Information Rights Management interest increasing globally

It has been an amazingly busy year so far and I only get to write about 25% of the posts I would really like to put on this blog. Oracle has made more acquisitions in the security space, Sun adding a massive amount of new security technology and the recent database firewall technology from Secerno. I work in Oracle's security sales group which means a constant challenge of working with a very large number of technologies and working on solutions for a large customer base. Great fun, but it feels like there are never enough hours in a week to learn, communicate, regurgitate, create...

Because Oracle now has one of the strongest suites of security technologies in the market, i've also been busy presenting Oracle IRM to our North American customers, partners as well as internally. Often this communication is global and most recently to our Asia Pacific regions. All over different regions, industries and pillars of the business we are seeing a very healthy increase in sales and deployments of the IRM technology and one person who is constantly on the move is Andy Peet, IRM product manager.

So while I have been reviewing an inbox that is easily taking more than 48 hours to clean up, I found a photo of Andy from one leg of his global IRM tour when he was in Japan. Taken in the very pretty Oracle offices in Tokyo, Andy does a great job of portraying a typical corporate executive, white shirt and slacks :)

AndyInJapan.jpg

So... lots more to come on the blog, some articles in the pipeline are;

  • Sizing up and IRM deployment, what is needed from a hardware and network perspective.
  • A partners perspective of deploying Oracle IRM
  • The future of Information Rights Management

 

If you have any specific questions on IRM or would like to suggest some topics to be discussed, feel free to contact me...

Comments:

Post a Comment:
  • HTML Syntax: NOT allowed
About

Oracle IRM protects and tracks your sensitive information no matter where it goes. It combines business friendly encryption with role based usage rights and auditing.

11g quick guide

Search

Archives
« April 2014
SunMonTueWedThuFriSat
  
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
   
       
Today