5 Most Common File Security Mistakes

Posted by Anand Kekre on May 28 2015

With the rise in workforce mobility, rapid advance of consumerization, BYOD trends and the increasing need to satisfy regulatory, privacy and confidentiality requirements, companies are realizing the need for investing in file security.

Many IT managers/CIO/CISO think that just deploying enterprise digital rights management (DRM aka Information Rights Management or IRM), Data Loss Prevention (DLP), Mobile Device Management (MDM) or Data Protection solutions are enough and their responsibility ends there. Although standalone DRM, DLP and MDM have been of immense value, they just remain as check-boxes on paper - without widespread corporate adoption and acceptance. A well-thought approach to file security makes a big difference in the way that organizations do business, meet compliance requirements, ensure privacy, and protect the digital assets of the company – and, in the era of consumerization, allow end-users to be more productive and efficient.

Read More

Topics: Data Protection, Mobile Content Management (MCM), Digital Rights Management (DRM), File Sharing, Information Security, Mobility (EMM), Thought Leadership, file security

Information-centric Security – Thinking Beyond Traditional Perimeter-based Security

Posted by Anand Kekre on April 30 2015

Over a period of time, companies have heavily invested into security products including firewalls, anti-spam and intrusion prevention/detection that protect the corporate network (call it, corporate perimeter). This approach to information security is not enough in today’s world of consumerization, mobility and BYOD where data is being increasingly used from devices that are outside the corporate perimeter. Hence the practice of protecting corporate data through network and perimeter-based security measures is now being seen as ineffective in the light of security breaches and company data leaks in the recent past. 

Read More

Topics: Mobility, Digital Rights Management (DRM), Information Security, Mobility (EMM), Thought Leadership

Free White Paper: 6 Essentials For 100% Secure Enterprise File Sharing

Subscribe To The Blog By Email

Blog Topics