Skip navigation
Protect The Content, Not The Location
Report

Protect The Content, Not The Location

Anywhere Security For A Hyper Connected World

AIIM, 2015 more...

auto-generated audio
auto-generated audio

Editorial Rating

8

Qualities

  • For Experts

Recommendation

In this white paper, the Association for Information and Image Management provides a well-balanced overview of how information rights management (IRM) systems counteract weaknesses in standard document security methods. Enterprise IT systems expert Doug Miles builds the case for enabling such a system, but also highlights some of the potential pitfalls associated with a fully operational IRM. getAbstract recommends Miles’s insightful findings to IT managers and senior professionals.

Take-Aways

  • Modern business requires extensive collaboration, which results in the digital sharing of sensitive company information.
  • Standard information security measures, such as firewalls, passwords and data encryption don’t effectively protect digital material.
  • Information rights management (IRM) systems provide a more reliable defense against both malicious and unintentional IT security breaches.

About the Author

Doug Miles is the head of market intelligence at the Association for Information and Image Management. He has more than 30 years of experience working with enterprise IT systems such as BI, ERP and CRM.