Opportunity

By Karen S. Henrie  |  Posted 05-18-2006 Print Email
Problem

Industrial espionage and regulatory demands shine a spotlight on document security.
When executive search firm Sterling-Hoffman acquired two research facilities in India last year—thereby doubling its employee count, from 150 to 300—CEO Angel Mehta quickly ran into problems securing the company's intellectual property. "Emerging markets are like the Wild West, times ten," says Mehta. "In places like India and China, -industrial espionage is commonplace." Companies routinely bribe competitors' employees for information, he says, or they have their own people pose as a competitor's employees and steal it.

Sterling-Hoffman, based in Mountain View, Calif., specializes in recruiting sales and marketing executives for software companies in North America; the firm is training its India-based researchers to help track market trends, executive movements, mergers-and-acquisitions activity, and other events. That intelligence represents the company's stock-in-trade, and most of it is stored in PowerPoint slides, PDF files and other standard document formats. Faced with the possible loss of information to competitors, Sterling-Hoffman's ability to freely share critical documents was -seriously hampered. "We couldn't give researchers the documents necessary to train them, and we found ourselves imposing impractical workarounds," Mehta says.

Sterling-Hoffman isn't alone in its desire to tighten document security. According to a report by Provizio, a competitive-intelligence company based in Meridian, Idaho, U.S. companies lost $133 billion as a result of proprietary information theft in 2005, up from $59 billion in 2002.

To secure their information, a small but growing number of companies have borrowed a page from the digital-rights-management playbook and adopted many of the same tactics used by purveyors of videos, music, and other electronic content to protect their wares from commercial piracy and file sharers. According to a recent Gartner Inc. report, enterprises are now "applying DRM principles to enterprise messaging, documents and intellectual property," using so-called enterprise-rights-management technologies to help control who can read, copy, print, export, save and edit documents, and when.

Ask your IT security team:

What measures do we currently take to protect individual documents?

Ask your compliance officer:

Does our compliance strategy adequately address document security requirements?

Story Guide:
Digital Rights for the Enterprise Secures Sensitive Documents. Enterprise-rights management is still in its early stages, but most CIOs acknowledge a need for better document security.

  • Strategy: Enterprise-rights management controls who can do what with content, and when.
  • Limitations: ERM products remain poorly integrated with other IT processes and applications.
  • Future: Attaching rights to documents is poised to become easier, as vendors acknowledge that ERM is a feature, not a standalone market.

    Click here to download a PDF of our Enterprise Rights Management fact sheet



  •  

    Submit a Comment

    Loading Comments...