Curated for content, computing, and digital experience professionals

Tag: DRM

Open Text Announces Rights Management Services for ECM Suite

Open Text Corporation, a provider of Enterprise Content Management (ECM) software, announced Rights Management Services (RMS) for the Open Text ECM Suite designed to safeguard confidential and sensitive information from unauthorized uses even after it leaves the content repository. Though the content may be stored in a secure repository, once users have the right to read a document and save it on their local drives, the content becomes vulnerable. Open Text Rights Management Services lets organizations augment their strategies with protection that remains with the content. Rights Management Services works by enforcing content protection constraints for documents and other content based on rules such as “do not email,” “do not print” or “do not save locally.” The application then encrypts the content and the publishing license together. The content and rights remain encrypted during transport, extending security to wherever the content travels. When a recipient opens rights-protected content, a request goes to a rights management server to validate the user’s credentials and usage rights. Round-trip scenarios are also supported allowing editing and uploading of new versions that retain the rights management constraints. As a shared service in the ECM Suite, Rights Management Services are also available to any content application in the organization. Protection spans Microsoft Office 2003 and 2007 applications as well as PDF, HTML, engineering drawing file formats, image files, ZIP, archives among others. Users can also read and protect content viewed on BlackBerry smartphones. The Open Text RMS solution takes advantage of the Active Directory Rights Management Service from Microsoft. Open Text is also partnering with both GigaTrust and Liquid Machines, to add support for specialty content types such as computer-aided design (CAD) files, Visio, Adobe PDF, graphic files, and many other file formats, plus rights management support for documents available via BlackBerry devices. Open Text Rights Management Services for the Open Text ECM Suite is available now. Partner offerings are also available now directly through the partners.

Adeptol Partners with VersaPAC

In a move to strengthen reach in the Asian market, Adeptol announced that it has signed a partnership agreement with VersaPAC, a solution provider of information management systems and reseller of HP TRIM records management software.  With the partnership VersaPAC is moving from a legacy viewing system to Adeptol’s document viewing technology embedded in its Saffron web front-end application for HP TRIM. Saffron is available through VersaPAC resellers in Australia, Malaysia, New Zealand, North America, and the United Kingdom. The integration allows Saffron to support viewing of over 300 file formats including documents from Microsoft Office, OpenOffice, various image files, and Adobe PDF.  Users will have access to the latest features such as document search, annotations, and document conversion to PDF – all from the viewer. Adeptol Document Viewer is a web-based viewer using Ajax technology, and is a built-in Information Rights Management (IRM) module that allows users to protect content by assigning policies to control the viewing, printing, navigating and saving of documents.

New Gilbane Study Indicates Growing Demand for Enterprise Rights Management

Increasing awareness, growth of technology adoption enables Gilbane Group to create landmark study of current ERM practice

Cambridge, MA, Sept 16 – Gilbane Group, Inc., the analyst and consulting firm focused on content technologies and their application to high-value business solutions, today released the industry’s first reliable picture of enterprise rights management adoption in its new study, Enterprise Rights Management: Business Imperatives and Implementation Readiness. The growth in the number of companies adopting or planning to adopt means that for the first time, enough data exists to produce a study that is meaningful for users and vendors alike. As a result, Gilbane Group’s new report presents the most comprehensive publicly available research on the ERM market ever undertaken.

ERM: Business Imperatives and Implementation Readiness is backed by qualitative and quantitative research on general awareness of ERM, the current state of ERM deployments or plans to deploy (or decisions to avoid the technology), and target applications. According to study data:

  • Protecting confidential information from leaking outside the organization is the primary motivation driving ERM adoption.
  • ERM is becoming important for supporting information usage regulations such as Sarbanes-Oxley (accounting) and HIPAA (healthcare).
  • Apart from regulatory compliance, client/customer communications and financial processes are other types of business processes involving confidential information that are the most prevalent for ERM implementations.
  • 55% of ERM implementations are integrated with content management solutions (including knowledge management and groupware/collaboration).

“The study reports increasing awareness of the significant risks associated with information leakage and the business processes that are most vulnerable. Our research shows that companies are taking more focused steps to address those risks, including implementation of enterprise rights management,” said study leader Bill Rosenblatt, Senior Analyst, Gilbane Group, and President, Giant Steps Media Technology Strategies. “At the same time, infrastructure obstacles to implementation are eroding. This is making it easier for companies to adopt solutions, which is certainly good news for ERM vendors.”

“The study confirms the steady growth in the ERM market that we have been experiencing ourselves over the past few years,” said Dr. Kyugon Cho, CEO of, one of the study’s Platinum Sponsors. “Moreover, the survey respondents cite a breadth of applications for ERM that go beyond what we have seen from our own customers. This makes us even more optimistic about the future of ERM.”

“This study reinforces GigaTrust’s focus on adding the types of extensions and enhancements for ERM that meet customer requirements and speed deployments. With these findings we think Gilbane will also help spur adoption as organizations see that their situation is not necessarily unique and that there are solutions out there to meet their needs,” said Brad Gandee, VP Product Marketing and Management at GigaTrust, also a Platinum Sponsor of the Gilbane study.

Gilbane Group’s study methodology included a survey of over 200 senior IT, security, and content management professionals across a range of vertical industries, conducted in cooperation with the Center for Marketing Research at the University of Massachusetts Dartmouth. The research also draws on in-depth case studies on ERM deployments at six multinational companies; the case studies are included in the report.

Enterprise Rights Management: Business Imperatives and Implementation Readiness is available as a free download from the Gilbane Group website at The report is also available from study sponsors EMC,, GigaTrust, and Microsoft.

About Gilbane Group
Gilbane Group Inc. is an analyst and consulting firm that has been writing and consulting about the strategic use of content and information technologies since 1987. Clients include organizations of all sizes from a wide variety of industries and governments. Gilbane works with the entire community of stakeholders including investors, enterprise buyers of IT, technology suppliers, and other consultant and analyst firms. The firm has organized over 50 educational conferences in North America and Europe. Its widely read newsletter, reports, white papers, case studies and analyst blogs are available at

Learn about “Enterprise” Digital Rights Mananagement

Digital Rights Management (DRM) gets a lot of bad press about its use and misuse, much of it well-deserved. But there is a less controversial use of DRM technology for corporate applications. “Enterprise DRM” complements content management, firewalls, and other technologies in helping to ensure that sensitive information such as confidential documents, email, and application data do not fall into the wrong hands or get used in ways it shouldn’t. Much corporate content needs to be managed according to certain rules (having nothing to do with copyright) that are outside the scope of workflow processes, and organizations are paying attention.
Our upcoming Conference on Enterprise DRM at Gilbane San Francisco is the first event devoted exclusively to DRM for corporate applications. The conference, chaired by Bill Rosenblatt of DRM Watch, will be a unique opportunity to explore DRM technologies and how they apply to a wide variety of business environments and technology architectures; several vendors will be on hand to demo their solutions. The program will include several case studies of Enterprise DRM deployments in such applications as financial services, human resources, high-tech manufacturing, and distance learning. The program will also feature leading analysts, including Rosenblatt, Jarad Carleton of Frost & Sullivan, and Trent Henry of Burton Group who will present a framework for analyzing Enterprise DRM solutions.
Executives from Enterprise DRM vendors, including Adobe, Cloakware, EMC/Authentica, Essential Security Software,, Intelligent Wave, Liquid Machines, SealedMedia, and WorkShare will offer insights into technology and the market. The conference will feature panel discussions on technology issues such as Enterprise DRM for mobile devices, secure inter-enterprise collaboration, and integration of Enterprise DRM with content management.
DRM Watch and Gilbane readers can get a special $100 discount off the eDRM conference price of $495 by registering online with discount code “drmwatch”.

Is Anyone Still Talking about DRM Transactional Infrastructure?

Bill Trippe’s post on January 04, 2005, “ECM and Business Process Management,” and the discussion emerging from Bill Zoellick’s post on January 08, 2005, “Sarbanes-Oxley: Too Narrow?” (especially comment by Glen Secor) make me think about the issue of DRM transactional infrastructure. Glen Secor’s comment, especially, while framing the compliance issue more usefully in regard to effective implementation strategies, also helps highlight the significant challenge ahead for DRM (or, in Glen’s usage, ERM, for enterprise rights/[business]rules management).

When the scope of integration becomes as wide as Glen argues it must, it seems to me that the DRM infrastructure requires ubiquity. After all, what we’re talking about is governing content not just between and among departments within an enterprise, but also among partners, suppliers, regulators, and a dozen other categories of participant that aren’t necessarily easily anticipated. The good news is that the DRM approach to security, compliance, and business process integration of content is theoretically flexible and applicable—arguably the best single strategy to show up to date. The bad news may be that theory will move to practice only when a sufficient DRM transactional infrastructure emerges.

But what is a sufficient DRM infrastructure? At best it would be one or a number of trusted environments that provide ubiquitous business rule transaction management common to all participants, so that enterprises could concentrate on defining and associating the business rules needed with all types of content. Since DRM platforms must not only accept and manage rules associated with content, but handle financial transactions and regulatory demands (among other things), and since the advantages of electronic commerce brings with it fast-changing relationships and conditions, the best solution is to use a DRM system in which all others can and will participate.

There are reasons for hope, albeit, perhaps, not in regard to a quick-to-emerge DRM ubiquitous infrastructure. XML-based common meta-data structures provide portability and platform independence to a large degree, and there have been some early efforts toward defining DRM meta-data with XML (ContentGuard’s XrML being the best known, but hardly the only effort). In short, the general industry trend toward abstracting meta-data above platforms means that DRM in the enterprise already has some applicable structure. However, apart from some limited examples—Authentica and Adobe come to mind—there’s still not much in the way of DRM “editorial interfaces” (i.e., rules definition and association) for content management. Fortunately, there’s little barrier to the creation and improvement of such interfaces, and preferably within CM platforms themselves.

But the question remains: is widespread compliance, security, and business processes associated with content likely without a general infrastructure such as the “Trusted Environment” on the Intertrust model? There are plenty of small- and mid-sized companies that won’t be able to afford particular DRM solutions that are not generally addressable. There is a great amount of work left to do to bring DRM into the enterprise, and while some pieces of the puzzle are in place or on their way, I wonder if the lack of working generalized trust environments remains the missing necessary piece for all sorts of “content governance” implementations.

© 2020 The Gilbane Advisor

Theme by Anders NorenUp ↑