Eloquent Partners With Vitrium to Expand Services

eloquent-partnerVitrium recently partnered with Eloquent, who provides knowledge management professionals with software systems for organizing information about physical and digital assets. The seamless interface between Eloquent and Vitrium’s Protectedpdf allows their customers to include highly sensitive documents in the same Eloquent database as other resources that are promoted to the general public. Giving readers only one place to look, the documents are easy to read anytime, anywhere and accessible on mobile devices.

Confidential documents in Eloquent’s database are now very secure. With Protectedpdf’s security settings, intended readers will be able to read the documents, but they will not be able to share or copy them. Other users will not be aware that they are in the database. Since the documents are encrypted, they will stay secured when emailing them.

Eloquent customers with PDF-based content, such as training materials, student marks, research reports, financial documents, manuscripts, eBooks, and more, can start leveraging these features to improve their end user (or reader) engagement, while still ensuring that their documents are protected against unauthorized access and file sharing.

Managers will be able to monitor the performance of their documents with detailed, real-time data and use these metrics to improve the effectiveness of their content. Through document-level and page-level statistics such as document unlocks, reader count, reading time, and read through rate, content publishers will have a better understanding of reader behavior and be able to optimize their content for a better reading experience. They will also discover who their most active readers are, what applications or browsers are used, and where their readers are located to ensure that their content is reaching the right target audience.

Make Your Content Accessible to All Your Readers

Make Your Content Accessible to All Your ReadersThe process of adopting an accessibility policy in any part of your business can be an overwhelming undertaking. It may mean uprooting already firmly established workflows and investing in new technologies. When it comes to document management and online publishing, accessibility often times means compatibility. It’s about being compatible with whatever devices and applications readers might be using, which can require lots of tedious testing.

A large part of accessibility in document management and online publishing is adapting to the latest mobile and cloud technologies. It’s a pretty well-known fact that the use of mobile devices has skyrocketed, and that cloud storage is the norm in the business world and gaining popularity for personal use. It used to be that you only had to worry about supporting the 2 or 3 major desktop operating systems, but now there are so many different mobile devices, each with their own operating systems and applications.

Another aspect of accessibility that perhaps might not get thought about as often in document management and online publishing is supporting your hard-of-sight readers. As a standard practice in the web publishing world, all web pages are written with HTML tags that help read-out-loud applications to understand what is on the page. These applications are then able to read the text on the page out loud for the visually impaired. This practice should be standard in digital publishing as well.

As daunting as the task may seem, it’s important to ensure that your content is accessible to all your readers, no matter how they are consuming your document or publication. Readers expect to be able access your content no matter where they are or what device they use.

Fortunately, one thing that most of these devices have in common is an internet browser. This means that it’s not necessary to keep documents in multiple file formats to be compatible with the different operating systems and applications. Nowadays, content owners can upload their original document to a document security platform, and distribute their content to all their readers using an HTML5-based web viewer. Readers can then view that content through their internet browser on whichever device they choose. Just don’t forget to make sure that the HTML5-based viewer is also compatible with read-out-loud applications.

The Importance of Analytics in Online Publishing

The Importance of Analytics in Online PublishingAn important aspect of online publishing is making sure that the publication is profitable and worth your while. This is why many publishers flock to document security and DRM software that allow them to secure the intellectual property in their publications and protect their revenue streams. With these programs, content owners can control access to their content and prevent that file sharing we know to be a revenue killer. Protecting your content is the first step to maximizing revenue, but now it’s time to take it a step further with document analytics.

With detailed document analytics, online publishers can use various metrics to measure reader engagement and the focus on ways to improve the performance of their content and ensure that they are reading their audience. With document reporting on statistics such as most document unlocks, most active documents by reader views, most time spent on documents, and highest read through rate by document, content owners can get a pretty clear picture of which publications are bringing the most interest, and what exact content is keeping readers engaged. From here you’ll learn what interests your readers the most so that you can optimize the content in your publications for a better reader experience.

If you have a large readership with subscribers from all over the world interacting with your content, you may also want to consider tracking your readers to gain a better understanding of your audience. Some document analytics statistics will tell you who your most interested readers are, where they are located, and what applications or browsers they are using to open your secured documents. Knowing this kind of information will help you ensure that your documents are reaching the right target audience.

So whether it’s to improve the value of your content, or to gain a better understanding of your readers, document analytics will give you the information you need to help increase the ROI on your online publications.

To learn about the newest document analytics feature in Protectedpdf, get your free demo.

Increase Revenue With Value-Added Content

Increase Revenue With Value-Added ContentThe right approach to document security and DRM gives publishers the ability to add real value to their online content. This allows them to enhance the experience for their readers, and in turn, increase revenue.

Unique Content

To give you an example, software companies add value to their products through extensive customer support and regular updates. While it is easy to obtain software through illegitimate means, doing so prevents the user from having access to these desirable extras. Therefore, users are still willing to pay for the “real thing”.

In the case of publishers, an author’s raw manuscript is given added value through an extensive editorial process and attractive production values (layout, illustrations and so on). Online publishers of electronic documents can create even greater additional value by including features that could not exist in the physical realm, including automatic updates, search engines and links to supplementary data online.

Clearly, online content is not simply a digital version of a physical product – it has a whole unique range of potential value-added content. A well designed approach to DRM will protect this aspect of a document’s content, ensuring that it is only available to authorized users – thereby helping readers feel it is worth paying for the real thing.

Continuous Improvement

This value-added content can also be used to help online publishers with their market research. The interactive nature of online documents can provide benefits to the consumer that simultaneously help publishers earn more about their readers’ preferences. This, in turn, allows content providers to continuously improve their products in line with their customers’ needs.

Higher Quality

In general, freely accessible information is fundamentally less reliable than that contained in documents that are copyright protected. Search engines and other online information sources take freely available content, index it and turn it into something usable by the reader. But checks are limited and do not generally extend to fact verification.

For online content creators, a great deal of resources are invested into the editorial process that produces a peer-reviewed, high quality final product. Readers are prepared to pay for this high-value content but they also want the ease of use of that freely available information provides.

With a well thought-out approach to document security that focuses on ease of use, online publishers can provide additional value with their digital content, keep improving that content, and distance themselves from the often inferior content that is freely accessible online.

Interested in reading more? Check out our free white paper: Beyond DRM – 6 steps to great reader experiences.

What’s the Difference Between Document DRM & eDRM?

What's the Difference Between DRM and eDRMThe advent of digital media, combined with the internet and popular file sharing tools, has made it easier than ever to share information. Organizations now need to find ways to protect their digital information against misuse, unauthorized access, and uncontrolled distribution.


Digital rights management (DRM) is any type of technology used by publishers, copyright holders, and content owners to control the use of their digital content. DRM technologies give the ability to restrict viewing, copying, printing, or altering content. DRM is sometimes referred to as copy protection, copy prevention, or copy control, as digital copying is probably the most pressing issue. Digital media files may be duplicated an unlimited number of times with no degradation in the quality of subsequent copies, which is a concern for individuals and organizations dependent on the revenue generated from such content. DRM provides digital locks that prevent intellectual property from being stolen, or copied, just as physical locks prevent personal property from being stolen.


Enterprise digital rights management (E-DRM or ERM) refers to DRM technology for corporate documents. E-DRM is more commonly known as information rights management (IRM) because it is generally used to protect sensitive or proprietary information, such as intellectual property or financial data. Organizations can prevent data from being leaked to the public or competitors by controlling how documents are being viewed and distributed, as well as protecting against copying, printing, and editing. E-DRM technologies will usually integrate with third-party systems and databases such as content management system software.

See the difference in features that enterprise DRM has to offer versus a standard DRM solution in our comparison chart.

A Quick Rundown of IP & Copyright Protection Laws

A Quick Rundown of IP & Copyright Protection LawsThe use of copyrights and other legal protections to keep content from being misused have been evolving over quite some time. The United States has always valued the freedom of expression and the press. While this has influenced how document protection and information propriety has been handled, it was not until 1976 that the bulk of copyright law as we know it came to be. Here is a brief history of copyright law in the United States.

Copyright Act of 1790 – Protection for mass media stories such as newspapers and magazines, maps, books and other examples of the written word. Allowed copyrights to exist for 14 years, after which you could apply to extend for another 14 years. Later was increased to 28 years.

International Copyright Treaty of 1891 – Forbid any kind of reproductions with the increase of foreign entrepreneurs and rapidly accelerating printing technology. Shortly afterwards in 1909, amendments were added to allow organizations to hold copyrights. As corporations became regular fixtures of the United States, their creations had to be safeguarded from undue reproduction or defamation.

U.S. Copyright Act Amendments in 1976 – Introduction of “fair use”, meaning as long as profit isn’t being infringed upon, media can be used for the purposes of criticism, education and news reportage.

Berne Convention of 1989 – Stated that media and content users must recognize the intellectual property laws of one nation even while operating in another. Also established the Universal Copyright Convention making it clear that the copyright symbol – © – denotes a file, type of content or media source is protected under international agreement.

Digital Millennium Copyright Act of 1998 – Expanded upon the number of nations that were included in the international agreement and limited internet service provider (ISP) liability for digital copyright infringement.

With rapidly changing technologies, copyright laws will need to continue to evolve. However, even with these laws there will still plenty of threats to copyrighted content. There will always be people determined to access or duplicate media they shouldn’t regardless of the copyrights in place. Online piracy is a bigger issue than ever, and we’ve highlighted some important stats in our Infographic: No Big Deal? Copyright & Piracy Online.

Why Digital Publishing is Thriving

Why Digital Publishing is ThrivingDigital publishing is now a mature, thriving industry, and yet many still insist that publishing is declining. While printed book sales dropped slightly between 2008 and 2012, eBook sales grew at an astonishing rate during that same time. Just as hand-copied books were revolutionized by the printing press, digital technologies are transforming print publishing.


The bestselling eBooks tend just printed books that have been converted to digital format, but this will change as eBook publishers start to differentiate themselves with interactive content. Many readers are moving from single function e-readers to more capable, multifunctional devices. This gives rise to opportunities to be innovative with the reader experience. This could be by including multimedia, such as video, games, slideshows, cartography, or photography, or by leveraging the devices’ internet capabilities.


Digital publishing offers a new way to participate in communities where readers can discuss what they’re reading. Instead of traditional book clubs, online communities are starting to form around the various digital publishing platforms. People from around the world with common interests are coming together to share related content. This is in a sense extending the author’s relationship with its readers, keeping them engaged with ideas from the book.


Demand for information has increase to a level that print publishing cannot meet. It is easier to download a newly released magazine today than wait for it on the mail for three days. And while digital publications are typically sold at a lower price per unit, profit margins are much higher. Digital distribution can create millions of copies in the time it takes a printing press to print a few hundred thousand and without the high operating and material costs. The investment is in the author, the design, and the content, not the warehouse and shipping.

However, when making the move to distribute publications digitally, authors, publishers, and content owners often worry about the threat of piracy and lost revenue. This is why it’s important to consider protecting content with document security. There is, however, a delicate balance between adequately protecting that publication and providing a positive reader experience. Some DRM solutions can make access to protected content unnecessary complex, and thus deter your readers.

Check out our white paper: Beyond DRM – 6 steps to great reader experiences to explore this issue in detail and learn about the advantages that a good DRM solution can provide.

New API Makes It Easy to Integrate Document Security With Workflows

New API Makes It Easy to Integrate Document Security With Workflows[PRWeb | Vancouver, December 7, 2015] Vitrium announced today the release of its Application Programming Interface (API) for its popular document security solution, Protectedpdf. The new API will allow developers to integrate their software and workflows with Vitrium’s DRM and document encryption software.

Developers in the document management and enterprise content management (ECM) space will be able to set up their applications to interact with Protectedpdf and take advantage of document security features, such as PDF encryption, password protection, copy and print control, document expiry, reader access control, watermarking, and more. With the flexibility of being able to select the services that fit their needs, developers will enjoy the ability to truly customize and control their document security implementation.

“Document security is most effective when it is fully integrated with the technologies, tools, and processes commonly used when handling confidential or sensitive documents. The release of our API to developers is a giant step forward for document management as it will lead to efficient collaborations with industry partners that want to offer an additional layer of document protection or PDF security in their solutions.”

– Chris Butlin, President & CEO, Vitrium Systems Inc.

The Protectedpdf API was built using the RESTful framework, allowing it to connect with back-end or front-end systems and seamlessly mesh with a company’s document workflow processes. Following best practices of RESTful APIs, Vitrium has compiled comprehensive and detailed documentation that will provide developers the ability to get up and running without the need to contact Vitrium’s support team.

Vitrium’s API documentation includes detailed descriptions, responsive values, and sample code for each method and input parameter. Live API documents lets developers quickly test out all the calls in line without the need for additional software. The API documentation is always kept up to date and can be accessed within the Protectedpdf application.

If you would like to learn more about becoming a Vitrium partner and using the API to integrate Protectedpdf with your application, visit: www.vitrium.com/channel-program/partner/

It’s World Paper Free Day – November 6, 2015

World Paper Free Day We’re taking the pledge to go paper free on World Paper Free Day 2015, and we want you to join us!

The Association for Information and Image Management (AIIM), a global community of information professionals, is taking the initiative to challenge the business world to use less paper and eliminate the waste that office paperwork can create. According to a recent study done by AIIM, 35% of respondents said that most of the electronic invoices they receive get printed anyway, while 31% admit that their desk is ‘piled high’ with paper. The average office worker uses up to 45 sheets of paper per day, and more than half is considered waste.

Many businesses have discovered the benefits of going paperless, both financial and operational. They have found that when investing in technologies that allow their offices to go paper-free, they have improved overall productivity and experienced a positive return on investment. They were able to respond quicker to customers, maintain better compliance, and improve the ability to telework.

You can take part today by vowing to reduce the amount of paper you generate in your everyday work and personal life. It’s just one day, but these actions can change habits and make a difference for the future.

For more details, check out: www.aiim.org/events/paper-free-day

Which Industries Are Targeted by Cyber Threats?

Which Industries Are Targeted by Cyber Threats?You hear about these large scale data breaches where another big corporation becomes victim to a cyber-attack. While these news stories seem to be popping up more and more these days, the truth is cyber-attacks are happening all the time and have been for a long time. You may be wondering who these attackers are targeting and why? While the why may not always be clear, we can deduce from research data which industries are getting hit the most.

According to Cisco’s 2015 Annual Security Report, the pharmaceutical and chemical industry emerged as the highest risk industry for web malware encounters in 2014. Other verticals in the top five were media and publishing, manufacturing, transportation and shipping, and aviation.

You may be wondering why retail isn’t listed among the top five, given the number of high-profile incidents in recent years (eh hem, Target and Home Depot, to name a couple). A web malware encounter doesn’t mean that a data breach occurred, but rather that a piece of malware was detected and blocked. So, while it’s probably true that the retail industry was hit the hardest last year with actual data breaches, it doesn’t necessarily mean that it was the most targeted. There are a number of factors that make some industries more vulnerable to successful data breaches than others. So, using web malware encounters as a metric gives us a pretty good indication of which industries are being targeted by threats.

The interesting question is why are certain industries more susceptible to malware encounters than others? Is it really because hackers see the information that they can seize from these industries as more valuable than others, or could there be something else going on?

According the Cisco’s report, it seems to be a combination of targeted attacks and careless employee behavior. The way they are able to determine this is by examining the types of attack methods. They found that among the high risk industries, there were more cases of adware, clickfraud, scam, and iframe injections, which are considered to be non-targeted attack methods. Falling victim to these types of attacks is wholly dependent on user interaction.

This means that some of the higher frequency of web malware encounters in high risk industries is coming from their employees’ internet activity. So, it would make sense that certain industries that embrace new media and technologies would be more susceptible to attacks, where as traditional industries where change is slow and internet usage is highly controlled might experience less malicious activity.

That’s not to say that hackers aren’t targeting the high risk industries with sophisticated attack methods. They are, in fact, at a much higher rate than other industries. The key takeaway here is that the frequency of malicious encounters, and thus data breaches, can be significantly reduced with the proper tools and education in place. Mitigate the risk by educating your employees on safe internet behavior and protecting your data.

Find out if your company is at a high risk of experiencing a data breach using our Risk Grader.