Vitrium Webinar – Introducing New Web Features for Protectedpdf®

Introducing Protectedpdf Web ViewerVitrium will be hosting a webinar next month to introduce new web features for Protectedpdf®.

Choose the time and timezone that works for you!

Tuesday, April 29, 2014
11:00-11:30am PDT

Sign up now! >

Wednesday, April 30, 2014
1:00-1:30pm EDT

Sign up now! >

Our Protectedpdf® solution now offers customers another option for publishing secure PDF documents at no extra cost! You can now publish your document online via an HTML5 web link, sending a secure web version of the document to readers who can access their documents anytime, anywhere, on any web-enabled device.

Seamless
Readers appreciate that there are no messy installations, firewalls, proxies, or other obstacles between them and the document. Publishers enjoy how easy it is to simply enable rights within Protectedpdf® and send out the link.

Secure
The new web features provide the security balance that publishers need to protect their investment, with all the features that publishers have come to expect from Protectedpdf® – document protection, tracking, controls, revocation and expiry, and watermarking, still included!

Any Device
With the web link, protected documents can be viewed on any modern web browser and Internet enabled device. Presto! Secure documents delivered anywhere, anytime.

Learn more about Protectedpdf’s web capabilities >

Vitrium Revolutionizes PDF Document Security and DRM With New Hassle-free Web Features for Protectedpdf®

Introducing Protectedpdf Web Viewer[PR Web] Vitrium™, a leading provider of PDF protection and document security solutions, announced today that it has revolutionized how PDF documents can be viewed with the launch of its new HTML5 based web viewer this past January.

This makes the company the first document security software provider to go to market with an online secure PDF viewer – and it’s already receiving glowing reviews from Vitrium customers and readers.

Please join Vitrium HERE for a brief webinar of how this new feature works!

Many readers hate DRM (document rights management) for how it limits their reading experience, and Vitrium is listening. The company’s Protectedpdf® solution now offers customers multiple options whereas it previously only had one – to view their secured PDF documents with Adobe Reader installed on their local computer. Now, with Vitrium’s web solution, protected documents are more accessible and less intrusive than ever before.

The new functionality comes at a time when more and more readers want to open documents on any web-enabled device, and publishers of secure documents are racing to meet this demand and add greater flexibility into the market. With this feature, Vitrium’s customers now have the option to publish their document online via an HTML5 web link, sending a secure web version of the document to their readers who can access their documents anytime, anywhere, on any web-enabled device. Also, since the web link is entirely browser based, there are no messy installations, firewalls, proxies, or other obstacles between the publishers and readers. This opens up opportunities for publishing documents to environments were user computers are IT restricted because where the browser can go the document can flow.

Readers will appreciate that there are no plugins, downloads or any other hassles disrupting access to the document, providing the seamless experience they want, and the security balance that publishers need to protect their investment. Publishers simply enable rights within Protectedpdf® and send out the link. The lightweight HTML5 codebase enables the browser to display pages quickly with a minimal loading time. In addition, all of the features of Protectedpdf® customers expect, such as document protection, tracking, controls, revocation and expiry, and watermarking are included with the new web viewer dependent upon the customer’s existing configuration options. The solution will work with any modern web browser and Internet enabled device. Vitrium is offering this new feature at no extra cost to Protectedpdf® customers.

“Vitrium’s Protectedpdf® web viewer has made a huge impact at the American Trucking Associations. We can now secure our intellectual property for our members and sell them to our customers, online, in a fast and easy web link, accessible anywhere. I’d recommend Vitrium’s Protectedpdf® web viewer for securing PDFs.”

– Shehab Moustafa, VP, Information Technology
American Trucking Associations

“Protectedpdf® customers now have more options for delivering their secure documents than ever before.” says Susan Daly, CEO at Vitrium Systems. “We wanted to improve and enhance our technology to help our customers retain their reader’s loyalty by providing a good experience viewing a secure document. We’re delighted with the quality, usability and uptake of this new feature within our Protectedpdf® product line.”

- Susan Daly, President & CEO
Vitrium Systems Inc.

About Vitrium Systems

Vitrium provides document security solutions that empower content owners and publishers of PDF documents to protect their valuable content. It’s more than copyright protection; it’s protection of intellectual property, revenue-generating content, or confidential and sensitive information. Vitrium’s flagship product, Protectedpdf® has been trusted by over 1,000 companies and accessed by over a million users worldwide.

SMBs must up security strategies

SMBs Must Up Security StrategiesAlthough small and medium-sized businesses (SMBs) are often considered the heart and soul of the private sector, their inability to implement advanced document security initiatives could hinder their influence. Although many enterprises work with SMBs to develop more robust leads and deploy innovative software, vulnerable SMBs are often avoided, according to a Dark Reading report.

“Taking a lax attitude toward security can hinder the chance for growth through contracts or partnerships with large public or government entities,” said Brian Burch of Symantec, according to the news source. “Why? [Because] large companies are wary of the risks with connecting and sharing confidential information with smaller companies who are not properly protected.”

Unfortunately, small companies face the same risks that large organizations are forced to deal with, though often with a smaller budget and fewer exhaustible resources, Dark Reading asserted. For this reason, SMB decision-makers need to break through barriers and deploy the most advanced, cost-effective document protection strategies to ensure mission-critical resources are not inadvertently exposed.

Encryption and other document security initiatives are still a very plausible way to keep confidential solutions protected, according to a separate study by InformationWeek Reports. By adopting a combination of advanced protective tools, small firms may be able to reduce risk.

Mobile security initiatives need new boundaries

A new study by InformationWeek Reports noted that document security, records protection and overall data loss prevention strategies will need to be reevaluated in 2014 due to the emergence of several technologies now being used across the private sector. The survey revealed that managing the complexity of security initiatives and enforcing governance policies were among the top challenges facing organizations in 2012.

These same problems will likely carry into the new year if decision-makers do not take charge. As mobile and cloud computing technologies continue to flourish, IT departments need to adopt next-generation data loss prevention strategies to keep mission-critical information safe, the report indicated.

Approximately 69 percent of respondents said mobile devices, in particular, pose a significant threat to existing document protection strategies, while another 21 percent said they will in the future, according to InformationWeek Reports. The study also found that 64 percent of executives believe encryption was the most effective method for keeping valuable resources secure.

This suggests longstanding document security and encryption strategies will still be capable of protecting sensitive assets in the age of mobility, as long as the projects are redefined to incorporate new parameters.

Security training necessary to minimize data exposure

Security training necessary to minimize data exposureAs cloud, mobile and social computing continue to gain momentum in the business world, the possibility of exposing confidential assets increases. Decision-makers need to adopt the most innovative document protection tools to keep sensitive resources protected from both insiders and outsiders.

A recent report by IT Governance highlighted these concerns, noting that many organizations fail to educate employees in the proper techniques needed to secure mission-critical documents and information. As a result, the private sector continues to fall victim to devastating data breaches that impair its financial stability and overall reputation.

IT Governance said the bring-your-own-device (BYOD) and cloud movements are introducing a number of new threats that businesses have never encountered before. For this reason, executives need to learn as much about the evolving IT landscape as possible and share their findings with workers through innovative training programs and security policies.

If companies fail to emphasize the importance of these document security initiatives, sensitive information will continue to be exposed through the actions of ignorant employees who have failed to see the error of their ways.

Try Free Protectedpdf Document Security >

Survey finds companies failing to encrypt confidential resources

A new study by SecurityMetrics revealed that many companies are not implementing the appropriate document security tools to keep personal information safe. In fact, a number of healthcare, hospitality and retail organizations have failed to encrypt confidential payment card data, which could be exposed by cybercriminals.

"Whether a business stores unencrypted card data because of an improperly configured payment application, or because employees handle data improperly, storing card data without encryption is against industry regulation," said Gary Glover, security assessment director at SecurityMetrics.

The research revealed that credit card fraud costs companies more than $52 billion each year. In many cases, these incidents occur simply because decision-makers failed to encrypt sensitive information, which was easily exploited and used by malicious individuals.

Executives should consider using document rights management and other advanced access control tools to ensure only authorized workers have the ability to view confidential resources. Failing to implement advanced document protection tools will only make firms more vulnerable and, as a result, less likely to remain competitive in the coming years.

Encryption, advanced security tools keep cloud-based resources safe

Businesses today are embracing the digital age and have begun using cloud computing and other technologies to enhance their ability to manage the growing number of online resources. Since the virtual environments are relatively new, however, many decision-makers are looking for innovative document protection tools to ensure the safety of mission-critical resources.

In a recent discussion with Virtual-Strategy Magazine, security expert Rami Shalom said most companies want to use tools that provide more visibility into governance policies. Decision-makers need to be aware of when documents are moved, where they are migrated to and the purpose behind the transfer. Without this ability, IT departments will not be able to effectively protect confidential resources.

Shalom also said executives are leveraging encryption and other document security solutions to ensure individuals without the proper credentials do not have the ability to view sensitive records without permission, Virtual-Strategy Magazine reported.

Small and large companies alike should consider using document rights management tools that act as access control systems to prevent the unauthorized viewing of mission-critical assets. By using these technologies, the private sector as a whole will be able to embrace the cloud without the concern of inadvertently exposing critical information.

Big data requires next-generation planning

The Information Security Forum, widely considered to be among the world's leading information security and risk management bodies, recently said the advent of big data has introduced a number of document security concerns. Regardless of the potential benefits the technologies provide, decision-makers need to address vulnerabilities as soon as possible or risk exposing confidential information, according to a FierceMobileIT report.

"Organizations must prepare for the unpredictable so they have the resilience to withstand unforeseen, high impact events," said Steve Durbin, global vice president of the ISF, according to the news source.

Durbin said companies should think about the evolving risk landscape in terms of how threats can affect their most valuable resources and daily operations. In doing so, decision-makers can develop robust document protection strategies that will ensure the safety of confidential data.

As big data continues to disrupt the private sector, general security and business continuity initiatives need to take the projects into account. If decision-makers do not acknowledge the evolving threat environment, they risk exposing mission-critical resources and damaging their reputation.

Study: Businesses unaware of security vulnerabilities

A new study by B2B International revealed that roughly half of companies around the world are unaware of the document security issues they face each day. The survey, which polled more than 3,300 senior-level IT professionals, also found that approximately 58 percent of respondents lack the necessary resources to ensure mission-critical information remains safe.

Thirty-five percent of decision-makers said they do not have the appropriate number of trained personnel, B2B International noted. This issue needs to be tackled with intensive training programs, not just the hiring of new employees.

"Increasing the level of computer literacy among staff is an essential element of security, while senior management needs to be fully aware of the potential consequences of cyberthreats and understand that reliable protection of the corporate network is vital in ensuring the effective development of a company's IT infrastructure," security expert Eugene Kaspersky said.

Decision-makers should consider educating employees in access control policies, which limit an individual's ability to view classified material without the proper credentials. This, along with general security best practices training, will likely enhance document protection initiatives.

Firms must not overlook document protection responsibility in cloud

European Data Protection Supervisor (EDPS) Peter Hustinx recently issued a warning for organizations using the cloud, emphasizing the importance of document protection.

In an opinion titled "Unleashing the potential of Cloud Computing in Europe," Hustinx advocated for the creation of standard clauses for cloud computing contracts that would clearly define where responsibility lies regarding the protection of data stored in the cloud.

"We must ensure that cloud service providers do not avoid taking responsibility and that cloud customers are able to fulfil their data protection obligations. The complexity of cloud computing technology does not justify any lowering of data protection standards," wrote Hustinx.

Hustinx noted that currently, the organization utilizing the cloud, not the vendor, is responsible for all necessary document security.

However, as a recent study revealed, not every firm manages to achieve a sufficient level of protection when utilizing the cloud. Conducted by V3, the study found that among IT professionals working for U.K. businesses using the cloud, more than half believed their employers were ill-informed regarding relevant data protection laws.