FileOpen Client 0945 for Adobe Acrobat/Reader (WIN)

Posted by FileOpen DRM News

We have released an updated FileOpen Plug-in for Adobe Acrobat and Reader for Windows, Build 0945.   This new client implements support for the latest Adobe Acrobat/Reader on Windows. Specific improvements include:

  • Support for cookie detection in latest version of Chrome 
  • Optimizations and bugfixes, including an issue related to PDF printing

This update replaces the Windows 0942 release from June 2014.

 

FileOpen Client 0945 is backward-compatible to Adobe Reader/Acrobat 7.  While not always necessary, we encourage users to uninstall previous versions of the FileOpen Plug-in prior to installing the latest.

Topics: FileOpen plug-in, Client Release, Adobe Reader 11

Four Reasons to Use FileOpen to Protect Files in the Cloud

Posted by FileOpen DRM News

As businesses move to the cloud for their document storage and sharing needs, the need for stronger and more persistent security at the file level has gained urgency. However, the dominant cloud providers still do not offer  enterprise-grade security and rights management solutions, even to their "business" customers. 

FileOpen aims to fill that gap by providing responsive document control, policy enforcement and tracking regardless of where the actual files are stored, including the cloud. We've also made it easier to use cloud services such as Dropbox as a secure document delivery platform, by automatically encrypting the contents of designated folders and seamlessly authenticating user access. 

 

cloud

 

1. Persistent Security
    • Local AES-256 bit file encryption – no need to upload source files.
    • Expire documents by date, time or usage.
    • Revoke or kill access to specific documents as needed.
    • Disable or restrict copying/pasting, saving, editing and screen captures.
    • Display user identifying watermarks on every view and/or print.
    • Restrict document access to a specified count of devices by user.
2. Uncompromised User Experience
    • View protected documents in native applications such as Adobe Reader/Acrobat, Word, Excel, and PowerPoint, or in any browser that supports Flash version 11+ or HTML5
    • No cumbersome downloads or passwords to remember--authorized users may not even realize the file is protected
3. In-depth Analytics
    • Obtain a complete audit trail of document usage by user including, IP address, device type, time stamp, and more.
    • Understand your audience with page-level engagement and print metrics.
    • Review IP address and machine context of failed authentication requests to better understand unauthorized sharing patterns.
4. Built for Business
    • Plugs directly into your existing file sharing solutions so you can share files with a simple web link; Google Drive, DropBox, Box, ShareFile, Egnyte, Hightail, OneDrive, etc.
    • Integrate into existing authentication schemas such as Active Directory, SSO, SAML, etc.
    • Seamlessly integrate into virtually any other third-party system or database; including, eCommerce systems, intranets, LMS/CMS, SharePoint, and more. 

While many vendors are moving to capitalize on the growing need for secure file sharing with yet another 'better' cloud sync and share system, FileOpen’s approach has always been to focus on the document security, not the device nor the means of distribution. By securing the file itself, but storing permissions separately, FileOpen can offer truly portable file security regardless of the endpoint. 

 

Contact us to see how you can share files securely without changing your current technology investments, corporate culture or workflows.

Topics: secure file sharing, document security, cloud

FileOpen Client 0942 for Adobe Acrobat/Reader (WIN)

Posted by FileOpen DRM News

We have released an updated FileOpen Plug-in for Adobe Acrobat and Reader for Windows, Build 0942.   This new client implements support for the latest Adobe Acrobat/Reader on Windows. Specific improvements include:

    • Compiled from Adobe Reader/Acrobat Plug-in SDK Version XI
    • Additional support for Postscript printing
    • Enhanced support for offline permissions with Adobe Read X/XI protected mode enabled
    • Various bug fixes and enhancements

This update replaces the Windows 0928 release from April 2014.

 

FileOpen Client 0928 is backward-compatible to Adobe Reader/Acrobat 7.  While not always necessary, we encourage users to uninstall previous versions of the FileOpen Plug-in prior to installing the latest.

IBM Validates FileOpen as a WebSphere Commerce Partner

Posted by FileOpen DRM News

Today we are pleased to announce our membership in the IBM PartnerWorld® as a validated technology partner.  Together, IBM WebSphere® Commerce and FileOpen will bring innovative e-commerce services and document security solutions to serve the global community of IBM WebSphere Commerce partners and customers.IBM Business Partner Logo

 

WebSphere Commerce customers can now leverage the built-in integration with FileOpen DRM to stop piracy and retain revenues from documents sold online.  The integration with IBM WebSphere Commerce provides full automation between the payment process, the issuing of document access and enforcement of document permissions.

 

The FileOpen WebSphere integration works by granting paying users access to purchased documents while denying privileges to those who have not purchased.  Additionally, the FileOpen Document Security Module enforces granular access controls such as document expiration, saving of local copies, and the imposition of user-specific watermarks.  From a paying user perspective, there is no interruption of service. In fact, with FileOpen's lightweight clients, paying users may not even be aware that documents are secured.  Documents open in standard document viewers, within a Web browser or in a native Android or iOS app.   Notwithstanding the ease-of-use, forwarded documents will not authenticate and cannot be viewed by unauthorized users. 

 

“The advantage of FileOpen Document Security is that it takes the headache out of selling documents online.  The document owner simply hosts the protected document on the Web store and can rest assured that only the paying user can access the document,” said Sanford Bingham, CEO & President, FileOpen Systems Inc.  “The integration allows publishers to focus on increasing sales, instead of wasting time manually setting permissions and keeping databases in sync.”     

 

Key Features: 

    • Control access: Apply local AES-256 bit encryption to protect documents from piracy.
    • Retain revenue: Stop the forwarding of documents — absolutely no unauthorized access.
    • Support mobility: Deliver documents securely to PCs, iPad, iPhone, and Android... instantly.
    • Enforce policy: Control how recipients use information even after delivery.
    • Monitor activity:  Track how often documents are used, by who.

 

For more information see the IBM WebSphere Commerce Validated Technology Partner Listing or request a personalized demonstration

Topics: document security, eCommerce, stop document piracy, partner

FileOpen Viewer for iOS (v2.3.1)

Posted by FileOpen DRM News


We are pleased to release the latest version of the FileOpen Viewer for iPad®/iPhone®.  The app updates like any other app you are accustomed to.  If you don’t have automatic updates enabled you will need to manually press "update" from the AppStore.

 

What's New in Version 2.3.1

describe the image
    • Improved persistent device identifiers.
    • Support for most legacy and recent watermark syntax.
    • Various bug fixes.

 

This update replaces version 2.3 posted to iTunes on 1/13/2014.

Topics: iPhone, iPad, BYOD, secure mobile file sharing

Gathering clouds: Secure Cloud-based File Sharing & Storage

Posted by FileOpen DRM News

Are the major cloud providers growing too fast to pay attention to file security?

 

According to research released by IHS Technology this month, spending for cloud infrastructure and services will reach about $174.2 billion in 2014, up 20% from 2013. The cloud promises enterprises cheaper and faster data storage and delivery, but what are the implications of so much data being held by a small handful of dominant cloud providers? Amazon, Box and Dropbox have already been ripe targets for ambitious hackers, and have been slow to offer additional layers of file security to safeguard their customers’ data. Furthermore, files being uploaded and shared in the cloud have no security in transit or after being shared with another user.screenshot 2014 01 10 21 48 01

 

FileOpen has been watching the trend toward cloud storage, and recently introduced support for secure file sharing in the cloud via Dropbox, Box, ShareFile, and others. FileOpen’s cloud support works by giving publishers a unique, private URL which displays a custom view of a folder in their cloud storage account. Publishers add FileOpen-encrypted files to the folder and share the custom URL with their intended recipients. When the user attempts to open the target file, which may be PDF, OPN, or one of the MSOffice file types, they are authenticated seamlessly via the FileOpen RightsManager/RightsServer back-end and the file displays on the user’s device.

 

For publishers already using FileOpen encryption on their files, our cloud support provides a new, simplified way of delivering files to users and an alternative to maintaining a complex distribution infrastructure. Access to secured files through the cloud can also be integrated to a publisher’s website via an HTML frame, displaying the file inline so it appears served from the publisher site, while it is actually retrieving the file from the cloud folder.

 

For those already using Dropbox or other cloud providers to share documents, FileOpen can add a layer of strong security, both in the cloud, in transit, and after delivery to the end-user, which none of the major cloud providers can offer. As with any FileOpen-protected file, whether shared through the cloud or by other means, access can be granted, modified or revoked at any time, to any device, even after delivery. Recipients of FileOpen-secured files accessed through the cloud don’t experience any degradation of the normal viewing experience—no password entry is necessary.

 

Check out our page on adding a layer of FileOpen security to file sharing in the cloud or request a personalized demonstration.

Topics: secure file sharing, document security, protect cloud-based storage

FileOpen Viewer for Android v2.4

Posted by FileOpen DRM News

FileOpen Viewer for Android (v2.4)
We are pleased to release the latest version of the FileOpen Viewer for Android.  The app updates like any other app you are accustomed to.  If you don’t have automatic updates enabled you will need to manually press "update" from the Google Play.describe the image

What's New in Version 2.4.

  • Enhanced visuals and user interface.
  • Support for most recent server protocol.
  • Document re-sizing and other various bug fixes.

This update replaces version 2.2 posted to GooglePlay in October 2013.  

 

Topics: Secure Document Viewer, Android, document security, secure mobile file sharing

U.K.’s ICO Reports Security Gaps in Foster Care Data Protection

Posted by FileOpen DRM News

 

Today a report published by U.K.’s Information Commissioner’s Office (ICO) highlighted the data protection challenges and privacy risks agencies face when dealing with sensitive personal information. While the ICO’s study was limited to the foster care system, their findings highlight the importance of protecting sensitive personal information across all social services.

 

Risks and Penaltiesdreamstime xxl 1014008 resized 600

 

  • Highly sensitive personal information concerning foster carers and looked after children is routinely emailed between agencies and local authorities for the purpose of arranging foster care placements without encryption.  The lack of such safeguards increases the risk that the information could be inappropriately accessed. 
  • The majority of agencies visited did not encrypt mobile devices used to process, store or transport personal data. This included items such as laptops and USB sticks. If lost or stolen, any such devices containing sensitive personal data could be easily accessed. 
  • Fostering agencies often require carers to provide them with updates about looked after children but they do not provide secure methods such as VPNs by which to do this. Sensitive personal information is therefore processed on home computers and stored in the ‘cloud’ in ISP or webmail accounts (Hotmail, Gmail etc.). 
  • Some agencies allow their staff to carry out work involving sensitive personal data on their home computers instead of providing appropriate remote access to their network, an encrypted memory stick or a work issued encrypted laptop on which to save their work. 
  • Adequate data protection/information security training is not provided by agencies to their staff.

 

John-Pierre Lamb, ICO Group Manager in the Good Practice team, said,  "The worst breaches of the Data Protection Act can lead to a monetary penalty of up to £500,000, but when you consider the sensitivity of the information this sector is responsible for, the human cost could be far more significant.”

 

How to Get Compliant
 

Nowhere is the need for privacy more important than in protecting personal information about children in need and the foster families who help them. Minimizing this threat doesn’t necessarily mean rigid, cumbersome security measures of the past. A few best practices that could prevent a breach of this nature:  

  1. Secure sensitive documents:  Using a DRM solution like FileOpen RightsManager allows you to grant permission to only certain users. If one of those users accidentally forwards the document to the wrong person, it can’t be opened or viewed. Moreover, DRM enables you to instantly revoke access to a previously authorized recipient, if necessary, or even to one of their devices if misplaced or stolen.
  2. Enforce usage and retention policies: Advanced DRM solutions allow you to control exactly how a recipient uses your document, adding layers of security to the most sensitive documents. Restrict or expire privileges on a need-to-know basis. Different organizations, and levels within them, can be granted unique sets of permissions on the same document.
  3. Apply detailed watermarks: As a final measure of security, watermarks can ensure the traceability of sensitive documents by overlaying key information about the user, such as their name, date, time, printer and location. Watermarks can provide the “smoking gun” in determining where and when a document was leaked, and aid authorities in enforcing compliance with privacy regulations.
  4. Enable secure, but uncomplicated access: At the core of any failed security initiative is an overly complex, hard-to-use solution. FileOpen eliminates such hurdles with the FileOpen Viewer, which provides access to protected documents through Web browser with no plugins or desktop software required.  It also provides Android or iOS user’s access on their smartphones and tablet through native applications.  

 

 

Contact us for more information or to get a personalized demonstration.

 

 

Topics: document encryption, protecting data, secure file sharing, protecting sensitive documents, data protection

A Lesson in IP Protection: Tarantino Shelves The Hateful Eight After Script Leak

Posted by FileOpen DRM News

In the latest of a series of damaging leaks in Hollywood, the LA Times has reported that Quentin Tarantino has decided to shelve plans to film The Hateful Eight after the confidential script was circulated far beyond the small circle of actors to which Tarantino initially sent it. Tarantino is quoted by Deadline as saying “I finished a script, a first draft, and I didn’t mean to shoot it until next winter, a year from now. I gave it to six people, and apparently it’s gotten out today.”  Evidently one of the actors under consideration for a role shared the document with his agent, who then passed it along to “everyone in Hollywood.”

 

 

Other prematurely leaked scripts in recent years include the script of Breaking BadEntourage, The Fifth Estate, The Avengers,  among others.  Many of these leaks happened without malicious intent by the responsible party, but they can be extremely damaging to creative projects that rely on an air of secrecy to attract a top-notch cast and ensure marketability as it enters production.  In the days of printed copies, controlling copies of a script were somewhat easier, but increasingly scripts are being shared in digital form, most often without any encryption or with easily shared document passwords.  

 

 

A Hollywood Primer on DRM in Three Steps

 

  1. Secure your scripts using a real DRM solution, not passwords:  Document passwords can easily be passed along with confidential documents. Using a DRM solution like FileOpen RightsManager allows you to grant permission only to certain contacts. If one of those contacts forwards the document, it can’t be opened or viewed. Moreover, DRM enables you to instantly revoke access to a previously authorized recipient, if necessary, or even to one of their devices if misplaced.
  2. Place usage restrictions on your scripts: Advanced DRM solutions allow you to control exactly how a recipient uses your document, adding layers of security to the most confidential documents. Restrict or expire printing privileges, log the time and location of each print attempt, embargo or expire ascriptccess to an absolute date or after a certain number of days (or even minutes!), and specify how many devices on which a user can view a document.
  3. Apply detailed watermarks: As a final measure of security, watermarks can ensure the traceability of high-value documents by overlaying key information about the user, such as their name, date, time, printer and location. Those in possession of a physical copy of the document are far less likely to share or sell a document with their identity displayed on each page. FileOpen RightsManager allows admins to set unique watermarks that appear on both the digital and printed document, or only on the printed version.

 

 


Contact us if you would like to learn more about how the film industry uses FileOpen DRM.

FileOpen invites you to our upcoming webinar: "Is BYOD the weak link in your document security strategy?"

Posted by Amanuel Tsighe

 

The FileOpen team is excited to announce our third webinar in a monthly series: "Is BYOD the weak link in your document security strategy?"Join us on Tuesday, November 19 at 10:00 am Pacific/1:00 pm Eastern to see why leading corporations choose FileOpen to secure their documents in the era of BYOD.  


describe the image

Managing the BYOD (Bring Your Own Device) phenomenon can be challenging, but with the right security policies and technology, you can strike the right balance between enabling mobility and security.

 

 

Discover how organizations in your industry use FileOpen DRM to:

  • Support corporate “bring your own device” (BYOD) initiatives
  • Authenticate users and protect documents on PCs, Mac OSx, iPad, iPhone, and Android
  • Securely share documents by email or via the cloud (e.g. Dropbox)
  • Expire or revoke document access at any time — even after delivery
  • Keep users happy with a hassle free user experience
  • Track when and where your documents are being viewed, and for how long



Register Now Button Orange resized 600




Have a question you would like us to answer during the presentation? Ask below!

 


Topics: drm, document security, live webinar