Symantec DRM control into data protection
Hello,
I am working for data managing enterprise. I want to know in data loss scenario, how we can prevent data issue.what we are need to fix it? Can we fix by using third-party encryption and digital-rights management controls? Anyone knows about this? Any suggestion??
Re: Symantec DRM control into data protection
Symantec DLP Suite v. 10 is the solution to your query.It have the ability to find sensitive data was left unprotected in the company and implement security controls on encryption products and management of digital rights of publishers such as PGP, Oracle, GigaTrust, machines and liquid Microsoft.Symantec also publishes a set of open APIs and a software development kit (SDK) to facilitate support for security controls through incremental revenue, "says Rob Greer, senior director of product management at Symantec.
what is Symantec DRM control
Symantec DLP Suite v. 10 should be closer links with other Symantec products. For example, the update will be integrated with Symantec Security Information Manager to centralize the collection and correlation of events and record data to determine the security state. TSymantec DLP Suite v. 10 should be closer links with other Symantec products. For example, the update will be integrated with Symantec Security Information Manager to centralize the collection and correlation of events and record data to determine the security state. authorized to access data, and that's exactly what they are or are not allowed to do with it. This is the equivalent of a bodyguard who travels with the data granular decisions about how it can be accessed and used. Rights include actions such as reading, change , cut and paste, email, copy, move, except for portable storage and printing. DRM is extremely powerful but can be difficult to implement on a large scale.
Re: Symantec DRM control into data protection
Today, the DRM is most useful for protecting highly sensitive data in workgroup where the granular control is most needed. It includes situations such as teams of engineers, customer data unstructured future product plans, and engineering, product, or technical content. Organizations typically use DRM to protect against data theft to both external and internal abuse authorized users.DRM requires extensive integration with enterprise applications, anything that touches the file, such as word processing, should be broadened to include digital rights management and access to the file. DRM is very manual and difficult to implement on a large scale. Users need to understand that the rights that apply to users on the content to a level of complexity that usually results in employees ignoring DRM and leading to unproductive projects that do not improve safety . As for encryption, companies must rely on manual decision to implement the rights, since the DRM tools are not able to understand the content. DRM successful deployments are generally limited to users of small groups of highly skilled work.