« Government Plans Top Secret HSPD-23 Program for Enhancing Information Assurance | Main | iPhone and iTunes: The Thin Edge of Consumerization’s Wedge »

December 01, 2008



Good summary. But I would place more stress on protecting the data itself. Otherwise, one is reduced to trying to protect machines and devices or rely on contracts or service level agreements that lack enforcement mechanisms - quite a task. And while a focus on the data is particularly useful for protecting mobile employees (as you discuss), it's more broadly applicable to any situation where the owner of information doesn't want to lose control of it, whether it's traveling behind a firewall between members of a workgroup or being distributed to contractors, service providers or other third parties. But for data protection to work really well, it has to move beyond conventional enterprise rights management, to provide continuous protection of files through encryption and anti-propagation technology, and be capable of working with any of a user's applications. There is a startup - Fortressware (www.fortressw.com) - that provides this combined technology.

The comments to this entry are closed.

  • Burton Group Free Resources Stay Connected Stay Connected Stay Connected Stay Connected

Blog powered by Typepad