News   Features   White Papers   Research Reports   Web Events   Conferences  
July 06, 2011

Table of Contents

Securing documents in the WikiLeaks era, Part 2
Covario SEO Software Uses Cloud Computing, Link Analysis
Optify Adds Keyword Reports for SEO
The social contact center
Changes in Latitude from Endeca
Windows Phone App Connects Readers with Direct Downloads of eBooks & Audiobooks
New appliance unlocks value in data
Marrying deep search and collaboration

Securing documents in the WikiLeaks era, Part 2

[Editor's Note: In the first installment of this two-part series in the June 2011 issue of KMWorld, author Robert Smallwood wrote about the critical nature of electronic document security, the use of enterprise rights management (ERM) software in safeguarding information and Microsoft's role in the ERM market. The second part of this series includes a sampling of other vendors in the e-document security space.]

In addition to Microsoft, Adobe is a major player in enterprise rights management (ERM). Adobe has a large installed presence of its LiveCycle Rights Management, which provides data-centric security with user access and control policies to documents. It supports various types of data including PDF and Flash Video-and also native formats including Word, Excel, PowerPoint and select computer-aided design (CAD) and computer-aided three-dimensional interactive application (CATIA, marketed by IBM) output formats. This is done by the client software that authenticates users with the server when opening up a document. It can provide protections without server interaction over a specified period of time. LiveCycle Rights Management includes detailed audit trail reporting for rights protected information, document version control and expiration, and dynamic watermarking.

Early entrants into the enterprise rights management marketplace included Sealed Media, which was acquired by Oracle ( in its early 2006 acquisition of Stellent, and Authentica, which was purchased by EMC later that year. But the promised integrations and additional development have apparently been slow to arrive.

Steve Coplan, a senior analyst at The 451 Group, says, "Looking at the ERM technology acquisitions that Oracle and EMC made, they really haven't done much additional development or integration, and, in fact, most of the original development teams have moved on. As a result, the technology has gotten a little long in the tooth, and they're falling behind, compared to the competitive field."

Brian Hill, senior analyst with Forrester Research, agrees, "It's fair to say that some of the infrastructure vendors who acquired ERM companies have fallen short on the promise of integration with their enterprise content management offerings and improved ease of deployment, which would allow for more widespread adoption. This has opened the door for other players in the market."

Rising stars and additional players

Some of the rising stars and additional players in the enterprise rights management market include:

Avoco Secure offers enterprise rights management software to link security policies to an individual's or group's identity to enforce the access to and use of digital assets, but it goes further, offering digital signing and information card provisioning linked to digital identities. The software uses an individual's (or group's) identity and other forms of authentication to enforce security policies for access control or verified digital signatures. The software encrypts content and authenticates users to control what they are allowed to do with that content. Customers are able to design completely electronic steps for processing transactions.

The company began with supplying the software to the defense sector and expanded into commercial applications. It reaches its customers through a partner network. Avoco Secure's suite of products allows digital signatures to be added to content (a digital signature is the equivalent of a handwritten signature that can be used to sign a digital document on a computer or online, so that documents no longer need to be printed, signed and mailed or faxed back-making it possible to create workflow systems that push documents along the signing process, while maintaining an audit trail of signatures).

Its product, secure2sign for Word, allows users to digitally sign a MS Word document or form using a digital certificate to identify the signatory. It supports multiple signatures on a document as well as sectional signing--both features are requirements if a document is to be part of a workflow process involving multiple parties. In addition, it allows signatories to apply a time-stamp, at the time of signing. Avoco Secure also offers that capability for MS Excel documents, and HTML or xHTML web forms, which is useful in applications such as insurance claim submission and mortgage loan applications.

Check Point Software Technologies has an appetite for acquisitions: Last year it purchased an early entrant in the enterprise rights management market, Liquid Machines. In 2009, it bought FaceTime Communications' application database and Nokia's Security Appliance business. In response to an inquiry, the firm issued the following statement: "In order to protect corporate data, computers, devices and infrastructure, organizations need to deploy a holistic and multilayered security approach. The first step is to define and implement strong data security policies. Businesses need to establish the appropriate privacy settings and clearly define who is entitled to access specific types of information, as well as what confidential data is visible and to whom. Second, businesses need to implement specific data security solutions that secure their sensitive data in multiple forms and throughout its life cycle: data at rest, data in motion and data in use. They must choose an approach that can effectively prevent data loss before it occurs, rather than just detect it, after it occurs."

Covertix is led by CEO Alon Samia, who says, "Our software is next-generation enterprise rights management, as compared to the offerings of the major infrastructure and content management vendors." When asked to define which features set his firm's software apart from established players, Samia replies, "We do content- and context-based policy assignment. The owner of the document can decide context level rules, which means not just who, but where--that is, it's not just who you are, but where you are. So, for instance, you may be able to print a financial document in the accounting department, but not in the IT department. Or you may access a file on your desktop, but not on your laptop. Everyone now knows that even authorized users can go bad and misuse internal documents, or leave the organization and take them with them. It happens every day."

Samia believes that part of the problem with flagging ERM implementations lies not only in the complexity of policy management, but in the actual approach to ERM projects, "Implementing this type of security requires a phased approach," he says. "You have to pilot and fine-tune. For instance, some ‘violations' are actual valid uses, so you have to go back and refine your policies. And you continue to do that as you roll out the system to handle more document types and departments."

FileOpen Systems is an early provider of rights management, with deep Adobe roots. It delivered protections for Adobe products initially in 1997. Since then, the firm has added support for MS Office, BlackBerry and other formats. Although noted analysts assert that Microsoft leads this market, FileOpen may be flying underneath their radar, claiming to have millions of users in more than 1,000 corporations. Customers have the choice from toolkit, server or hosted options. The software utilizes its own proprietary viewer, which obviates the need for client software.

Elizabeth Murphy, VP of sales and marketing, says, "We've experienced a significant sea change in recent years caused by high-profile security leaks and loss of revenue due to piracy of intellectual property and online document sales. What's becoming more and more apparent is that the exchange of electronic data is so widespread and so easy that it's impossible for most companies to protect without implementing security tools."

GigaTrust has close ties to Microsoft, stating it is "the only provider of ‘intelligent rights management' that extends and enhances the capabilities of Microsoft's RMS." GigaTrust's technology is based on XrML (extensible rights markup language), although that standard "never really went anywhere," according to Coplan at The 451 Group. He describes GigaTrust as "a pure-play ERM provider." The ERM software is deployed through Microsoft Windows and Microsoft Office. The company did not respond to press inquiries, but according to its website, GigaTrust's client-server architecture automatically applies policies to Outlook-based e-mail and desktop files, including non-Microsoft Office documents on PCs running Office 2000 or Office 2007. The GigaTrust Web filter software dynamically applies the same policies to content delivered from databases, Windows, SharePoint Services portals and websites using Internet Information Services (IIS).

InDorse Technologies has caught the eye of some leading industry analysts with its ability to make file protection simple and scalable in an increasingly Web 2.0-enabled, device-agnostic, cloud-based business environment. Rob Marano, president and CEO, says, "Our company was founded to provide solutions that protect a company's important files without disrupting business flow or requiring intensive network configuration. In today's increasingly cloud-based and SaaS-based business environment, files are being shared more and more to conduct business. However, traditional information security solutions are unable to handle the move from silo-based IT security to the cloud. Given the shift away from internal servers, it was important to create a solution that was in lockstep with this trend. InDorse was built with the mindset that no software would be required and users would not be forced to change their daily routine."

When InDorse's ERM software is deployed, even authorized users are stopped from downloading large quantities of files in limited settings from remote locations. A trail of forensic data that captures who is downloading or opening files provides immediate accountability--before files can be leaked. What sets the company apart? Marano says, "InDorse products do not require any client software, automatically enforce usage and protection policies for sensitive business files, and actively and passively track and trace the files for life."

NextLabs began as a provider of data loss prevention (DLP) solutions, then moved upstream into enterprise rights management to offer a more complete security solution, which it terms "information  risk management." The software is based on eXtensible Access Control Markup Language (XACML) from the standards body OASIS ( XACML is a way of articulating policy, a core XML schema for representing authorization and entitlement policies, which allows standardization of access control routines across platforms.

Although players like Oracle are involved in XACML, NextLabs is currently the only company offering ERM based on the standard. That standardization and simplification allows for a drastic reduction in policy creation and maintenance. What else is unique about the firm's approach? Andy Han, VP and GM of products with NextLabs, says, "We offer transparent rights management, and we're able to apply rights to any file type or any application. We have ‘content awareness' built in, so based on the context of the file, we can determine rights. Also, we don't base policies on individual user identities, but base them on attributes and roles, so it is much more flexible and easier to maintain."

Zafesoft offers "the only solution that provides content security with edit," according to the website. "Users can edit, copy, paste, etc. All information remains ‘zafe' (fully secure), including copy of copies and derivatives taken from one file to another." ‘Zafed' content looks and behaves like the original, and is encrypted locally. Sandeep Tiwari, CEO, says, "We secure information in its native format, allow users to access and edit documents in their native format--we don't force them to use a proprietary viewer." The solution is cross-platform, supporting Windows, Mac and Linux. Presently, Zafesoft has fewer than 10 customers, but it had only been marketing the product for several months at press time. The Autonomy pattern search engine is used to search content for patterns and to secure the content.

Forrester's Hill sums up the enterprise rights management marketplace this way: "ERM products are still mostly geared toward protecting documents inside an enterprise. Our customers tell us it's still just too difficult to share documents across company boundaries, even with enhancements like MS Active Directory federation services. We expect new lightweight collaboration features will allow for more casual business-to-business collaboration, without requiring armies of lawyers and IT staff. In our view, purchases of one-off ERM solutions will trail off, in favor of more complete solutions, such as those integrated with DLP technology, content management infrastructure and other risk mitigation solutions."

Organizations will struggle with securing internal documents and sifting through the myriad of security solutions available, but the bestsecurity tool is to make information governance a priority, a part of the organization's culture.  

Back to Contents...

Covario SEO Software Uses Cloud Computing, Link Analysis

Covario, Inc. announced the latest version of its proprietary organic search management system, Covario Organic Search Insight, which is a tool for marketers to manage complex global SEO programs. The upgrade uses a cloud computing framework to support localized search engine ranking results. It also now offers alerts on ranking changes, which enables users to react quickly when there are market developments.

Currently supporting 25 languages, the SEO reporting software is used to audit search programs in 45 countries. Organic Search Insight is designed to employ localized search engine rankings and SEO linking analysis, building upon Covario's recent launch and integration of a Link Builder system, which shows marketers key links and how they connect to each another.


Back to Contents...

Optify Adds Keyword Reports for SEO

Optify, an online marketing software and services provider for the real time web, announced a new set of advanced keyword reports for SEO. Optify's advanced keyword reporting include support for grouped keywords, competitor keywords, keyword trends, and other forms of keyword reporting that can help companies get a better handle on their SEO tactics and trends.

Grouped Keywords are designed to let customers track and analyze ranking performance and trends on groups of keywords. Meanwhile, Competitor Keywords help companies compare keyword ranking performance against market competitors on individual keywords and keyword groups. Keyword Trends also help customers identify "movers and shakers" among keywords for themselves and competitors.


Back to Contents...

The social contact center

Attensity, a pioneer in text analytics solutions for customer experience management (CEM), has launched a new version of Respond, its application said to be designed for the next-generation multichannel contact center.

Attensity reports Respond 5.1 gives contact centers the ability to:

  • blend social media with other customer engagement channels such as e-mail, SMS messages, chat and phone calls;
  • enable social media responders to transfer conversations "offline" into e-mails or SMS messages;
  • track cross-channel messages with a single interaction ticket and over time on the customer's record;
  • filter social, e-mail or other messages by channel, or route a blended queue with specific topics or products;
  • engage customers according to an organization's approved business processes;
  • use pre-approved templates to help agents engage with customers in social media;
  • automatically determine routing and prioritization through integration with Facebook, Twitter and various influencer metrics such as the Klout score; and
  • benefit from “big data” scalability to handle the high volumes of customer conversations generated in social media, as well as support for large numbers of distributed users.

Back to Contents...

Changes in Latitude from Endeca

Endeca Technologies has released a major version of its business intelligence platform. Targeting Global 2000 companies, Endeca says, Latitude 2 has been engineered to address the “big data” challenge by increasing the flexibility of IT and accelerating the delivery of agile BI solutions.

Endeca explains Latitude 2 introduces new technology in the Endeca MDEX Engine and key capabilities that accelerate the time to deploy agile BI solutions, including:

  • a 10x increase in query performance to enable interactivity on bigger data sets and more complex analytics,
  • real-time analytics over diverse and changing data,
  • industry standard ETL integration, and
  • a semantic layer foundation.

Endeca has also announced InFront, a customer experience management platform that enables businesses to deliver targeted and relevant customer experiences in any channel. Comprised of new and updated product functionality, InFront enables organizations to deliver optimized and adaptive customer experiences that drive clicks and conversions, Endeca claims. New and enhanced functionality in InFront includes:

  • tools to achieve multichannel success--new InFront Social and updated InFront Mobile and SEO solutions deliver consistent, relevant and content-rich experiences across all channels to enhance engagement and brand loyalty;
  • fast insights into all customer touch points--new InFront Intelligence, Endeca’s Agile BI solution for e-business, enables business teams to gain actionable insight into the performance of digital and in-store merchandising strategies, product performance and customer sentiment; and
  • increased agility to allow customers to take their own path--performance enhancements and new capabilities to the InFront MDEX and Content Acquisition System enable exploration and discovery across the wide spectrum of content and data.

Back to Contents...

Windows Phone App Connects Readers with Direct Downloads of eBooks & Audiobooks

OverDrive launched the free OverDrive Media Console app for Windows Phone. The app will give readers at 15,000 public, school, and corporate libraries the ability to download ebooks and audiobooks directly to their Windows Phone. Users can use the app to find a library that offers digital books, and then download EPUB ebooks as well as MP3 audiobooks.

The app's "Get Books" feature makes it easy to find a local library, and then browse for titles, check them out with a library card, and download directly to Windows Phone devices. Digital books from the library will automatically expire in the app, so there are never late fees. Users will also benefit from enhancements like an orientation lock and custom bookmarks.

The OverDrive app for Windows Phone is available for download from the Windows Phone Marketplace. Users can use OverDrive Search to see if their local library is a member of the OverDrive network. 


Back to Contents...

New appliance unlocks value in data

Kelley Blue Book is testing a new appliance that analyzes click stream data created by users surfing its Web site. The company, which is a resource for prices, values, and expert and consumer reviews on new and used cars, will be able to analyze the information to see what topics visitors care most about, such as used and new car prices, safety recall and warranty data, and car buyer reviews.

The appliance Kelley Blue Book is testing is the first to be delivered by IBM since it acquired Netezza in November 2010. The IBM Netezza High Capacity Appliance is designed to address the huge amounts of data companies are accumulating. With the new tool, they can sift through petabytes of data including banking and mobile phone transactions, insurance claims, electronic medical records and sales information. Companies can analyze that information to find trends in, for example, consumer sentiment, according to a news release from IBM.

Karen Simmons, senior director of data warehousing at Kelley Blue Book, says, “We are testing the new appliance to unlock the value of archived data in search of new ways to grow our business. This appliance allows organizations like ours to take a fresh look at our historical information and use the insights we gain for competitive advantage.”

Battelle’s Pacific Northwest Division is also using Netezza technology as part of the Pacific Northwest Smart Grid Demonstration Project. In that project, 60,000 customers in 11 utilities across five states will share a digital signal for their smart meters, with the goal of making better decisions about energy use, IBM reports.

Back to Contents...

Marrying deep search and collaboration

Traction Software has released TeamPage Attivio Search Plus to index and search external sources and TeamPage's Social Enterprise Web to discuss, tag, task, share and badge internal or external content. These TeamPage options connect TeamPage with structured data or unstructured content in sources including Microsoft SharePoint, EMC Documentum, Microsoft Exchange, file servers, SQL databases, intranets, and the public Web.

Using TeamPage Attivio Search Plus and TeamPage's Social Enterprise Web, external documents, pages and transactions are now able to become social objects seamlessly integrated with Traction TeamPage's action tracking, search, collaboration and communication.

Highlights of TeamPage Attivio Search Plus include:

  • permission-aware, unified information access spanning TeamPage and external Microsoft SharePoint, Documentum, file servers, Microsoft Exchange, SQL databases and other sources;
  • the TeamPage user interface makes permission-aware search and navigation over content from TeamPage and external sources simple and fast;
  • search and navigation can be faceted using selected sources and source-specific metadata, including author, data type, status, etc., and search and navigation can be faceted using automatically extracted key phrase, location, sentiment and other attributes from Attivio's deep content analysis of structured and unstructured data; and
  • external sources and access rules can be continuously and incrementally indexed.

Back to Contents...
[Newsletters] [Home]

Problems with this site? Please contact the webmaster. | About ITI | Privacy Policy