Implementing change is never plug-and-play

06.02.2006

In addition, once a document is protected, it's encrypted and there is no way to effectively search for text within it. Just because we apply a DRM policy to a document doesn't mean we want to hide its existence. We just want to keep unauthorized users from accessing it. The ability to index a document to enable searching is essential.

As I have researched DRM, I have realized that this technology is in its infancy as it applies to businesses. But I must press forward. Deploying DRM is one of my company's strategic objectives, and its success is crucial to my yearly bonus.

What Do You Think?

This week's journal is written by a real security manager, "Mathias Thurman," whose name and employer have been disguised for obvious reasons. Contact him at mathias_thurman@yahoo.com, or join the discussions in our security blogs: computerworld.com/blogs/security.

To find a complete archive of our Security Manager's Journals, go online to computerworld.com/secjournal.