Archive for October, 2008

Configuring Rights Management client access

Adobe’s LiveCycle Rights Management solution has been in the market since the beginning of 2005 and can be used to protect a growing variety of file formats – PDF, Office, CAD, and FLV as of our LiveCycle ES Update 1 release this past summer. The server works together with Adobe Acrobat and Adobe Reader clients to protect, view, and manage sensitive PDF documents. Because support is included in every copy of Acrobat and Reader 7.x, 8.x, and 9.x, we have more than 700 million machines worldwide that are capable of receiving protected PDF documents with absolutely no configuration required or any special software to be deployed.

We give our customers the option to allow documents to be viewed on any of these clients out of the box, but understand that in certain cases customers might wish to restrict clients to the latest version. For example, there may be cases where customers want to take advantage of newly introduced functionality, such as the new AES-256bit encryption algorithms introduced earlier this year.

As such, we now allow customers to configure each deployed server to restrict which client versions or applications the server may communicate with. Technical details can be found at http://www.adobe.com/devnet/livecycle/articles/deny_services.html.


Need more information on how your organization can effectively manage and protect your intellectual property? Further information can be obtained at http://www.adobe.com/go/rm or by contacting Adobe

 

 

Communicating the value of Adobe’s Information-Centric Security Solutions

We are excited to announce a new set of assets aimed at helping our customer community and ecosystem partners better understand the benefits and value that can be derived from Adobe’s Information-Centric security solutions. If you haven’t heard the term “Information-Centric” before, it’s not new, but it well represents the way Adobe technologies protect the confidentiality, integrity, and authenticity of information — natively within the information itself.

For LiveCycle Rights Management ES and LiveCycle Digital Signatures ES, please feel free to download and view a host of new collateral including:

New datasheets that provide a overview of the value proposition and specific areas where our solutions solve real customer problems:

LiveCycle RIghts Management ES: http://www.adobe.com/products/livecycle/pdfs/livecycle_rights_management_es_datasheet_na.pdf

LIveCycle Digital Signatures ES: http://www.adobe.com/products/livecycle/pdfs/95011596_lc_digisig_ds_ue.pdf

There are also two new whitepapers, the first one for Rights Management is entitled: Delivering an Information Risk Management strategy across the heterogeneous enterprise: and is intended to describe the need to protect sensitive information consistently wherever it resides in the enterprise. This paper also outlines common use cases via customer anecdotes about how LiveCycle Rights Managment ES is protecting the most widely used file types inside (and outside) the organization. http://www.adobe.com/products/livecycle/pdfs/95011600_lc_rightsmgmt_wp_ue.pdf

The second whitepaper is entitled: Electronic Signatures: Solution Scenarios for your Environment: This piece is intended to articulate the different electronic signatures solutions offered by Adobe and help folks understand the pro/cons of each, so you’re best prepared to map right electronic signature solution to your assurance level requirements. http://www.adobe.com/products/livecycle/pdfs/95011606_Digital_Signature_wp_ue.pdf

Finally, there are also new updates to our website including updated customer success stories, in depth pages, features and benefits pages, and a detailed supported formats page for RIghts Management.

LiveCycle Rights Management ES: http://www.adobe.com/products/livecycle/rightsmanagement/
LiveCycle Digital Signatures ES: http://www.adobe.com/products/livecycle/digitalsignatures/
Enjoy!

Setting Signature Trust in Adobe Reader & Adobe Acrobat – Part Three – “The How – Enterprise Trust Settings”

In August, we started to look at how one can set trust for signatures in Adobe Acrobat and Reader.  The first methods we focused on were user-based.  The challenge with these methods is that they require the user to have some background in digital certificate technology or, at the very least, be technically savvy.  The truth is, in most organizations, these methods could be confusing and administrators (and the legal or compliance departments) are not going to necessarily want users manually setting trust on certificates from outside parties.  Also, setting trust in the wrong certificate could lead to business risks when documents are received.  Enterprise-wide methods, on the other hand, can automate to a large degree what the user could do individually and also help to set standards for all users within an organization. 

 

Continue reading…

BPI Philosophy

Often, there are times when the demands of an intellectual property owner are at odds with the desires of an intellectual property recipient/user. First and foremost, IP owners want to make sure that their sensitive information remains sensitive, such that the "right" information is
available to the "right" people. As authors, they specify who is entitled to open content to view, modify, print, etc. Recipients may be surprised to discover that they are not entitled to print or modify protected content, particularly if in the past they were able to — in spite of expressed intent or legal restrictions in place.

In cases where these two conflict, our philosophy is to favor the intellectual property owner and his intent, as security is more important than convenience. We do, however, wish to provide users with the best experience possible. We understand that to be effective security must be straightforward and seamless.

Accordingly, we have developed a philosophy of prioritizing "Block, Prevent, and Inform." It is most important for our Rights Management solutions to block actions prohibited by the author. In addition, we aim to prevent users from attempting to perform operations that are blocked. For example, we disable menu items that are blocked. Finally, we want recipients to understand what restrictions are in place and why, and so we have mechanisms in place to inform them.

Here is an example of how we inform users of what is and is not allowed. Within our LiveCycle Rights Management ES Extension for Microsoft Office, we include "security status" on the Office Ribbon bar to provide context for the protections in place.


Questions or feedback on this entry? Contact us at RMFeedback@adobe.com

Need more information on how your organization can effectively manage and protect your intellectual property? Further information can be obtained at http://www.adobe.com/go/rm or by contacting Adobe

Live Webcast: Information Assurance – Keeping Your Documents Secure

Join us for this LIVE Event on:
Wednesday, October 29, 2008
12:00 PM PT / 3:00 PM ET

The need to keep your organization’s business critical information confidential by restricting distribution and preventing unauthorized disclosure of this information is imperative. Discover how Adobe Acrobat 9 can help protect your organization’s sensitive information by helping provide document control and security, addressing issues such as encryption, document authenticity, passwords, redaction, and sanitization/metadata removal. Join John Landwehr as he covers best practices on Security and Information Assurance.

More information and registration is available here.