Intellectual property (IP) protection continues to be a concern. IP includes manuals, processes, design documents, research and development data, etc. There are two major issues. The first is keeping confidential information contained, and the second is ensuring that information can only be seen by someone you want to see it. Data classification and access control are two of the many things used to appropriately control access.
Concerns over data flowing out of your business inappropriately can be controlled by data leak prevention (DLP) technology. It watches for sensitive information in data flows such as emails or file transfers.
If DLP software sees sensitive information such as a credit card number, it blocks or stops the transmission. It can also encrypt it if that is a more appropriate action. The question is what your business wants to control and how it wants the network to respond when the DLP software detects that data.
DRM uses technology to control access to IP. If you have used Kindle, iTunes, Spotify, Netflix, or Amazon Prime Video, you have used DRM software. The software enables you to see the video, read the book, or listen to the music once you have purchased it from the vendor. A business example is Cisco controlling access to course manuals once the customer purchases a class.
Javelin and LockLizard are other examples of DRM technology businesses can use to control content distribution. DRM technology uses access control that governs how long someone can use the content, if it can be printed, if it can be shared, etc. The parameters are based on the IP owner’s desires.