How do enterprises choose the right large data security program? Reference

Source: Internet
Author: User
Keywords Data protection Information Rights management
Tags access access control access data access to information address advantages and disadvantages computer content
There are several technologies that can address the security of unstructured data, but once the data is out of the network, these security technologies lose their impact because they cannot control the environment after the data is migrated. These technologies have one thing in common, and security controls are bound to the data itself, such as networks or computer peripherals. No matter where the data is transferred, there is only one technology that can completely protect the access to it. It establishes the classification of metadata, access control, and information about the permissions that individual users are allowed to access data, which is called Information Rights Management (IRM). IRM is essentially a combination of encryption and access control built into file creation and software applications to encrypt content and decrypt and view it based on access rights. This article will then explore the history of the Rights management technology, starting with the entertainment industry of Digital Rights management technology, and developing into an IRM solution that now uses similar controls for all unstructured data. Why choose IRM as shown in Figure 1, IRM shrinks the security boundary to the information itself. IRM protects not the location of the information, nor the network in which it exists. It is the access control, encryption, and auditing information that you apply to. In this way, regardless of the disk on which the information resides, the transmission network or the database, IRM can provide ongoing security for the information. 498) this.width=498 ' OnMouseWheel = ' javascript:return big (This) ' alt= ' "width=" 435 "height=" 424 "src=" http:// S2.51cto.com/wyfs02/m01/4d/65/wkiol1rqmvnap-qyaabfhnq2ina987.jpg "/> Figure 1 IRM narrows the security boundary of the information to the content itself IRM not only protects the data in the static data and transports, but also provides security for the data in use. IRM technology can prevent data from being copied to the pasteboard and pasted into another application. IRM can allow authorized users to open content, while also restricting their editing or printing. Even if the data is beyond the network boundary, the level of control of this data can also audit all access information. These controls are basically impossible to achieve through any other technology. With its fine-grained nature of data, IRM provides the most valuable security environment for controlling access to data, access to information replicated from anywhere, and information about each individual replica, as well as the ability to revoke access at any time. Imagine a scenario where you share millions of emails, pictures, spreadsheets, documents, handouts, and other resources with your business partners, customers, potential acquisitions, and employees, including those who work and quit. When business relationships and trusts change, you can revoke access to all information, even if it has been away from your file servers, content management systems, and networks for a long time, and you can maintain appropriate access to information. The security of IRM data is persistent and unlike other data security technologies, it is not possible to provide relevant information to applications or end users in an uncontrolled manner. IRM extends beyond information access control, typically by configuring identity and access control techniques. However, like other technologies, IRM has advantages and disadvantages, and this article will also describe these advantages and disadvantages. IRM is not a substitute for existing security solutions, but an excellent practice tool to effectively reduce the risk of data loss. 1 2 3 next page >> view full-text navigation page 1th: Why Choose IRM 2nd page: Differences between DRM and IRM 3rd: differentiate EDRM, ERM, RMS, and IRM original: How does an enterprise choose the right large data security solution? (1) Return to the Network security home page
Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.