Corner Image

Vitrium Content Security and DRM Blog

Welcome to a world of content security, Digital Rights Management, and content tracking and analytics.

Get DRM Security Insights

Recent Blog Posts

Study: Government IT executives prioritize security

Apr 2, 2013 3:14:00 AM

The government, like the private sector, is highly susceptible to evolving digital risks. For this reason, federal, defense and intelligence agencies are prioritizing document security initiatives to keep confidential resources protected in the age of adversity, according to a new study by Lockheed Martin.

Read More

Healthcare encryption strengthens document security

Mar 25, 2013 3:11:50 AM

As with so many other industries, healthcare is continually fighting an uphill battle in an effort to minimize data breaches. While there are many tools that can be used to strengthen document protection and reduce digital vulnerabilities, encryption is among the most efficient and effective, according to an InformationWeek report.

Read More

Planning, gathering security intelligence

Mar 21, 2013 3:44:40 AM

Security intelligence, or information regarding the evolving risk landscape, is a critical part of any document protection strategy, as decision-makers need to understand how resources are being accessed and used to safeguard them. The concept of security intelligence is rapidly changing, however, and executives need to develop unique plans to ensure confidential solutions are protected.

Read More

Clouds to be safer in future, experts say

Mar 18, 2013 4:22:37 AM

Despite the proliferation of cloud computing, many skeptics believe the hosted environments are not secure enough to keep sensitive documents safe. Other pundits, however, think this will change in the coming years.

Read More

Study: SMBs not meeting PCI DSS

Feb 13, 2013 3:08:37 AM

Small and medium-sized businesses, also known as Level 4 merchants, are not doing enough to remain compliant with payment card industry data security standards, according to a new study by ControlScan and Merchant Warehouse. The survey, which polled more than 600 companies, revealed that both online and brick-and-mortar SMBs are not placing enough emphasis on document protection.

Read More

Security initiatives must consider human factor

Feb 6, 2013 3:30:06 AM

Data breaches can have devastating consequences for companies, as exposing sensitive information can lead to damaged reputations, lost customers and fines due to failure to comply with regulations. Decision-makers need to be proactive, not reactive, regarding these situations, as implementing advanced document protection strategies may help firms avoid breaches altogether, according to an FCW[...]

Read More

No security initiative is too complicated to tackle

Jan 30, 2013 3:02:13 AM

While document security and encryption strategies are vital if organizations want to keep sensitive information away from outsiders, decision-makers need to understand the digital landscape if initiatives are to be effective. This received attention in a recent Dark Reading report, which found that some agencies claim deploying robust protective strategies is too complicated.

Read More

Canadian Government Loses Personal Information of Student Loan Borrowers

Jan 22, 2013 1:56:58 PM

Human Resources and Skills Development Canada notified news sources a couple weeks ago that a hard drive with the personal information of 583,000 Canada Student Loans Program borrowers was lost in November. The portable device contained student names, social insurance numbers, dates of birth, contact information and loan balances of borrowers from 2000 to 2006. The device also included the[...]

Read More

Businesses need to plan future security strategies

Jan 15, 2013 3:13:36 AM

Companies of all sizes need to stay on their toes as the digital landscape evolves and organizations increasingly use electronic records rather than traditional paperwork. According to a report by Symantec, decision-makers need to plan ahead so their document protection initiatives can support future growth.

Read More

Robust security tools lead to protected cloud environments

Jan 8, 2013 12:52:06 AM

Cloud computing is quickly gaining momentum in the private sector, especially as bring your own device and other mobile initiatives continue to see brisk adoption. Unfortunately, many decision-makers are still slightly intimidated by the cloud and, as a result, reluctant to trust the technology's document security capabilities.

Read More

Minimizing breaches with monitoring procedures

Dec 18, 2012 12:51:23 AM

Meeting the payment card industry's security requirements can be a challenge for organizations that don't take the proper precautions to keep highly sensitive information protected. Retail decision-makers, especially those at online-focused outlets, need to eliminate any security vulnerabilities by implementing advanced access management strategies that prevent unauthorized individuals from[...]

Read More

Mobile computing requires new security practices

Dec 11, 2012 12:24:49 AM

As mobile computing strategies continue to take off in the private sector, decision-makers need to conduct thorough risk assessments to ensure document security projects are not jeopardized by next-generation technological initiatives. Unfortunately, many organizations are simply unprepared for the mobile phenomenon, according to a report by Dark Reading.

Read More

Planning ahead can minimize document security vulnerabilities

Dec 4, 2012 1:23:40 AM

Although identity and access management projects can dramatically enhance document security, decision-makers need to ensure the processes are properly carried out, as blundered efforts can have significant negative side effects.

Read More

Study: SMBs have trouble keeping up with IT changes

Nov 27, 2012 1:22:32 AM

Small and medium-sized businesses (SMBs) are constantly fighting an uphill battle in today's unpredictable economy. Since they don't have as many resources as larger firms, SMBs are finding it difficult to keep with with the constantly evolving technological landscape, according to a new study by SWC Technology Partners.

Read More

Insider threats may jeopardize document security

Nov 20, 2012 1:39:03 AM

Keeping sensitive digital documents protected is a priority for many businesses, leading decision-makers to implement advanced security tools. Unfortunately, insiders go unnoticed even though they are often the culprits behind data breaches, according to a report by Dark Reading.

Read More

Passwords, encryption become more important for businesses

Nov 13, 2012 2:06:15 AM

Protecting online resources is becoming increasingly important throughout the private sector, especially as companies around the world continue to use cloud and mobile computing technologies. While leveraging access and identity management tools can enhance document security, some firms are not emphasizing the proper use of these solutions.

Read More

Big data strategies require security

Nov 6, 2012 3:36:04 AM

A survey at the recent IT EXPO conference revealed that analyzing and using big data can help companies improve overall performance and customer service. The study revealed that roughly half of attendees are either looking into how big data can help their organization, considering developing a strategy or already have one in place.

Read More

Advanced tools strengthen cloud security

Nov 6, 2012 3:31:53 AM

Cloud computing is slowly reaching mainstream adoption in the private sector as companies try to enhance cost savings and overall efficiency as much as possible in today's economy. However, many decision-makers are still hesitant to adopt the solutions because of the perception that the cloud's document security capabilities are not optimal.

Read More

Report: Cloud security concerns threaten deployment success

Oct 30, 2012 2:09:43 AM

Companies are turning to cloud computing more frequently than ever before in an effort to store mission-critical resources in safe, off-site environments. Unfortunately, many decision-makers are not placing enough emphasis on document security tools and practices and are unable to successfully implement the cloud without problems, according to a study by CipherCloud.

Read More

Keeping documents safe during the mobile era

Oct 25, 2012 1:55:47 AM

Today's business world is no longer constricted by traditional bounds like desktop computers and phones. Instead, companies are adapting to the wireless work style to enhance performance and efficiency. While embracing to mobility can be beneficial, decision-makers need to understand where their sensitive documents reside and fully grasp the tools being used to keep them safe, according to a Help[...]

Read More