SHARE
Facebook X Pinterest WhatsApp

Vera Applies Document Controls as a Service

Six E-Signature Security Requirements for Digital Transactions Looking to change the way security is applied and managed at the document level, Vera today launched a service that allows users to attach permissions to documents and files that stay with them regardless of where the files are sent. Vera CEO Ajay Arora says the service, formerly […]

Written By
MV
Mike Vizard
Apr 8, 2015
Slide Show

Six E-Signature Security Requirements for Digital Transactions

Looking to change the way security is applied and managed at the document level, Vera today launched a service that allows users to attach permissions to documents and files that stay with them regardless of where the files are sent.

Vera CEO Ajay Arora says the service, formerly known as Veradocs, works by enabling end users to create a micro container through which a set of permissions can be attached by either the end user or the internal IT organization. As those files and documents are shared both inside and outside of the organization, Vera enforces the permission using a metadata wrapper technology the company has developed for that express purpose, says Arora.

In effect, Arora says Vera is creating a data security fabric that enables organizations to hold users more accountable for the security permissions applied to any document or file. In that context, IT organization can set general policies, but it would be up to individual users to take responsibility for not only controlling who gets to access files and documents, but also under what circumstances.

Arora notes that the Vera service itself never stores any documents or files; all it does is enable encryption to be applied and then functions as a control plane that tracks those permissions. The end result is a more secure environment that doesn’t require IT to impose a heavy-handed security framework that is difficult to deploy and maintain, says Arora.

VeraITDashboard

The internal IT organization, says Arora, does get access to encryption keys that allow them to view any documents that have been encrypted, so it becomes the purview of the end user to determine what level of security is appropriate for any given document or file. Arora adds that Vera will offer commercial and later on freemium instances of the service.

For a long time, internal IT organizations have solely borne the brunt of responsibility for document security. While the Vera service doesn’t absolve IT of that responsibility, it does create a mechanism for sharing that responsibility at a time when the network perimeter itself is increasingly becoming indefensible.

MV

Michael Vizard is a seasoned IT journalist, with nearly 30 years of experience writing and editing about enterprise IT issues. He is a contributor to publications including Programmableweb, IT Business Edge, CIOinsight and UBM Tech. He formerly was editorial director for Ziff-Davis Enterprise, where he launched the company’s custom content division, and has also served as editor in chief for CRN and InfoWorld. He also has held editorial positions at PC Week, Computerworld and Digital Review.

Recommended for you...

Observability: Why It’s a Red Hot Tech Term
Tom Taulli
Jul 19, 2022
Top GRC Platforms & Tools in 2022
Jira vs. ServiceNow: Features, Pricing, and Comparison
Surajdeep Singh
Jun 17, 2022
IT Business Edge Logo

The go-to resource for IT professionals from all corners of the tech world looking for cutting edge technology solutions that solve their unique business challenges. We aim to help these professionals grow their knowledge base and authority in their field with the top news and trends in the technology space.

Property of TechnologyAdvice. © 2026 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.