Access "Information Rights Management protection in Exchange 2010 SP1"
This article is part of the February 2011, Vol. 8 issue of Prepping BlackBerry Enterprise Server for Exchange 2010 SP1
No matter what corporate policies are in place to prevent it, users will still send email messages containing sensitive information. It’s the administrator’s job to protect these messages. And although encryption technologies such as TLS and S/MIME can, to some degree, protect these messages, both technologies fall short of providing comprehensive message security. Enter Exchange Server’s Information Rights Management (IRM) feature. IRM allows a sender to specify what the recipient can and cannot do with the message. For example, a sender might use IRM to prevent the recipient from forwarding or printing the message. Admins can also use IRM to prevent recipients from extracting message contents using copy and paste or the Windows snipping tool. You can configure IRM-protected messages with an expiration date after which the message can no longer be viewed. With all of IRM’s unique security capabilities, it is no wonder that so many organizations use it to protect sensitive data. Of course, all of this protection comes at a price; IRM is useless unless the ... Access >>>
Premium Content for Free.
BES 5.0.2 and Exchange 2010 SP1: What you should know
by Richard Luckett
Can't decide which version of BES 5.0.2 to roll out? Compare features and determine if your setup meets the prerequisites.
Information Rights Management protection in Exchange 2010 SP1
by Brien Posey
Nearly all organizations send and receive sensitive information via email. And although they exist, corporate policies alone won’t protect you. Enter Information Rights Management.
- BES 5.0.2 and Exchange 2010 SP1: What you should know by Richard Luckett
Accepting Exchange 2010 storage redesigns
by J. Peter Bruzzese, Contributor
The push to cheaper storage, the removal of SIS and larger mailboxes are just a few Exchange 2010 storage changes that make some admins uneasy.
- Accepting Exchange 2010 storage redesigns by J. Peter Bruzzese, Contributor
More Premium Content Accessible For Free
IT security and regulatory compliance require identity and access management. However, the move to the cloud and the spread of mobile devices has ...
Exchange 2013 offers features that could benefit administrators and make the idea of hosted Exchange more appealing. We look at how to install and ...
Now that more IT admins are getting comfortable with the idea of hosted Exchange, the next challenge is deciding on the best approach to the cloud, ...