Partnerships Spark New Life Into Enterprise DRM

Data leak protection vendors and makers of enterprise DRM software are working together to make it easier to identify information that needs protecting and to impose limits on who can

January 6, 2009

3 Min Read
NetworkComputing logo in a gray background | NetworkComputing

There's no shortage of storage security stories highlighting the insider threat -- employees, whether criminally inclined or not, always have been and remain a company's biggest security risk and the source of many, if not most, information leaks. And, while companies can use network firewalls and intrusion detection technologies to protect their networks and other anti-malware software to shield servers and endpoints, those tactics don't protect the actual data within files.

That's why critical information -- business plans, financial information pertaining to customers, or a business' own finances -- is always at risk of leaking as a result of insider mistakes such as an accidentally sent email, a lost notebook, or even a misplaced removable storage device.

Encryption technology can work for files and disks. But it isn't always practical for entire organizations. Workers forget to use it, keys are lost, and systems break down. That's where enterprise digital rights management (DRM) is suppose to step in. The technology, theoretically, should help organizations manage the security of documents wherever they travel by embedding access rights and encryption directly into the files. These rights limit which users can read, print, copy, or transmit the files. They can even terminate access to specific files at a certain date. "But the problem with enterprise DRM has been that the technology is complex and outside normal work behavior. The tools work great, but organizations don't always use them consistently," says Rich Mogull, founder and analyst of security consulting firm Securosis. "Users also don't know what rights to apply to what objects or which users should have those rights. While companies can setup templates, the users still need to manually classify data."

That, analysts say, is about to change thanks to newly forming partnerships among data leak protection (DLP) vendors and makers of enterprise DRM software. Essentially, DLP applications help organizations identify and classify information they'd like to protect -- customer data, Social Security numbers, business plans -- and then use pattern matching and other techniques to find other files that meet that criteria. Then the enterprise DRM software imposes limits on who can access and use those files.

There are two recent partnerships in this market. One is between RSA Security Inc. (Nasdaq: EMC), the security division of EMC Corp. (NYSE: EMC), and Microsoft Corp. (Nasdaq: MSFT). Under this partnership, Microsoft will integrate RSA's DLP Suite 6.5 with Microsoft's Active Directory Rights Management Services within Windows Server 2008.The second partnership is between Liquid Machines Inc. and McAfee Inc. (NYSE: MFE), which will integrate McAfee's DLP platform with Liquid Machines's eDRM platform. McAfee's software will help customers to find crucial information and files and Liquid Machines's software imposes restrictions on who can access them and how. McAfee's suite also restricts the ability to send or move designated files and data outside the firewall. Liquid Machines supports numerous operating systems and computing platforms such as Windows Vista, Microsoft Office, and Intel-based 64-bit computers. Liquid Machines is also built on Microsoft Active Directory Rights Management Services in Windows Server.

"These initial partnerships will help enterprises using eDRM with content discovery, by scanning content repositories whether it be in a laptop or in the data center, and then applying eDRM rights to the files found," Mogull says. "For example, a user could set the DLP application to scan for any files that contain credit card numbers, and then assign encryption and levels of access rights for employees."

That will be a big step forward in protecting important data within companies, he says. "Imagine real-time content awareness that can automatically classify files and apply DRM rights," says Mogull. "People can work on their data the ways they always have and their content is protected."

SUBSCRIBE TO OUR NEWSLETTER
Stay informed! Sign up to get expert advice and insight delivered direct to your inbox

You May Also Like


More Insights