It’s a perfect coincidence. On one hand, demand for Secure Information Sharing is not only growing but exploding in the „post Snowden era“. On the other hand, we see a number of new and improved solutions appearing in the market. Thus, Information Rights Management is finally becoming ready for widespread adoption. Information Rights Management protects documents by encrypting them and attaching access control. These access controls are enforced by the applications that are used to read and edit the documents.
In his presentation, Martin Kuppinger will look at the various alternatives in the Information Rights Management. He will describe and compare concepts and provide a vendor overview. He then will look at the common requirements customers have for Information Rights Management and rate the readiness of approaches based on these requirements.
This session will have a look at the technical concepts behind IRM, based on the example of Microsoft’s Azure RMS. It looks at how encryption is done, the various options for managing keys, the integration with applications, and the management of users. Given that IRM, despite all progress, still is a complex topic, this sessions provides background information about how IRM works, which helps designing own implementations.