“We needed to streamline our eBook process and maintain user-friendly access for our clients – cloud and HTML5-based documents was the way to go. We switched from another DRM provider to Vitrium Security because it offered web-friendly secured documents with no plug-ins or apps to[...]
Grant Burnard is the Chief Technology Officer for Vitrium and is responsible for the overall product direction of the company. He is one of the chief architects and implementers of Vitrium’s document security solution, Protectedpdf. He discuss document security with Thomas Capone from NYDLA.Read More
The advent of digital media, combined with the internet and popular file sharing tools, has made it easier than ever to share information. Organizations now need to find ways to protect their digital information against misuse, unauthorized access, and uncontrolled distribution.Read More
The use of copyrights and other legal protections to keep content from being misused have been evolving over quite some time. The United States has always valued the freedom of expression and the press. While this has influenced how document protection and information propriety has been handled, it was not until 1976 that the bulk of copyright law as we know it came to be. Here is a brief[...]Read More
Digital publishing is now a mature, thriving industry, and yet many still insist that publishing is declining. While printed book sales dropped slightly between 2008 and 2012, eBook sales grew at an astonishing rate during that same time. Just as hand-copied books were revolutionized by the printing press, digital technologies are transforming print publishing.Read More
In today’s business world, protecting company privacy is essential. Unfortunately, the number of cases associated with online theft is rising. It is challenging to ensure company data is secure, however, taking time to understand who has access to important data and how to best protect it is well worth the investment of time and money. We’re going to identify five proactive ways in which[...]Read More
[PRWeb | Vancouver, December 7, 2015] Vitrium announced today the release of its Application Programming Interface (API) for its popular document security solution, Protectedpdf. The new API will allow developers to integrate their software and workflows with Vitrium’s DRM and document encryption software.Read More
How important is it to protect your intellectual properties? If you think that your content is safe, you may want to read on. Copyright infringement and online piracy may have a bigger impact than you may think.
According to a study done in 2010 by Rockwool Foundation Research Unit, about 70% of all internet users found nothing wrong in online piracy, while the Information Technology &[...]Read More
When you lock up your house for the evening or if you are going away, you make sure that all points of entry are locked. If your home is to be targeted by a thief, they will probably not try the front door, but instead look for a vulnerable spot to enter (maybe the sliding door in the back or an open window if the season permits). It’s well known that in order to keep your family safe from[...]Read More
We’re taking the pledge to go paper free on World Paper Free Day 2015, and we want you to join us!
The Association for Information and Image Management (AIIM), a global community of information professionals, is taking the initiative to challenge the business world to use less paper and eliminate the waste that office paperwork can create. According to a recent study done by AIIM, 35% of[...]Read More
You hear about these large scale data breaches where another big corporation becomes victim to a cyber-attack. While these news stories seem to be popping up more and more these days, the truth is cyber-attacks are happening all the time and have been for a long time. You may be wondering who these attackers are targeting and why? While the why may not always be clear, we can deduce from[...]Read More
"Cyber threats pose one of the gravest national security dangers the United States faces" - Barack Obama.
Sponsored by the National Cyber Security Division of the Department of Homeland Security and the National Cyber Security Alliance, October has been designated National Cyber Security Awareness Month (NCSAM).
Since its inception in 2004, National Cyber Security Awareness Month been helping[...]Read More
Chances are your business collects and stores your customers’ personal information. This is especially true if you’re in the financial industry. You may not know, but it is your company’s legal responsibility to ensure that the data collected is handled and stored properly. If your customers become victims of identity theft because of your company’s poor practices, your company will be held[...]Read More
The age of digital everything is here. People are now able to work from wherever they are and on whatever device they choose thanks to advancements in mobile technology, the cloud and the Internet of Things. The Internet of Things is defined as a network of physical objects (things) that are embedded with software and network connectivity so that the “things” can collect and exchange data.[...]Read More