Capping IT Off

Capping IT Off

Tech Predictions 2009: A more sensible approach to de-risking data loss

Category :

This is one that should have happened a while back, given that all the technology pieces are in place and readily available, but fear not, 2009 will be the year for comprehensive information rights management. Yes, I said it. The technologies that can be used to provide persistent protection for enterprise content have existed for several years as a product, or suite of products, known as Enterprise Digital Rights Management (ERM), or more recently Information Rights Management (IRM). Unfortunately, the take-up of these products has not been as robust as might reasonably be expected for such a useful enterprise capability. It quickly became clear that these types of defensive technologies, which do not generate immediate / obvious revenue, are relatively expendable in pursuit of the bottom line. Perhaps, as a consequence, the industry recently underwent consolidation, (mostly through acquisition by larger players), into a handful of information lifecycle management solution providers that offer Enterprise DRM / Information Rights Management solutions among their arsenal of products and capabilities. Key players now include: Adobe, Microsoft, Oracle (via acquisition of Stellent / SealedMedia), EMC (via acquisition of Documentum & Authentica) and Liquid Machines. So what has changed, and why should 2009 be any different?

  1. Well for one thing, the frequent reports of data loss incidents mean that the corporate world has had to start looking at ways to prevent future mishaps. However, even current initiatives like wholesale corporate data encryption and data loss prevention strategies are not totally fool proof; therefore many organisations are still likely to need a more effective approach towards managing and securing information, especially one that will work even after data is lost or misplaced.
  2. Secondly, there are signs that ERM vendors are waking up to the key role they have to play in creating the ecosystem of solutions required to tackle data loss issues head-on. For example, some vendors have begun integrating their ERM products with existing Data Loss Prevention systems in order to provide effective control of information, both within and outside the enterprise security perimeter, (i.e. in the Jericho philosophy of deperimeterised security).
  3. Finally, although ERM is a direct offshoot of media Digital Rights Management (DRM), and provides similar capabilities for content control, it is unlikely to face the same fate as the latter, (see more on this from my DRM blog), for the simple reason that they serve very different markets / needs. A recent study of the ERM market shows a steady increase in awareness and adoption by organisations in various sectors like finance, healthcare and IT consulting among others
. In light of the above, I believe it that we shall start to see more examples of holistic security and information management as a major step towards mitigating the risk of data loss. The solutions, like the problems they solve, are not restricted to one product, channel or strategy; therefore it would most likely be achieved via a combination of components that include: ERM / IRM solutions; DLP systems; enhanced Information Security Policies; and the traditional corporate security and perimeter defence mechanisms.

About the author

Jude Umeh
8 Comments Leave a comment
Nice prediction. Very plausible and very necessary.
Btw, thanks for personally informing me (by phone, which is by far the most secure way, or isn't it?) that you were going to publish this. ;-)
Jude,
Excellent article and thanks for plugging DRM Watch and my ERM study for Gilbane.
I think your prediction is right on the money, and in fact it's echoed in the speech that John Thompson, CEO of Symantec, gave at this year's RSA conference - text available at <a href="http://www.symantec.com/content/en/us/about/media/leadership/John_Thompson_RSA_2008_Speech_with_QA.pdf." rel="nofollow">http://www.symantec.com/content/en/us/about/media/leadership/John_Thompson_RSA_2008_Speech_with_QA.pdf.</a> I have been expecting Symantec to make a move into the ERM space, such as acquiring one of the remaining independent ERM vendors like Liquid Machines.
Hey Jude .. excellent take on the ERM market and on the comparison of IRM with DRM I recently read Vishal Gupta's take ( <a href="http://edrm.blogspot.com" rel="nofollow">http://edrm.blogspot.com</a> ) on this and I quite agree with his views
There are a couple of companies which are doing pretty well in this space in Asia i.e. Fasoo (www.fasoo.com ) and Seclore ( www.seclore.com ). I have seen some of the Seclore implementations and the technology is maturing.
jumeh's picture
Thanks for the kind comments. I really think this will come to pass sooner rather than later, so should be interesting one to watch.
This is a long slow hill that we must climb, Jude. However it is vital that we do if we are to build the trust between provider and customer.
This is that much more vital in interactions we have with public administration, where the trust is so much lower and volumes of sensitive data is so much higher (thus risk). and of course where the press hounds love to stalk!
It's only through persistence in dealing with the issue, and highlighting where we've got it right that we'll get over the perception 'tipping point'.
Keep advertising the art of the possible!
Jude
Good comments, I responded in kind via my own IRM blog at <a href="http://blogs.oracle.com/irm/" rel="nofollow">http://blogs.oracle.com/irm/</a> We are in Oracle seeing an increase in activity in this space and have been talking to some very large clients who have been in the press recently with some data loss incidents. With the recent changes in the economy people are becoming more protective of their sensitive data and realise that a small investment in IRM can offset huge losses from fines and stock price fluctuation.
jumeh's picture
Thanks Simon. Really glad to see that this resonates with the big vendors too. It will be interesting to see how things develop, for both the vendors / organisations, by this time next year.
<strong>Does eDisclosure / eDiscovery really equate to eDisaster?</strong>

<strong>According to the British Computer Society’s <a href="http://www.bcs.org/server.php?show=ConWebDoc.27498" rel="nofollow">Information Security Magazine</a>, eDisclosure is a time bomb waiting to happen, and the key question for many organisations should be: "...</strong>

Leave a comment

Your email address will not be published. Required fields are marked *.