Академический Документы
Профессиональный Документы
Культура Документы
Enterprise Digital Rights Management (EDRM)1 is a technology that need to outsource and collaborate with third parties and temporary
controls the access and usage of information in stand-alone files partners is also giving rise to new business demands - particularly
and emails (known as ‘unstructured’ information). in the area of user experience.
EDRM solutions have been available in one form or another for If you are considering EDRM technology for your enterprise, this
more than a decade. However, new technology trends such as white paper would help you fully consider and evaluate the latest
Cloud Computing and mobile device usage are raising expectations capabilities available in the current generation of EDRM products.
and pushing the boundaries of EDRM capabilities. The increased
Ability to restrict file access and usage to specific users and / or user groups
Ability to restrict file access and usage based on date and time
Ability to restrict file access and usage based on time period (no. of days)
1
Also known as Information Rights Management (IRM) | 2
Also see ‘Watermarking Capabilities’ section
An Evaluation Checklist for Enterprise Digital Rights Management (EDRM) Solutions
Ability for a child folder to inherit permissions from the parent folder
Ability for a child folder to have different permissions than the parent
folder
Email Security
Support for editing supported formats on mobile devices (iOS and Android)
Watermarking Capabilities
Ability to fetch the file watermark from integrated 3rd party applications
Support for Microsoft Office files: doc, docx, xls, xlsx, ppt, pptx
Support for image files: jpg, jpeg, bmp, png, gif, tiff
Support for all major Microsoft Office versions: 2010, 2013, 2016
Ability to send a daily digest to file owners summarizing all the day’s
file activities
Ability to log access to audit logs for administrators and power users
Ease of Administration
User Authentication and Integration with IAM and Identity Federation Systems
Ability to integrate with ECM systems and protect files upon download
Support for full content search even for protected files uploaded into
a ‘protected’ folder/library in an ECM/DMS system, thus ensuring
that security doesn’t interfere with the normal user experience
Server Hosting
Learn how easy it now is to keep your most sensitive data safe, and compliant.
Contact us at: info@seclore.com or CALL 1-844-4-SECLORE.