Quantcast
Channel: Information rights management – Intralinks Blog
Browsing all 68 articles
Browse latest View live

4 Easy Security Tips to Keep Data Protected

Everyone should take steps to keep their sensitive information safe. In light of World Password Day, here are some easy data protection tips you can follow. The post 4 Easy Security Tips to Keep Data...

View Article


Having Trouble Sharing Content Externally Using SharePoint? Intralinks Can Help.

Many companies neglect to address security gaps in how information is shared externally. There is a solution: Intralinks Content Collaboration Network™. The post Having Trouble Sharing Content...

View Article


Who Says the Security Perimeter is Dead? Content is the New Perimeter.

It's a tough job to build security around an organization's data and information. This is why we suggest building security into the data/information itself. The post Who Says the Security Perimeter is...

View Article

Trust Needs to be Earned

Protecting confidential information as it is shared with external parties around the world is not easy, and jeopardising it could cost your business everything. As our most sensitive information...

View Article

Technologies HR Professionals Should Know to Boost Productivity and Compliance

The Intralinks HR Security Series is a monthly blog series authored by Michal Kimeldorfer, Executive Vice President of Human Resources at Intralinks, created to inform HR professionals about the...

View Article


Maintaining Costs while Maintaining Data Privacy Compliance

A recent study by Thomson Reuters highlighted that 69 percent of firms (70 percent in 2015) expected regulators to publish even more information in the coming year, with 26 percent expecting...

View Article

Take Your Own Best Advice: Email Safely

If we in the Legal department were to measure our email practices by the standards we advise for the other departments in our organization, would we pass? Phishing messages continue show up in our...

View Article

Are Your Investors Requesting a Copy of Your Compliance Manual? Here’s what...

As data security continues to be a focus in the hedge fund space, clearly articulated compliance manuals can be a competitive advantage for firms and result in more allocations. More and more...

View Article


How Information Rights Management Helps Prevent File Leakage

Information Rights Management (IRM) permissions and controls work at the single document level. Thus, the files remain secure and in the owner's control. The post How Information Rights Management...

View Article


CollaboristaBlog Roundup September 5

Your guide to interesting data sharing, security, and privacy news. This week features data security tips, IRM insights and recent hacks in the news. The post CollaboristaBlog Roundup September 5...

View Article

Why Content, not Identity, is the NEW Enterprise Perimeter

The enterprise perimeter used to be protected by the firewall — recently, that perimeter has shifted. Find out why content is the NEW enterprise perimeter. The post Why Content, not Identity, is the...

View Article

The Secure Way to Travel

Many people are collaborating and working remotely. No matter the location, security is ongoing. Here are tips to help keep information secure on-the-go. The post The Secure Way to Travel appeared...

View Article

CollaboristaBlog Roundup September 26

Welcome to our guide on interesting data sharing, cybersecurity, and privacy news. This week features information rights management and security insights. The post CollaboristaBlog Roundup September 26...

View Article


IRM: The Best Defense Against Industrial Espionage

Industrial espionage will never be eradicated, but information rights management (IRM) technology now exists to help mitigate internal and external threats. The post IRM: The Best Defense Against...

View Article

How the Traditional Boundaries of Business have Changed

In a digital world, information must flow freely for productivity, and be secure. To meet these needs, enterprises can apply Information Rights Management. The post How the Traditional Boundaries of...

View Article


CollaboristaBlog Roundup October 3

Welcome to your weekly guide on the most interesting data sharing, security, and privacy news and events. This week features data security research and IRM. The post CollaboristaBlog Roundup October 3...

View Article

Intralinks IRM by design™: Lifetime Content Control

Information Rights Management (IRM) helps secure the enterprise. Intralinks IRM by design™ protects sensitive information no matter how it's shared. The post Intralinks IRM by design™: Lifetime Content...

View Article


Common Mistakes When Sharing Business Information  

Here are four common mistakes employees make when sharing information, and best practices organizations can follow to alleviate risks. The post Common Mistakes When Sharing Business Information...

View Article

CollaboristaBlog Roundup October 31

Welcome to your weekly guide on interesting data sharing, security, and privacy updates. This week features file sharing mistakes and security for lawyers. The post CollaboristaBlog Roundup October 31...

View Article

The Growing Burden of Content Control for CIOs, CISOs, and CTOs

Files containing sensitive information tend to last a long, long time. And the volume of content keeps piling up, as a recent Ovum Research report reveals. The post The Growing Burden of Content...

View Article
Browsing all 68 articles
Browse latest View live