Subscribe / Unsubscribe Enewsletters | Login | Register

Pencil Banner

DRM could be making a comeback in the enterprise

Maria Korolov | Aug. 24, 2015
DRM might be coming back to the enterprise

"Inconvenienced users will revolt, throw out the product, and disparage IT," he said.

But if a vendor is able to overcome the usability obstacles, the business benefits are compelling, he added.

"The business can send out sensitive or regulated information without having to sweat disclosure issues from the endpoint," he said. "The files can even be automatically deleted when they become superseded or otherwise obsolete."

The crucial parts are user friction at both the sender and the recipient end, agreed Enterprise Management Associates' Monahan, who will be publishing a study this fall about interest in enterprise digital rights management.

"People indicated that they are happy to use security if it doesn’t cause a problem with the parties they are trying to share it with, as that impacts their business revenues," he said. It also can't impact internal users because that could hurt productivity.

"If security gets in the way, people will bypass it to do what they think they need to," he said. "A solution that embeds itself into the existing technology, processes and workflows is crucial for acceptance."

In the study, based on an enterprise survey about file collaboration security, 75 percent of respondents expressed a high or very high level of concern about the risk of data leakage of sensitive files being shared, and half said that there were frequent instances of inappropriately shared documents or unauthorized access to files containing sensitive, confidential, or regulated information in their organization.

"Companies like FinalCode that protect data at the file and operating system level are in a good place right now," Monahan said. "With the recent impacts on Sony, there is a resurgence of attention on protecting internal data. This is going to keep expanding. The crucial point is the user friction at both ends. That is why many previous data protection solutions have not gotten popular support and are only used by those organizations requiring the utmost in protection."


Previous Page  1  2  3 

Sign up for CIO Asia eNewsletters.