Corner Image

Vitrium Content Security and DRM Blog

Welcome to a world of content security, Digital Rights Management, and content tracking and analytics.

Get DRM Security Insights

Recent Blog Posts

5 DRM Mistakes Publishers Make

Mar 10, 2016 1:28:44 AM

Digital rights management (DRM) is a technological constraint on what a user can do with a document. DRM involves some form of encryption that locks a document to a user’s identity, so they can’t share with any unauthorized readers. DRM has become one of the more important topics for publishers however, are they utilizing DRM at its fullest? Here are the 5 DRM mistakes publishers make.   1.[...]


Mar 7, 2016 11:58:40 AM

View the PDF ❯

The company uses Vitrium Security to protect its electronic systems design training materials.

“Vitrium Security provides a seamless reading experience for our students without requiring any plug-ins or apps to download. It's also easy for our team to use and we can apply the right level of security to our documents, thus preserving our revenue streams." - Matt Bridle, Doulos


The Rise of Cyber Insurance – Is It Really Worth it?

Feb 25, 2016 7:32:59 AM

Cyber liability insurance has been around for more than 10 years but most people probably have never heard of it. So what exactly is cyber insurance? It is an insurance product that is used to protect an individual user or a business from cybercrime. Coverage typically includes data breaches, hacking, theft, extortion and denial of service attacks. Policies will vary depending on the size of the[...]

Cybersecurity is Not Just IT’s Responsibility

Feb 18, 2016 1:39:53 AM

Cybersecurity refers to the collection of technologies, processes and practices designed to protect networks, computers, programs and data from attack. The security of these networks has always been a number one concern for IT and something that traditionally rolls up to the CTO. More and more though, the need for a C-level role responsible for security, separate from the technology umbrella, is[...]

Lyme and Cancer Services (LCS)

Feb 10, 2016 12:04:17 PM

View the PDF ❯

LCS uses Vitrium Security to provide user-friendly secured eBooks to its healthcare patients.

“We needed to streamline our eBook process and maintain user-friendly access for our clients – cloud and HTML5-based documents was the way to go. We switched from another DRM provider to Vitrium Security because it offered web-friendly secured documents with no plug-ins or apps to[...]

Increase Revenue With Value-Added Content

Feb 4, 2016 1:51:54 AM

  The right approach to document security and DRM gives publishers the ability to add real value to their online content. This allows them to enhance the experience for their readers, and in turn, increase revenue.   Unique Content

To give you an example, software companies add value to their products through extensive customer support and regular updates. While it is easy to obtain software[...]

Podcast: Coffee in the Clouds with NYDLA

Jan 31, 2016 11:45:28 AM

Grant Burnard is the Chief Technology Officer for Vitrium and is responsible for the overall product direction of the company. He is one of the chief architects and implementers of Vitrium’s document security solution, Protectedpdf. He discuss document security with Thomas Capone from NYDLA.

Listen to Podcast

What's the Difference Between Document DRM & eDRM?

Jan 21, 2016 12:14:22 AM

The advent of digital media, combined with the internet and popular file sharing tools, has made it easier than ever to share information. Organizations now need to find ways to protect their digital information against misuse, unauthorized access, and uncontrolled distribution.


Digital rights management (DRM) is any type of technology used by publishers, copyright holders, and content owners[...]

A Quick Rundown of IP & Copyright Protection Laws

Jan 7, 2016 12:49:52 AM

The use of copyrights and other legal protections to keep content from being misused have been evolving over quite some time. The United States has always valued the freedom of expression and the press. While this has influenced how document protection and information propriety has been handled, it was not until 1976 that the bulk of copyright law as we know it came to be. Here is a brief history[...]

Why Digital Publishing is Thriving

Dec 29, 2015 12:44:34 AM

Digital publishing is now a mature, thriving industry, and yet many still insist that publishing is declining. While printed book sales dropped slightly between 2008 and 2012, eBook sales grew at an astonishing rate during that same time. Just as hand-copied books were revolutionized by the printing press, digital technologies are transforming print publishing.


The bestselling eBooks[...]

Video: Introduction to Protectedpdf

Dec 21, 2015 5:55:33 PM

Here's your introduction to Protectedpdf. In this video we highlight our software’s ease-of-use as we demonstrate the entire workflow of a new account, from setup to distribution.

5 Steps to Protect Your Company’s Privacy

Dec 10, 2015 7:38:42 AM

In today’s business world, protecting company privacy is essential. Unfortunately, the number of cases associated with online theft is rising. It is challenging to ensure company data is secure, however, taking time to understand who has access to important data and how to best protect it is well worth the investment of time and money. We’re going to identify five proactive ways in which[...]

New API Makes It Easy to Integrate Document Security With Workflows

Dec 7, 2015 2:18:52 AM

[PRWeb | Vancouver, December 7, 2015] Vitrium announced today the release of its Application Programming Interface (API) for its popular document security solution, Protectedpdf. The new API will allow developers to integrate their software and workflows with Vitrium’s DRM and document encryption software.

Developers in the document management and enterprise content management (ECM) space will be[...]

Copyright & Piracy Online – No Big Deal?

Dec 4, 2015 12:05:55 AM

How important is it to protect your intellectual properties? If you think that your content is safe, you may want to read on. Copyright infringement and online piracy may have a bigger impact than you may think.

According to a study done in 2010 by Rockwool Foundation Research Unit, about 70% of all internet users found nothing wrong in online piracy, while the Information Technology & Innovation[...]

Integrating Security Technologies With Business Systems

Nov 12, 2015 1:36:49 AM

When you lock up your house for the evening or if you are going away, you make sure that all points of entry are locked. If your home is to be targeted by a thief, they will probably not try the front door, but instead look for a vulnerable spot to enter (maybe the sliding door in the back or an open window if the season permits). It’s well known that in order to keep your family safe from[...]

It’s World Paper Free Day – November 6, 2015

Nov 6, 2015 8:17:56 AM


We’re taking the pledge to go paper free on World Paper Free Day 2015, and we want you to join us!

The Association for Information and Image Management (AIIM), a global community of information professionals, is taking the initiative to challenge the business world to use less paper and eliminate the waste that office paperwork can create. According to a recent study done by AIIM, 35% of[...]

Which Industries Are Targeted by Cyber Threats?

Oct 29, 2015 4:45:30 PM

You hear about these large scale data breaches where another big corporation becomes victim to a cyber-attack. While these news stories seem to be popping up more and more these days, the truth is cyber-attacks are happening all the time and have been for a long time. You may be wondering who these attackers are targeting and why? While the why may not always be clear, we can deduce from research[...]

National Cyber Security Awareness Month 2015

Oct 22, 2015 4:02:49 PM

"Cyber threats pose one of the gravest national security dangers the United States faces" - Barack Obama.

Sponsored by the National Cyber Security Division of the Department of Homeland Security and the National Cyber Security Alliance, October has been designated National Cyber Security Awareness Month (NCSAM).

Since its inception in 2004, National Cyber Security Awareness Month been helping[...]

Safeguarding Sensitive Financial Data

Oct 15, 2015 1:57:01 AM

Chances are your business collects and stores your customers’ personal information. This is especially true if you’re in the financial industry. You may not know, but it is your company’s legal responsibility to ensure that the data collected is handled and stored properly. If your customers become victims of identity theft because of your company’s poor practices, your company will be held[...]

The Age of Digital Everything is Here – What Does This Mean for Document Security?

Oct 1, 2015 1:05:35 AM

The age of digital everything is here. People are now able to work from wherever they are and on whatever device they choose thanks to advancements in mobile technology, the cloud and the Internet of Things. The Internet of Things is defined as a network of physical objects (things) that are embedded with software and network connectivity so that the “things” can collect and exchange data. Forget[...]

Dealing with the Weakest Link in Your Security: Your Employees

Sep 24, 2015 1:12:34 AM

Did you know that 58 percent of data breaches are caused by employees? Just recently, personal data of millions of former students of British Columbia and Yukon was exposed due to mishandling by a government employee. Security breaches have become a common occurrence. In many cases, companies fall victim to coordinated attacks by sophisticated hacker, but often network and data breaches occur[...]

Video: Web Viewer

Sep 22, 2015 5:59:59 PM

How to retrieve the secured web link for your protected document to send to your readers. This secured web link directs readers to the web viewer version of your protectedpdf document.

How Secure is Your Data in the Cloud?

Sep 10, 2015 1:10:55 AM

Cloud sharing platforms are a popular tool to share and store your documents. Those documents may be safe while they reside in your cloud account, however, have you ever wonder what happens once those files leave the secured space? They become vulnerable and anyone who gets their hands on them will be able to do whatever they want with your content.

Here are a few best practices to follow to[...]

The Worst Data Breaches in History

Sep 3, 2015 3:18:05 PM

When hackers broke into the Sony networks last November, not only was it embarrassing for several executives (and entertaining for the rest of us), but it also exposed a problem that is all too common these days. Hacking is never going to go away. Hackers will keep getting better and so will the software to prevent them, and so this cycle will go on and on. Your intellectual property and[...]

Which Documents Should You Protect?

Aug 26, 2015 11:48:17 PM

Not all documents are created with an equal purpose. Some have information that you wouldn’t mind getting released to the public; it might even benefit your company. However, others have highly sensitive data and information that would be damaging without document security. When considering a document protection plan, you’ll first need to determine whether or not your company has data,[...]

Why Do Data Breaches Occur?

Aug 20, 2015 12:38:31 PM

Data breaches seem to happening left and right these days, and companies of all different types and sizes are getting targeted. Has there been some sort of uprising of cybercriminals or are these companies just being careless? Let’s take a look at some of the reasons these data breaches occur.

Malicious Attacks

Typically when you think of data breach, you think of a malicious cyber-attack.[...]

Someone Has Plagiarized My Content – What do I do?

Aug 13, 2015 11:30:52 AM
It’s an unfortunate thing, but plagiarism occurs often in today’s digital age. So what can you do if you’ve discovered your content plagiarized? Here are a few tips you can follow if you find yourself in this situation.

Contact the webmaster

Many websites will have contact information for their webmaster. If you’ve discovered your content on someone else’s website, you can ask the webmaster to[...]

Responding to a Document Security Breach

Aug 7, 2015 2:23:03 AM

Great. The unthinkable has happened to your company. Along with Sony, Home Depot, Target, and Apple, you can add your company to the long list of recent data security breaches. With the overwhelming feeling of dread, sense of loss, and panic, there’s confusion. What do you need to do to take control of the situation? Here are some steps to take in responding to a document security breach.

1 -[...]

Preventing Document Security Breaches – Toolkit

Jul 30, 2015 2:02:48 PM

A data breach is defined as the unintentional release of secure information to an untrusted environment –also known as a data leak or a data spill. Facebook, LinkedIn, eHarmony, Apple and the US Army have all been victim to such “accidents”. I tend to think that data breach is intentional, and I have numbers to back me up!

JP Morgan Chase, Home Depot, Target, Adobe, Sony – just google it, the[...]

How Data Breaches Can Affect Brand and Reputation

Jul 23, 2015 12:03:31 PM

It is a big lost for any organization experiencing a data breach. In terms of impact on reputation, not all data breaches are equal. Some breaches are more devastating than others to an organization’s reputation and brand image. However, most organizations do agree that their reputation is one of their most important and valuable assets.   Data protection and security are critical elements in[...]