Summary of Protect The Content, Not The Location

Looking for the report?
We have the summary! Get the key insights in just 5 minutes.

Protect The Content, Not The Location summary
Start getting smarter:
or see our plans

Rating

8 Overall

9 Importance

7 Innovation

7 Style


Recommendation

In this white paper, the Association for Information and Image Management provides a well-balanced overview of how information rights management (IRM) systems counteract weaknesses in standard document security methods. Enterprise IT systems expert Doug Miles builds the case for enabling such a system, but also highlights some of the potential pitfalls associated with a fully operational IRM. getAbstract recommends Miles’s insightful findings to IT managers and senior professionals.

In this summary, you will learn

  • Why passwords and firewalls aren’t enough to prevent unauthorized users from accessing confidential information,
  • What information rights management (IRM) systems can do to help prevent data leakage, and
  • What concerns full-scale IRM systems generate.
 

About the Author

Doug Miles is the head of market intelligence at the Association for Information and Image Management. He has more than 30 years of experience working with enterprise IT systems such as BI, ERP and CRM.

 

Summary

Business in today’s globalized society requires extensive collaboration and mobility. Overseas manufacturing, banking and all manner of corporate transactions involve the sharing of spreadsheets, data sets , contracts and documentation. Employees must email or save files in cloud-based networks so different...

More on this topic

By the same author

The Digital Office
The Digital Office
7

Customers who read this summary also read

How to Encrypt Your Entire Life in Less than an Hour
How to Encrypt Your Entire Life in Less than an Hour
8
How (and Why) Russia Hacked the US Election
How (and Why) Russia Hacked the US Election
8
How to Withstand a Cyberattack
How to Withstand a Cyberattack
8
Virtual Billions
Virtual Billions
8
The Malicious Use of Artificial Intelligence
The Malicious Use of Artificial Intelligence
8
How Free Is Our Freedom of the Press?
How Free Is Our Freedom of the Press?
8

Related Channels

Comment on this summary