses in standard document security methods. Enterprise IT systems expert Doug Miles builds the case for enabling such a system, but also highlights some of the potential pitfalls associated with a fully operational IRM. getAbstract recommends Miles’s insightful findings to IT managers and senior professionals.
In this summary, you will learn
- Why passwords and firewalls aren’t enough to prevent unauthorized users from accessing confidential information
- What information rights management (IRM) systems can do to help prevent data leakage
- What concerns full-scale IRM systems generate
About the Author
Doug Miles is the head of market intelligence at the Association for Information and Image Management. He has more than 30 years of experience working with enterprise IT systems such as BI, ERP and CRM.
Comment on this summary
By the same author
Customers who read this summary also read
World Economic Forum
World Economic Forum, 2014
Siemon T. Wezeman and Pieter D. Wezeman
The Boston Consulting Group
BCG © 2015. Commissioned by Qualcomm., 2015
Iulia Ion et al.