At Liquid Machines, a Harvard Dean’s Invention Plugs Document Leaks

into a computer’s active memory. Once the Liquid Machines software has taken over the program, it gives it the ability to decipher specially encrypted files on the fly. It holds the decrypted version in memory, and can send the information to a printer or a display, where the end user can read it.

Because the Liquid Machines system intercepts and controls all of the information passing into and out of the original application, it can prevent that information from going anywhere else without first being re-encrypted. For example, a user of a protected Word document could copy and paste information from that document into a non-protected one—but the second document would then automatically be saved in encrypted form.

Not only does this approach to document protection prevent unauthorized access—the goal of all digital-rights management technology—but it has the huge advantage of being portable and independent of the applications that handle specific types of content. In a company with Liquid Machines software, in other words, employees don’t need special, secure versions of Word or Outlook or Acrobat or Visio or SolidWorks or any of the other software they use to generate and exchange knowledge. They just need the Liquid Machines application installed on their computer or handheld device (it also works on the RIM Blackberry, in addition to Windows desktops and laptops).

“Most security technology forces people to change they way they do their work, which is a bad thing, because it inhibits productivity,” says Ruffolo. “Having been a CIO, I know it’s difficult even to get people to change their passwords, let alone upgrade every application they use so that it’s secure. We have really solved the ease-of-use problem for customers who want to promote security but not reduce productivity.”

Organizations like Goldman Sachs, Philip Morris, Symantec, Dow Chemical, and the United States Marine Corps have adopted Liquid Machines’ software to control internal documents and prevent accidental (or intentional) breaches. Typically, Ruffolo says, a company will run a small pilot test within a single department, then scale up to multiple departments—and then, in a growing number of cases, licensing the product for use across the entire company, as Goldman Sachs has done, buying seat licenses for 42,000 employees.

Companies appreciate Liquid Machines’ technology, Ruffolo says, because it doesn’t interfere with employees’ everyday work. In fact, with application injection, a user of Microsoft Word or Adobe Acrobat would normally never notice that Liquid Machines’ software has stepped in to oversee the flow of information inside the computer (except for the special control panel called the “policy droplet” that lets the creator of a document specify who is authorized to access it).

“We think our technology is going to become like car seats—just a common-sense way to protect information that needs to be protected,” says Ruffolo. “It’s ironic, but law firms tend to be the slowest to adopt document protection technology. They hide behind the disclaimers at the bottom of their email. It’s their clients”—including, perhaps, a red-faced and incensed Eli Lilly—“that are forcing them to act.”

Author: Wade Roush

Between 2007 and 2014, I was a staff editor for Xconomy in Boston and San Francisco. Since 2008 I've been writing a weekly opinion/review column called VOX: The Voice of Xperience. (From 2008 to 2013 the column was known as World Wide Wade.) I've been writing about science and technology professionally since 1994. Before joining Xconomy in 2007, I was a staff member at MIT’s Technology Review from 2001 to 2006, serving as senior editor, San Francisco bureau chief, and executive editor of TechnologyReview.com. Before that, I was the Boston bureau reporter for Science, managing editor of supercomputing publications at NASA Ames Research Center, and Web editor at e-book pioneer NuvoMedia. I have a B.A. in the history of science from Harvard College and a PhD in the history and social study of science and technology from MIT. I've published articles in Science, Technology Review, IEEE Spectrum, Encyclopaedia Brittanica, Technology and Culture, Alaska Airlines Magazine, and World Business, and I've been a guest of NPR, CNN, CNBC, NECN, WGBH and the PBS NewsHour. I'm a frequent conference participant and enjoy opportunities to moderate panel discussions and on-stage chats. My personal site: waderoush.com My social media coordinates: Twitter: @wroush Facebook: facebook.com/wade.roush LinkedIn: linkedin.com/in/waderoush Google+ : google.com/+WadeRoush YouTube: youtube.com/wroush1967 Flickr: flickr.com/photos/wroush/ Pinterest: pinterest.com/waderoush/