IRM (Information Rights Management)

 

Combining with DLP data leakage prevention measures, which can provid complete confidential data leakage protection! IRM FileSecure is not limited to diverse application systems and versions, and companies can easily create file management policies.
 
 
This policy can address four issues of information rights that derive from DLP:
 
‧ WHO can use the information
All users and groups inside and outside the enterprise can be given access to information
‧ WHAT can each person do 
All users and groups inside and outside the enterprise can be given access to information
‧ WHEN can he use it
The usage of information is controlled by time, for example, only on 9/25 days or only for two days…etc
‧ WHERE can he use it from
The access control and location integration of information, such as the office on the third floor, or the Private / Public IP address
 
 

Function and benefit
 
  • The most commonly used file formats are supported
GTB IRM can support the most common file formats for businesses such as doc, xls, ppt, pdf, txt, gif, jpg, bmp, jpeg, Open Office, AutoCAD, and will continue to support more file formats.
  • Support for offline use
This function can help those who are unable to access the network while on the go. Therefore, the user can get the authorization after opening the file in the networked state.
  • Diversity client environments
Any Information on personal computers, servers or any other file storage centers can can be protected.
  • The document has a complete audit of authorized activities and illegal attempts within or outside the enterprise
The audit trails for all activities of the document can be centrally collected to ensure that deviations are captured early and that regulatory compliance is easily ensured.
 
  • Manual and automatic file protection

File protection can be performed manually on personal computer or automatically through the policy server.

  • LDAP integration

Support for LDAP, such as AD (Kerberos-based authentication),can quickly deploy and eliminate the need to maintain multiple account storage.

  • Easy to install and deploy

Quickly deploy in computers of large network architectures with MSI installation and deployment methods.

  • There is no limit of information dissemination
The dissemination of information can occur in existing channels, such as email, CDs, fileshares, etc., without any changes in the process. In general, secure propagation channels will be removed and the FileSecure security mechanism will be adopted.
 
  • File protection includes internal and external users of enterprise
The editing and usage rights of the documents can be applied to the internal and external customers, business partners and employees. This means there are no restrictions on the use of legal documents. 
 
  • Screen Capture prevention
Prevents screen content from being captured through print Screen or other tools such as Snag-It.
 
  • Dynamic file usage policy
The definition of dynamic usage policy indicates that the file usage policy can be changed even after the file has been disseminated, thus the business status and business partnerships can be continuously presented.
 
  • Template-based permission table
The privilege template is similar to the definition “2014 Annual Sales Plan” to simplify the needs of decision-making for users.
 
  • Web management interface
Administrative features, such as usage rights management, compliance reporting, etc., are carried out through the Web UI.

  • Easy to integrate enterprise applications
Existing enterprise applications, such as the document management system and the workflow system, can be integrated through the API. Protected files can be produced directly in the application system.
 
  • High availability (HA)
Policy Server achieves high usability through hardware load balancing devices, as well as HA-based database systems and web servers.
 
COPYRIGHT © 2019 RUITING CO., LTD.