Monday May 03, 2010

Oracle IRM video demonstration of separating duties of document security

One thing an Information Rights Management technology should do well is separate out three main areas of responsibility.

  • The business process of defining and controlling the classifications to which content is secured and the definition of the roles employees, customers, partners and contractors have when accessing secured content.
  • Allow IT to manage the server and perform the role of authorizing the creation of new classifications to meet business needs but yet once the classification has been created and handed off to the business, IT no longer plays a role on the ongoing management.
  • Empower the business to take ownership of classifications to which their own content is secured. For example an employee who is leading an acquisition project should be responsible for defining who has access to confidential project documents. This person should be able to manage the rights users have in the classification and also be the point of contact for those wishing to gain rights.


Oracle IRM has since it's creation in the late 1990's had this core model at the heart of its design. Due in part to the important seperation of rights from the documents themselves, Oracle IRM places the right functionality within the right parts of the business. For example some IRM technologies allow the end user to make decisions about what users can print, edit or save a secured document. This in practice results in a wide variety of content secured with a plethora of options that don't conform to any policy. With Oracle IRM users choose from a list of classifications to which they have been given the ability to secure information against. Their role in the classification was given to them by the business owner of the classification, yet the definition of the role resides within the realm of corporate security who own the overall business classification policies. It is this type of design and philosophy in Oracle IRM that makes it an enterprise solution that works beyond a few users and a few secured documents to hundreds of thousands of users and millions of documents.

This following video shows how Oracle IRM 11g, the market leading document security solution, lets the security organization manage and create classifications whilst the business owns and manages them. If you want to experience using Oracle IRM secured content and the effects of different roles users have, why not sign up for our free demonstration.

Wednesday Nov 25, 2009

The importance of balancing security, usability and manageability

Security solutions that are poorly designed and difficult to use don't work, if security presents a significant hurdle for user adoption, it simply won't get used and people will just workaround it.

Security workaround.jpg

With this in mind, I had an excellent meeting this week with a customer interested in Oracle IRM. Right from the start they commented that whatever information rights management solution they implement, it must be simple and easy for end users and the business to use and deploy. This is exactly the opinion we have when developing Oracle IRM. We've built a solution which gives the customer the ability to balance all three.


Sometimes people spend so much time wanting to understand how our crypto works, how long the keys are, how do we ensure the security of the content when it's decrypted and passed to the rendering application and how good the screen capture functionality is. These are all very important technical issues which we address, yet it is just as important to understand how the powerful classification model, the transparent synchronization of rights, separation of rights from content, ability to search in sealed content, all contribute to an easy to use and effective to manage technology.

Experience this for yourself, just go have a look at the easy to use self service Oracle IRM demonstration.


Oracle IRM protects and tracks your sensitive information no matter where it goes. It combines business friendly encryption with role based usage rights and auditing.

11g quick guide


« February 2016