We Need Your Help – Participate In Our Survey

We Need Your Help - Participate In Our SurveyWebWorks and Vitrium Systems would like your help! We are hoping to get your opinion on a new business partnership that may benefit your business – but you’ll need to tell us!
 
 
Start Survey

You invest in Web Works so that you can create beautiful content. No other technology allows you to convert your single-source documentation to 16 different premium outputs with just one click. But you already knew that. And now with WebWorks Reverb – you can publish HTML5 to any device, present or future, from a single file set. Create awesome, customized PDF’s that can be published to any device in HTML5 – total control for you and no custom coding.

Now that you have your content – and you know you are proud of it… what are you going to do with it? If you have created this content to support a training program or any revenue generating action, then don’t you want to make sure it’s safe? If you have created content to keep your team up to speed on the latest developments with your product (not to mention the road map!) don’t you want to know that the right people, and not the wrong people, can read it?

WebWorks and Vitrium Systems have a combined solution that can help. Combining the power of content creation with Reverb and pushing HTML5 to your consumer’s devices is great. Pushing secured HTML5 to your consumer’s devices that is secure and will not be accessed by the wrong people is peace of mind!

If you want to share your content with the world, then do it! But some content needs to be shared ‘selectively’ – some content is proprietary, or revenue generating or just plain confidential and in these cases, it makes sense to protect your hard work. Have control over your content without limiting the experience for the intended audience.

Start Survey

Case Study: Lyme and Cancer Services

Industry: Healthcare

 
Case Study - Lyme and Cancer Services Protects Documents With ProtectedpdfLyme and Cancer Services provides support and educational materials to patients with cancer or Lyme disease. They use Protectedpdf to protect their educational materials.
 
 
“We needed to streamline our process while keeping it user-friendly for our clients to access – cloud and HTML5 based documents was the way to go.”– Brendan Filler, Wellness Advisor.

View PDF | Read Full Story Online

6 Steps to Creating Positive Reader Experiences – Part 1

6 Steps to Creating Positive Reader Experiences - Part 1Due to the widespread availability of free information online, readers expect to be able to share the content they have and often measure the relative ease of access to new documents against documents with no DRM at all.

In this context, it is difficult to create document security systems that do not frustrate readers. Document security, inexpertly applied, can quickly become a deterrent for readers, especially as many people often feel they can most-likely find the information they need from another, more accessible source.

For some content providers, leaving documents unprotected is simply not an option. Therefore, a balance must be struck between creating a positive experience for readers and maintaining document security.

There are no set rules governing how best to do this – the balance will depend on the specific needs of different content providers and readers. Nevertheless, a few fundamental issues should be borne in mind.

Here we’ll discuss the first three of six points we think you need to consider when determining the level of reader experience when choosing DRM.

1. Balance reader privacy vs. your “need” to know about them

Content publishers must find a balance between gathering information about the reader (in order to validate the reader’s right to access the content) with the reader’s right to withhold personal information. Many content publishers feel the allure of asking for additional data during a transaction, but asking for more information than is necessary for the transaction can leave the reader feeling that security system is needlessly time-consuming and invasive.

2. Consider content persistence vs. content protection

Unencrypted content can be widely and easily transferred. As discussed above, easily shared information is shared – and often. For the online content sharers in this study,

“The most popular content is humorous material, with 88% forwarding jokes or cartoons. The second most popular category is news (56%), followed by healthcare and medical information (32%), religious and spiritual material (30%), games (25%), business and personal finance information (24%), and sports/hobbies (24%).”

While unprotected digital information can be freely shared, it is usually of less value than information from protected sources. Encrypted content, on the other hand, is only accessible for as long as the reader recalls how to unlock it and is therefore easily lost to posterity. We all know how easy it is to lose – or forget – usernames and passwords.

3. Consider document protection vs. infringing on private property

In 2005 the Sony CD copy protection scandal brought the controversy surrounding DRM right into the public view. In short, Sony/BMG created software which was silently installed when customers used their desktop computers to play music CDs.

This opened security holes on the PCs, causing a range of serious problems. Sony/BMG faced many lawsuits and were forced to recall the affected CDs.

In this instance, a well-known corporation neglected to find a balance between copyright protection and consumer privacy. Specifically, they failed to realize that many consumers are reluctant to have proprietary software installed on their computers, particularly if it’s done surreptitiously.
 


 
Check back with us in a couple weeks to read part 2 of this post where we’ll discuss the 2nd three points you should consider when picking your DRM solution.

Don’t want to wait? You can read the full excerpt in our white paper: Beyond DRM – 6 Steps to Great Reader Experiences.

Case Study: iData Research

Industry: Research & Advisory

 
Case Study - iData Research Protects Documents With ProtectedpdfiData Research offers business intelligence on the healthcare industry. They use Protectedpdf to manage their subscription-based reports.
 
 
“We had to find a way to manage our single user license reports so that they could only be accessed by authorized users.” – Aggie Taylor, Human Resource Generalist.

View PDF | Read Full Story Online

Webinar: Protect Your Content & Maximize Your Revenue

Protect Your Content & Maximize Your Revenue

It’s easier than ever to share content and your readers could be freely distributing your materials without consent, cutting into your revenue streams. While you want to protect your content against uncontrolled distribution, it’s also important to maintain a positive user experience so you don’t lose customers or subscribers.
 
 
 
 
In this webinar you’ll learn:

  • Protect your content
  • Maximize your revenue
  • Keep your customers happy!

Watch Webinar Recording

Webinar: Your Document Bodyguard: How to Protect Your Customer’s Shareable Assets

Your Document Bodyguard

Your customers share business documents, learning/training materials, legal documents, contracts, sensitive information, and other assets that are critical to their operations. In this webinar we take a detailed look at a leading document security solution you can add to your offerings that will let you help your customers avoid the hassle and high costs of losing or accidentally leaking critical documents.

In this webinar you’ll learn:

  • How to help your customers avoid losing critical documents
  • How to integrate this product directly into your offerings
  • All about Vitrium’s partner program

Watch Webinar Recording

Eloquent Partners With Vitrium to Expand Services

eloquent-partnerVitrium recently partnered with Eloquent, who provides knowledge management professionals with software systems for organizing information about physical and digital assets. The seamless interface between Eloquent and Vitrium’s Protectedpdf allows their customers to include highly sensitive documents in the same Eloquent database as other resources that are promoted to the general public. Giving readers only one place to look, the documents are easy to read anytime, anywhere and accessible on mobile devices.

Confidential documents in Eloquent’s database are now very secure. With Protectedpdf’s security settings, intended readers will be able to read the documents, but they will not be able to share or copy them. Other users will not be aware that they are in the database. Since the documents are encrypted, they will stay secured when emailing them.

Eloquent customers with PDF-based content, such as training materials, student marks, research reports, financial documents, manuscripts, eBooks, and more, can start leveraging these features to improve their end user (or reader) engagement, while still ensuring that their documents are protected against unauthorized access and file sharing.

Managers will be able to monitor the performance of their documents with detailed, real-time data and use these metrics to improve the effectiveness of their content. Through document-level and page-level statistics such as document unlocks, reader count, reading time, and read through rate, content publishers will have a better understanding of reader behavior and be able to optimize their content for a better reading experience. They will also discover who their most active readers are, what applications or browsers are used, and where their readers are located to ensure that their content is reaching the right target audience.

Make Your Content Accessible to All Your Readers

Make Your Content Accessible to All Your ReadersThe process of adopting an accessibility policy in any part of your business can be an overwhelming undertaking. It may mean uprooting already firmly established workflows and investing in new technologies. When it comes to document management and online publishing, accessibility often times means compatibility. It’s about being compatible with whatever devices and applications readers might be using, which can require lots of tedious testing.

A large part of accessibility in document management and online publishing is adapting to the latest mobile and cloud technologies. It’s a pretty well-known fact that the use of mobile devices has skyrocketed, and that cloud storage is the norm in the business world and gaining popularity for personal use. It used to be that you only had to worry about supporting the 2 or 3 major desktop operating systems, but now there are so many different mobile devices, each with their own operating systems and applications.

Another aspect of accessibility that perhaps might not get thought about as often in document management and online publishing is supporting your hard-of-sight readers. As a standard practice in the web publishing world, all web pages are written with HTML tags that help read-out-loud applications to understand what is on the page. These applications are then able to read the text on the page out loud for the visually impaired. This practice should be standard in digital publishing as well.

As daunting as the task may seem, it’s important to ensure that your content is accessible to all your readers, no matter how they are consuming your document or publication. Readers expect to be able access your content no matter where they are or what device they use.

Fortunately, one thing that most of these devices have in common is an internet browser. This means that it’s not necessary to keep documents in multiple file formats to be compatible with the different operating systems and applications. Nowadays, content owners can upload their original document to a document security platform, and distribute their content to all their readers using an HTML5-based web viewer. Readers can then view that content through their internet browser on whichever device they choose. Just don’t forget to make sure that the HTML5-based viewer is also compatible with read-out-loud applications.