Stop the leak: Rights management survey confirms route to properly protecting content

Sarbanes-Oxley and HIPAA compliance are driving enterprise rights management (ERM) solutions adoption, according to security solutions supplier GigaTrust, which offers a new research report documenting the explosive growth of ERM.<br/>


Sarbanes-Oxley and HIPAA compliance are driving enterprise rights management (ERM) solutions adoption, according to security solutions supplier GigaTrust , which offers a new research report documenting the explosive growth of ERM.
The GigaTrust survey, commissioned in part by GigaTrust and conducted by the Gilbane Group with the assistance of the University of Massachusetts-Dartmouth , highlights how ERM is being viewed not only as a benefit to an organization, but also as a business opportunity. Barriers to implementation are eroding as executives are becoming more familiar with the benefits of the technology.
“The survey results indicate ERM is on a strong path of steady growth,” says Bill Rosenblatt, a senior analyst with Gilbane Group and the report’s lead author. “As IT managers and organizations become more comfortable with the uses, applications, and advantages of the technology, ERM will play a bigger part in corporate security infrastructure.”
Of respondents who have implemented ERM in their organizations, half said the implementation was across the whole enterprise. The most often-cited reason for ERM implementation—by 25 percent of respondents—was to protect confidential information from leaking outside of the enterprise. Complying with industry regulations or standards was cited as a significant reason for adoption of ERM, with Sarbanes-Oxley (24 percent) and the Health Information Portability and Accountability Act (18 percent) cited as the two primary compliance vehicles
Additional key findings from the ERM report include:
1. Along with regulatory compliance, respondents cited three types of business processes involving confidential information that were the most prevalent for ERM implementations: client/customer communications, financial processes, and medical patient care.
2. Large proportions of respondents’ organizations are implementing (or will implement) ERM integrated with content management systems or some variant of content management technology, such as knowledge management or collaboration.
3. For those that have not implemented yet, only 12 percent claimed there was insufficient business justification or executive sponsorship.
As ERM progresses into a must-have security approach, GigaTrust is building its email and content security software products to adhere to the complex regulatory compliance and corporate governance requirements that many organizations face. GigaTrust’s tools provide support for organizations of any size, securing content in multiple file formats like PDF and across all means of content/document distribution, such as Web portals like Microsoft ’s SharePoint and mobile devices like BlackBerry.
Read the full report.

No comments
The Engineers' Choice Awards highlight some of the best new control, instrumentation and automation products as chosen by...
The System Integrator Giants program lists the top 100 system integrators among companies listed in CFE Media's Global System Integrator Database.
The Engineering Leaders Under 40 program identifies and gives recognition to young engineers who...
This eGuide illustrates solutions, applications and benefits of machine vision systems.
Learn how to increase device reliability in harsh environments and decrease unplanned system downtime.
This eGuide contains a series of articles and videos that considers theoretical and practical; immediate needs and a look into the future.
Make Big Data and Industrial Internet of Things work for you, 2017 Engineers' Choice Finalists, Avoid control design pitfalls, Managing IIoT processes
Engineering Leaders Under 40; System integration improving packaging operation; Process sensing; PID velocity; Cybersecurity and functional safety
Mobile HMI; PID tuning tips; Mechatronics; Intelligent project management; Cybersecurity in Russia; Engineering education; Road to IANA
This article collection contains several articles on the Industrial Internet of Things (IIoT) and how it is transforming manufacturing.

Find and connect with the most suitable service provider for your unique application. Start searching the Global System Integrator Database Now!

SCADA at the junction, Managing risk through maintenance, Moving at the speed of data
Flexible offshore fire protection; Big Data's impact on operations; Bridging the skills gap; Identifying security risks
The digital oilfield: Utilizing Big Data can yield big savings; Virtualization a real solution; Tracking SIS performance
click me