Content Protection for Secure Repository Data Extracts
A chemical company uses a proprietary document management system to secure their intellectual property and trade secrets. This secure repository exists outside SharePoint and requires strict control of documents as they leave the repository. With rms:anywhere®, the company is able to:
- limit direct user access to the secure repository
- ensure that any data leaving the system is individualized and protected with RMS
- provide an extensive audit trail of document movement and usage
- expire documents
- distribute protected documents via less secure transport (e.g. email or web server)
- provides RMS features to Office documents (xlsx, docx, pptx, and pdf) just like SharePoint, but also extends it to include image, text, and markup files (jpg, png, gif, tiff, txt, xml). Any file type can be individually encrypted (but without Rights Management).
One-step Integration with Existing Enterprise Content Management Solutions
A document management solution requires higher security for convenience copies leaving the secure repository. By leveraging rms:anywhere® and it’s “Protect and Return” capabilities, the ECM solution is able to provide granular rights management and document encryption without having to integrate directly with the Microsoft environment. By sending only the end user’s email address and protection template details, the ECM is able to insert a single step in it’s workflow to place a secure wrapper around the data, yet maintain distribution capabilities.
Encryption, Rights Management, and Distribution for Intra-company Sensitive Documents
A financial services company needs a secure corporate dropbox. Among its requirements are: content protection assurance, auditing, and flexible distribution. rms:anywhere® meets this need by providing storage for individually encrypted and rights managed documents accessible on the corporate intranet. Unlike similar solutions, rms:anywhere® does nto require the company to maintain unprotected copies of documents on servers accessed by system administrators. Storage is managed with a housekeeping process to automatically remove documents as they expire.