IBM predicts on the information economy future
By Simon Thorpe on Jul 08, 2008
IBM this week released their predictions on how the importance of correctly handling and using information within the corporate world is to change over the next 4 years.
It talks about risks and quality of information in such areas where information rights management would play a key role. A good quote from the article is, "Data has become the new currency in today's information economy, but many businesses make the wrong decisions by not using the right information."
One value of an IRM solution is the ability to ensure that only the latest versions of documents are being used. With Oracle IRM it is simple to revoke access to older documents which is reflected immediately when the client next communicates to the server. Additionally Oracle IRM redirects those accessing older information to a customisable website which could be used to automatically redirect the end user to the latest version of content. So no matter how many copies of documents are made and no matter where they get stored, the business can be ensured only the latest are available for access. Therefore the risks of misinformation use are dramatically reduced.
Another important piece of functionality IRM delivers is auditing. Every time a piece of sealed content is accessed, this is audited on the IRM server. Therefore the CIO has the ability to use reports to satisfy queries on governance and compliance. Oracle IRM has very rich auditing, below is an image depicting some of the raw data available. It shows useful items such as local and remote IP addresses, time/date, username and where the content was accessed from.
The article goes on to state, "In just a few years, data governance will become a key benchmark as boards of directors recognize their fiduciary responsibility to enhance and protect data, and markets measure business performance by looking at data value and risk on the balance sheet."
Information Rights Management is able to protect this key data, working alongside technologies such as database encryption and DLP perimeter controls.