Archive for November, 2006

Adobe Security Partner Community

Adobe information assurance solutions enable organizations to more securely engage with employees, business associates, and customers by protecting the information lifecycle. Security can be persistently applied independent of storage and transport, reaching inside and outside an organization. Adobe’s ecosystem of security partners provide interoperability with many security infrastructures including identity and access management, single-sign-on, public key infrastructures, smart cards, biometrics, multifunction printer/scanner devices, and other third party applications and file formats.

2007 will be a year of increased focus on security partners. We are firm proponents of the idea that strong and successful security solutions only come from a strong security partner ecosystem, and we are making significant changes in the way we interact with this community.

To hear more about our new partner programs, features and focus – and participate in upcoming Security Summits, see additional details here.

New Hosted Service Now Available for Rights Management

Adobe Systems has introduced a new hosted service that enables knowledge workers to better protect, share and track the usage of Adobe PDF and Microsoft Office documents using rights management powered by LiveCycle Policy Server.

Adobe Document Center is designed for the professional who shares or publishes business-, time- or version-sensitive documents. Whether it’s an independent graphics designer submitting designs for client review, or a legal practice exchanging sensitive files with clients, users can customize access settings, closely audit usage of their documents, and retain control over the files regardless of where they travel. Users also have the ability to set expiration dates on documents, supersede an older version once a new version is distributed, and revoke access after distribution. They even have the ability to track who has received the documents and what recipients have done, or attempted to do, with the protected files.

When using Acrobat 8 or LiveCycle Policy Server for Office, authentication, authorization, and auditing are managed via a webservice from those software clients to Adobe’s hosted service, so a document does not need to be uploaded to the service to be protected. In that case, the hosted service datacenter never sees or stores unprotected customer documents – for added security. Recipients of protected PDF documents only need the Adobe Reader 7.0 or higher. Recipients of protected Office documents only need the Office plug-ins.

Authentication of authors and recipients using the Adobe Document Center is handled by the Adobe ID. This email address and user-specified password credential is common across Adobe’s web-based properties for the online store, support, developer programs, and other Adobe hosted services. For an author that wants to share a protected document, they simply need to provide the recipient’s email address. If the recipient already has an activated Adobe ID for the Document Center, they simply enter their ID when opening the document. Otherwise, the recipient is provided with instructions on how to activate their email address as an Adobe ID to open the protected document.

A free trial of Adobe Document Center is available until December 31, 2006. For more information, visit

Policy Server 7.2 is now available, supporting native Office and CAD

Adobe Systems has shipped Livecycle Policy Server 7.2, an enterprise rights management (ERM) solution for protecting and controlling documents throughout their entire lifecycle, from creation, through distribution and collaboration, to archiving and destruction. Supported formats now include Adobe PDF, Microsoft Office, and Dassault Systems CATIA V5 files.

LIveCycle Policy Server allows users to apply persistent and dynamic security policies to documents. Those policies can specify who has access, what they can do, when, and for how long. Security policies can be updated at any time, even after distribution, making it easy to manage and track access, no matter how a document is stored or transported.

When should you use enterprise rights management?

If you are already tagging documents with information classification policies like “Company Confidential”,”Top Secret” or “Insider Restricted”, ERM provides both preventative and detective controls persistently applied to those documents.

You can connect Policy Server to your corporate directory to specify that a protected document can only be opened by employees, departments, or individuals of your company, or be opened by extranet business partners that have signed NDAs. These controls are independent of storage and transport. If a file is accidentally or maliciously sent to a recipient that shouldn’t have the document, they cannot open the document because it’s encrypted. The encryption keys are not distributed unless the recipient has successfully authenticated and is designated in the policy permissions. An optional audit log can also help track who opened a document, what did they do with it (print, copy, modify), or what did they try to do without permission.

Why chose Adobe for Information Assurance?

Adobe has been providing information assurance solutions since Acrobat 2.0 in 1994, when rights management and encryption were first added to the file format. Since then, support for authenticity, integrity, and non-repudiation has been added with digital signatures. These capabilities can all be combined in a document to provide holistic security, protecting both static documents and electronic forms.

Policy Server has a growing ecosystem of cross-platform, cross-format, and cross-device capabilities. PDF protections are supported in the free Reader on Windows, Mac, and Linux platforms. Office and CAD are supported on the Windows platform. Policy Server itself can run on Windows, Linux, and UNIX platforms, and integrate with LDAP, Active Directory, and other custom authentication systems. Policy Server is also supported by a growing community of MFP (Multifunction Printer) devices that can scan paper documents and automatically apply policies selected by the device’s LCD display.

Once documents are protected with Policy Server, the policies can be changed – without republishing the documents. This is important when the members of a team are dynamic, or when permissions change as part of the document’s lifecycle. Documents can also be revoked to mitigate subsequent access, no matter how many copies of the document were created and distributed. This helps enforce version control at the document level, outside of a content management system or portal. When a revoked document is opened, it can also indicate to the user where to go to get the most recent version of the document, specified by a URL.

Policy Server is built on a J2EE architecture with webservices, and achieves scalability and reliability by working with underlying platform capabilities from WebSphere, WebLogic, JBoss, Oracle, DB2, MySQL, etc.