Quantcast
Channel: Information rights management – Intralinks Blog
Browsing latest articles
Browse All 68 View Live

Intralinks’ Approach to Data Sovereignty Compliance

Data sovereignty is a concern for compliance, privacy and legal teams who are responsible for ensuring the enterprise meets its regulatory obligations. The post Intralinks’ Approach to Data Sovereignty...

View Article


Cyber Risk and Data Security Top of Mind at Insurance and Risk Linked...

The cyber insurance market is growing significantly; it's more than doubled in the past two years growing from $1 billion in 2013 to $2.5 billion 2015. The post Cyber Risk and Data Security Top of Mind...

View Article


4 Easy Security Tips to Keep Data Protected

Everyone should take steps to keep their sensitive information safe. In light of World Password Day, here are some easy data protection tips you can follow. The post 4 Easy Security Tips to Keep Data...

View Article

Having Trouble Sharing Content Externally Using SharePoint? Intralinks Can Help.

Many companies neglect to address security gaps in how information is shared externally. There is a solution: Intralinks Content Collaboration Network™. The post Having Trouble Sharing Content...

View Article

Who Says the Security Perimeter is Dead? Content is the New Perimeter.

It's a tough job to build security around an organization's data and information. This is why we suggest building security into the data/information itself. The post Who Says the Security Perimeter is...

View Article


Trust Needs to be Earned

Protecting confidential information as it is shared with external parties around the world is not easy, and jeopardising it could cost your business everything. As our most sensitive information...

View Article

Technologies HR Professionals Should Know to Boost Productivity and Compliance

The Intralinks HR Security Series is a monthly blog series authored by Michal Kimeldorfer, Executive Vice President of Human Resources at Intralinks, created to inform HR professionals about the...

View Article

Maintaining Costs while Maintaining Data Privacy Compliance

A recent study by Thomson Reuters highlighted that 69 percent of firms (70 percent in 2015) expected regulators to publish even more information in the coming year, with 26 percent expecting...

View Article


Take Your Own Best Advice: Email Safely

If we in the Legal department were to measure our email practices by the standards we advise for the other departments in our organization, would we pass? Phishing messages continue show up in our...

View Article


Are Your Investors Requesting a Copy of Your Compliance Manual? Here’s what...

As data security continues to be a focus in the hedge fund space, clearly articulated compliance manuals can be a competitive advantage for firms and result in more allocations. More and more...

View Article

How Information Rights Management Helps Prevent File Leakage

Information Rights Management (IRM) permissions and controls work at the single document level. Thus, the files remain secure and in the owner's control. The post How Information Rights Management...

View Article

CollaboristaBlog Roundup September 5

Your guide to interesting data sharing, security, and privacy news. This week features data security tips, IRM insights and recent hacks in the news. The post CollaboristaBlog Roundup September 5...

View Article

Why Content, not Identity, is the NEW Enterprise Perimeter

The enterprise perimeter used to be protected by the firewall — recently, that perimeter has shifted. Find out why content is the NEW enterprise perimeter. The post Why Content, not Identity, is the...

View Article


The Secure Way to Travel

Many people are collaborating and working remotely. No matter the location, security is ongoing. Here are tips to help keep information secure on-the-go. The post The Secure Way to Travel appeared...

View Article

CollaboristaBlog Roundup September 26

Welcome to our guide on interesting data sharing, cybersecurity, and privacy news. This week features information rights management and security insights. The post CollaboristaBlog Roundup September 26...

View Article


IRM: The Best Defense Against Industrial Espionage

Industrial espionage will never be eradicated, but information rights management (IRM) technology now exists to help mitigate internal and external threats. The post IRM: The Best Defense Against...

View Article

How the Traditional Boundaries of Business have Changed

In a digital world, information must flow freely for productivity, and be secure. To meet these needs, enterprises can apply Information Rights Management. The post How the Traditional Boundaries of...

View Article


CollaboristaBlog Roundup October 3

Welcome to your weekly guide on the most interesting data sharing, security, and privacy news and events. This week features data security research and IRM. The post CollaboristaBlog Roundup October 3...

View Article

Intralinks IRM by design™: Lifetime Content Control

Information Rights Management (IRM) helps secure the enterprise. Intralinks IRM by design™ protects sensitive information no matter how it's shared. The post Intralinks IRM by design™: Lifetime Content...

View Article

Common Mistakes When Sharing Business Information  

Here are four common mistakes employees make when sharing information, and best practices organizations can follow to alleviate risks. The post Common Mistakes When Sharing Business Information...

View Article

CollaboristaBlog Roundup October 31

Welcome to your weekly guide on interesting data sharing, security, and privacy updates. This week features file sharing mistakes and security for lawyers. The post CollaboristaBlog Roundup October 31...

View Article


The Growing Burden of Content Control for CIOs, CISOs, and CTOs

Files containing sensitive information tend to last a long, long time. And the volume of content keeps piling up, as a recent Ovum Research report reveals. The post The Growing Burden of Content...

View Article


Improperly Secured Data is a Serious Threat to CIOs and CTOs

This retention of data is causing problems for CIOs and CTOs. Ovum’s “Content is the New Perimeter” report shares the consequences of inadequate security. The post Improperly Secured Data is a Serious...

View Article

Lyft Claims Exec Lifted its Docs, Parked Them in Dropbox, and Drove Off?

The courtroom fight between Uber and its rival Lyft is a potential cautionary tale about mixing personal cloud applications with enterprise class solutions. The post Lyft Claims Exec Lifted its Docs,...

View Article

The Riskiest File Sharing Technologies

Employees need file sharing tools that enable productivity and facilitate communication. However, when ungoverned, these same applications risk data loss. The post The Riskiest File Sharing...

View Article


General Counsel Responsibilities of the Extended Enterprise

The role of the General Counsel has evolved considerably to include important risk management and business decision-making responsibilities. The post General Counsel Responsibilities of the Extended...

View Article

CollaboristaBlog Roundup: The Best of 2014

From vulnerabilities to hacking methods and data leaks, to stronger techniques for information security and data privacy, 2014 was a year to remember. The post CollaboristaBlog Roundup: The Best of...

View Article

Electronic Investigator Site File: The Solution for Disaggregated Industries  

An electronic investigator site file (eISF) technology platform helps life sciences organizations efficiently operate in a disaggregated industry. The post Electronic Investigator Site File: The...

View Article

Federal Regulator Implicated in Data Breach at California Credit Union

The regulatory issues financial services companies face may increase in 2015. The rules require that sensitive data be shared with examiners and agencies. The post Federal Regulator Implicated in Data...

View Article



Intralinks VIA Brings Controlled Collaboration to Enterprise Content

Collaboration on content is critical for enterprises. With the latest update to Intralinks® VIA™, Intralinks expands its information rights capability. The post Intralinks VIA Brings Controlled...

View Article

Practicing Law Securely — No More Attachments

How should lawyers be securely storing, transmitting, and sharing information? Here are some law information security best practices from Bob Blacksberg. The post Practicing Law Securely — No More...

View Article

Why Hackers Are Getting into the Espionage-as-a-Service Business

Espionage is typically connected with organizations backed by the governments of nation states. However, more private hacker groups are entering the scene. The post Why Hackers Are Getting into the...

View Article

Breaking Bad: Cracking the User Controlled Content Sharing Habit in the...

Intralinks' Richard Anstey meets with Risky Business for a podcast to talk about the security challenges and risks of ungoverned file sharing services. The post Breaking Bad: Cracking the User...

View Article


Controlling Content in the Digital Workplace 

The emergence of the digital workplace requires enterprises to think differently about content collaboration, protection and control. The post Controlling Content in the Digital Workplace  appeared...

View Article

The Data Sovereignty Dilemma of the Digital Workplace

If you are storing data in the cloud, be sure you can manage the storage location of the data to meet with data sovereignty requirements. The post The Data Sovereignty Dilemma of the Digital Workplace...

View Article

The Challenges of Data Sovereignty in the Cloud

The concept of data sovereignty continues to evolve as do the laws, regulations and best practices for security and compliance. The post The Challenges of Data Sovereignty in the Cloud appeared first...

View Article


Practicing Law Securely — Information Rights Management: What, When, How

Information Rights Management (IRM) is a capability that provides end-to-end control of a document — without impeding on collaboration and productivity. The post Practicing Law Securely — Information...

View Article


Control Study Documents in a Collaborative World

How Intralinks' information rights management technology helps sites keep complete control over documents during collaboration in clinical trials. Read the full piece on WorldPharma. The post Control...

View Article

Don’t Hedge Your Bets on Substandard Sharing Practices

The accessibility of data has made our lives easier, but there is room for improvement as far as security is concerned, especially for hedge funds. The post Don’t Hedge Your Bets on Substandard Sharing...

View Article

Striking the Balance Between Information Security and Usability

With growing business concerns around data security, privacy and compliance, here's how organizations can strike the balance between security and usability. The post Striking the Balance Between...

View Article

Industry Analysts Nominate Intralinks VIA® a Leader in Product, Innovation,...

Intralinks is pleased to be called a leader by the data security analyst firm KuppingerCole in its 2015, Leadership Compass for Secure Information Sharing. The post Industry Analysts Nominate...

View Article


Practicing Law Securely — Working with Information Rights Management

Information Rights Management (IRM) provides end-to-end control of a document. When beginning to work with IRM, here are the key questions you might have. The post Practicing Law Securely — Working...

View Article

General Data Protection Regulation: Protecting Both the Customers and the...

With the General Data Protection Regulation looming, organizations need to have stringent security policies and controls in place for protecting data. The post General Data Protection Regulation:...

View Article


Microsoft Dublin Case Highlights Impending Data Privacy “Firestorm”

The U.S. Justice Department is seeking to access emails stored in a Microsoft data center in Ireland which could bring data privacy and regulatory change. The post Microsoft Dublin Case Highlights...

View Article

D’oh! Human Error/Careless Sharing Still a Top Cause of Data Breaches

While many assume the top causes of data breaches can be attributed to cyber thieves, the leading causes are actually due to "miscellaneous errors." The post D’oh! Human Error/Careless Sharing Still a...

View Article


Data Privacy Regulations: Bad for Business?

An international survey, commissioned by Intralinks and conducted by Ovum, explores the data sovereignty concerns around a cloud-based business environment. The post Data Privacy Regulations: Bad for...

View Article

Practicing Law Securely — Security from the Start

Direction to use a secure repository / model at the outset and throughout the work for a General Counsel raises the level of protection for material information. The post Practicing Law Securely —...

View Article

Information Rights Management (IRM): What It Is and Why You Need It

Information Rights Management is a technology which protects sensitive information by embedding encryption and user permissions directly into the file. The post Information Rights Management (IRM):...

View Article

Mistakes: Unfortunate. Unforeseen. Unforgivable.

With the right permission, a secure collaboration solution with information rights management can give you the ability to UNshare anything. The post Mistakes: Unfortunate. Unforeseen. Unforgivable....

View Article


Data Privacy Day: How are Global Companies Reacting to New Data Privacy Regs?  

To keep personally identifiable information safe in today’s digital world, national governments are enacting new data privacy laws around how information is stored, processed, and shared. The post Data...

View Article

Browsing latest articles
Browse All 68 View Live