When You Really Start to Have Business Interaction Networks

by Paul French
VP, Product & Solutions Marketing
Axway

You’ll need a vendor that can reliably combine traditional data security (e.g., management, governance, and DLP) with something with a more increased level of security like DRM, a vendor who can know how to combine these things together to secure data in whatever form, for whatever type of connection, and between whomever is on either side of that connection.

You’ll need a vendor that can reliably combine traditional data security (e.g., management, governance, and DLP) with something with a more increased level of security like DRM, a vendor who can know how to combine these things together to secure data in whatever form, for whatever type of connection, and between whomever is on either side of that connection.

This week Adobe and McAfee announced that they’re going to combine some of Adobe’s digital rights management (DRM) and McAfee’s DLP technology.

If you’re a data security company, consider this a harbinger. Given the speed with which the market is changing, the speed with which the connections and points of collaboration are evolving, and the speed with which co-innovation occurs, your business interaction networks will have to expand. This will force you to mash up previously unrelated technologies, whether you do it yourself or acquire a vendor who can do it for you.

You’ll need a vendor that can reliably combine traditional data security (e.g., management, governance, and DLP) with something with a more increased level of security like DRM, a vendor who can know how to combine these things together to secure data in whatever form, for whatever type of connection, and between whomever is on either side of that connection.

Customers really need to understand that their data security processes and policies can’t possibly evolve as fast as the changes that are occurring. In order to get the most out of the technology that exists today, to make yourself really agile, to expand your communities to be as effective as possible, to gain as much revenue turnover as possible, to take as much cost out as possible, and to leverage the technology that’s available, you have to plan for how people actually work. And that means implementing complementary technologies like DRM and data loss prevention.

That’s when you really start to have total data security: when you start to have a secure data transmissions platform. That’s when you really start to have business interaction networks, not just point-to-point collaboration.

We’re past that.

(Photo by lumaxart: http://www.flickr.com/photos/lumaxart/ / CC BY-SA 2.0)
(thegoldguys.blogspot.com / CC BY-SA 2.0)

Leave a comment

No comments yet.

Comments RSS TrackBack Identifier URI

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s