Blogs

Information Rights Management (IRM): What enterprises want!

Enterprises started showing more interest in data-centric security platforms in the recent past. The growing use of email platforms and enterprise collaboration systems required an encryption-based environment that defines permissions for different users and user groups. Access rights (i.e. view, edit, download, print, copy, and forward) could be controlled with next-generation IRM-enabled collabo

Elevate Security of Confidential Data with IRM (Information Rights Management)

Did you remember Anthony Levandowski? A Key technologist and pioneer of Google’s autonomous-vehicle project who downloaded more than 14,000 files containing proprietary information and made an unauthorized transfer to his personal laptop. Cisco’s annual internet report (2018-2023) says two of the top 10 attacks are insider threat issues (file sharing and stolen credentials). It shows that y