At FileOpen we understand that building out your security infrastructure can be a daunting task. Every document security and DRM vendor claims their solution is bigger, better and faster than the others. It is vital to evaluate these claims and potential issues before a solution is purchased. We advise our potential customers to create a checklist encompassing their core requirements and desired results. A checklist may start small and grow as you assess each solution. To assist in this process we have put together a few questions based on what our customers have consistently identified as important differentiators, such as:
- Security and encryption
- Recipient ease-of-use
- Day-to-day administration and permissioning
- Flexibility and extensibility (integrations)
Security and encryption
This section covers issues pertaining to file-level security and encryption. This encryption makes the contents of your files indecipherable to unauthorized individuals. Document encryption uses complex mathematical algorithms to convert documents into an information package that cannot be read until there is a positive client server interaction verifying user identity and permissions. So, if an unauthorized individual intercepts an encrypted document they will not be able to access and read it.
FileOpen gives you a choice of encrypting on-premise or in the cloud, so you never have to upload an unprotected file. Once the document is protected, it can be distributed safely through whatever mechanism or protocol is most appropriate. Documents are secured at all times and can only be accessed after a positive client server interaction verifying user identity and permissions.
FileOpen
|
Other Vendor
|
|
|
YES
|
|
|
NO
|
|
|
YES
|
|
|
YES
|
|
|
YES
|
|
Recipient ease-of-use
One of the biggest challenges of document DRM is making it easy for your users to share, access and work with protected files. No organization wants to lose control of protected documents, or to place unnecessary barriers between authorized users and the information they need to do their jobs. With FileOpen’s versatile client set you can define when, where and how users can interact with documents while still allowing users to use the productivity tools of their choice.
FileOpen
|
Other Vendor
|
|
|
YES
|
|
|
YES[1]
|
|
|
YES
|
|
|
NO[2]
|
|
Day-to-day administration and permissioning
This section covers issues pertaining to administering document access and usage controls. These features allow you to securely share your files with others, while maintaining full control over who accesses them and how they can work with them. With FileOpen software, you control who can access your files by defining groups and including the users in these groups. For each group, you set specific usage policies, such as print restrictions, watermarks and offline capabilities. You then protect documents by assigning them to their respective groups, according to the permissions you want to grant. You can change a user’s or documents group membership at any time, with immediate effect.
FileOpen
|
Other Vendor
|
|
|
YES
|
|
|
YES
|
|
|
YES
|
|
|
YES
|
|
|
YES
|
|
|
YES
|
|
|
YES[3]
|
|
Extensibility & flexibility
This section is designed to help you find an integration-friendly solution; one that enhances and extends current investments. At FileOpen, we work with customers evolving standalone solutions into infrastructure that protects and controls documents as they are created or on-demand. Our extensive list of services and APIs allow any person or system within an organization to protect documents and permission authorized users.
FileOpen
|
Other Vendor
|
|
|
YES
|
|
|
YES
|
|
|
YES
|
|
|
YES
|
|
|
YES
|
|
|
YES
|
|
Creating a vendor checklist can be a difficult task but after reviewing your company’s polices you should be able to create a list that will help you decide which solution will conform to your company’s security requirements. Contact us today for more information on how FileOpen solutions stack up or sign up for a free 14-day trial and see for yourself.
[1] The FileOpen Plugin/Client is required to securely collaborate within native publishing tools like Adobe® Acrobat®, Microsoft® Word® and Excel®
[2] While not required to preview a FileOpen-protected document in a browser, native iOS and Android Apps are freely available and provide a larger feature set.
[3] FileOpen offers extensive APIs to connect document and user permissioning to almost any third party system.