The Case for Attribute-Based Policies in eDRM

In today’s collaborative world, eDRM (Enterprise Digital Rights Management) is proving to be one of the most effective ways to share documents with partners. EDRM is a technology that enables companies to restrict access to documents containing sensitive information, both inside and outside the corporate firewall. The way it works is documents are rights protected using AES encryption and then policies are applied to control access and usage rights (view, edit, print, etc.). If a user is not entitled to view the document, he cannot open it. If he is entitled to view the document, usage may be restricted. more “The Case for Attribute-Based Policies in eDRM”

SharePoint 2014 Key Security Takeaways – Our Top 5

By Mandy Pang, Senior Product Manager

SharePoint 2014 Key Security Takeaways – Our Top 5

  1. The conference attendees were buzzed on Attributes.  Specifically, attribute-based security models for SharePoint.  Role-based models are no longer making the cut – they leave collaboration vulnerable.  Attribute-based solutions have fine-grained control.
  2. Clouds, of course was big, even bigger was the topic of protecting data in-transit to/from cloud and at rest in the cloud.  Securing Office 365 was another hot topic.  There was a great deal of discussion around the need for comprehensive end-to-end protection of intellectual property while satisfying the regulations set forth by a company’s compliance office.  If the data or IP was to be accessed by or transmitted to an employee or contractor outside of the company’s firewall, then concern was expressed on how to safeguard the data.
  3. SPC14 was global with a good portion of attendees coming from Europe.  Interestingly enough, a lot of European companies are looking to the U.S., particularly Silicon Valley, for solutions on automated information rights management.
  4. The architects, developers, and I.T. leaders with which I spoke were eager to learn about how to automate fine-grained access control for all work-product in a SharePoint environment.
  5. Extensibility was also discussed.   At SPC14 the conversations were about information rights management extensibility – starting off with one Microsoft solution such as SharePoint, then extending the same information rights management solution to Office 365 and other products.

more “SharePoint 2014 Key Security Takeaways – Our Top 5”

Problems with Permissions

By Mandy Pang.

Collaborative technologies such as e-mail, instant messaging, Microsoft SharePoint, extranet portals, and software-as-a-service (SaaS) applications make it easier to share information and communicate innovations. In a typical Microsoft environment, Office documents may be created on the desktop, then loaded to a File Server for internal sharing. Or they may be uploaded to SharePoint for sharing with your supply chain, or be emailed to a fellow employee overseas. Note the ease with which IP can be transformed, duplicated and shared. more “Problems with Permissions”