1 / 19

Information Rights Management

Information Rights Management. EMC Content Management and Archiving. 82%. 18%. Business Drivers for Content Security. “Despite massive investment in security technology and services…. Protect intellectual property Trade secrets Competitive information IP theft Secured collaboration

Download Presentation

Information Rights Management

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Information Rights Management EMC Content Management and Archiving

  2. 82% 18% Business Drivers for Content Security “Despite massive investment in security technology and services… • Protect intellectual property • Trade secrets • Competitive information • IP theft • Secured collaboration • Compliance • Regulations • Audits • Risk mitigation • Legal exposure • Data loss • Privacy breaches …fewer than one in five companies feel that all their data is adequately protected.” Source: Enterprise Strategy Group March 2006 2

  3. + Perimeter-based Security Information-based Security Keeping the bad guys out Assume they’re already in Denial of Service, network intrusion, external attack Threat Privacy breach, intellectual property theft, insider attack Access and availability Focus Authorization and accountability Firewall, IPS/IDS, anti-malware Approach Identity management, data encryption Build and protect perimeters Solution Manage and protect information Addresses root cause The Threat Profile Has Shifted 84% of high cost security incidents are a result of insiders sending confidential material outside of their company. • Gartner 2006 Necessary but insufficient

  4. Most information security products don’t actually secure information They protect networks, laptops, and servers They do little to protect confidentiality and integrity of information Anti-virus Threat Detection Change/Patch Management VPN Clients Servers Firewall LAN SAN Authentication Web Filtering Anti-virus Anti-spyware Solutions Not Addressing the Root Issue

  5. Anti-virus Threat Detection Change/Patch Management VPN Clients Servers Firewall LAN SAN Authentication Web Filtering Anti-virus Anti-spyware ? Your Content is in Motion Information is in constant motion throughout its lifecycle, making it difficult to lock down • Perimeters and resources are constantly being traversed

  6. IRM actively controls, secures and tracks sensitive and confidential information wherever it resides. Information Rights Management

  7. IRM Policy Server IRM Server Key and Policy Management Desktop Integration • Content is always encrypted • The keys are always separated from the content • The local key is destroyed after use Workflow Integrations Content Owner File Share + Policy + Policy EMC Documentum Repository EMC Documentum eRoom

  8. Partner Network Hacker EMC IRM Services for Documentum Workflow Secure Data Sharing Partner Network Author Corporate VPN Internet Review IRM Policy Server Content Server

  9. Internet Explorer EmailXtender Web Delivery Adobe eRoom Gateway MS Office Documentum Admin File Share MS Outlook and Lotus Notes Webtop Java, WDK-based API Information Rights Management SDK EMC Documentum IRM Server Authorization Authentication Auditing Key Mgmt Policy Mgmt Encryption Authentication Infrastructure ALL Authentication Domains LDAP Win X509 RSA Documentum Custom EMC IRM Architecture

  10. Features – Protects Native Business Information • Clients for major business applications • E-mail • Microsoft Office • Adobe • HTML • RIM Blackberry • Lotus Notes • Works within native application • Allows secure sharing of sensitive documents with internal and external users

  11. Features – Rights Enforcement by Policy A document policy defines: • Who can view • What pages can be viewed (PDF only) • When it can be viewed • If copy or edit is allowed • If printing is allowed • If guest access is allowed • If offline viewing is allowed • Automatic expiration • Dynamic watermarks

  12. Features – Rights Enforcement by Policy Mandatory and discretionary policy enforcement options • Choose rights enforcement using administratively-defined templates or ad-hoc policies • Flexibility supports organizational rollout • Allows for workgroup and enterprise-wide applications

  13. Features – Dynamic Watermarking • Dynamic watermarking can provide visible indication of who printed a copy and when they printed it • Can be used for compliance and auditing • Provide watermarks while viewing and/or when printing • Watermarks are customizable • Watermarks supports Unicode • Watermarks can use LDAP attributes

  14. NEW Feature – Dynamic Policy Control Dynamic policy control allows recipient entitlements to be changed on-the-fly when individual roles or business needs change, regardless of where the content resides. Example: • In April a price list with IRM is downloaded by a sales person • The sales person e-mails the price list to a customer • On May 17, prices change and new prices are issued • At that time, rights on the old price list are revoked, affecting all copies, regardless of location

  15. Feature – Continuous Audit Trail All events in IRM are auditable • IRM provides granular audit trail of what recipients did with the documents, page by page • See who did what, when • Delivers on-going assurance of policy compliance • Auditing is continuous, whether online or offline • Leverage XML logging standards for reporting on audit trail 22

  16. Customer Case Study Ford Motor Company Requirements • Securely share the 10 year “Vehicle Vision” product plan for the Ford brands and keep away from competitors and the media • Require multiple access levels for brand executives • Must be easy to use for 1,000 insiders around the world, including Chairman Bill Ford Jr. IRM Solution • Document owner protects and distributes through portal • No access outside of current insider list • Username watermark raises the bar on distribution “We don’t want to see this in the Detroit Free Press…”

  17. Case Study Challenges • Sharing price lists and competitive materials with 2000 sales agents and suppliers globally • High cost for logistics to distribute by paper • Competitors placing bounty on our price books IRM Solution • Access is tracked continuously and audited • Ensures only authorized users can access info. • Username is impressed as a watermark • Marketing can irrevocably delete at any time ROI: 6 month payback, elimination of paper and delivery costs Marketing update price books monthly instead of quarterly

  18. Customer Case Study Off Wall Street Requirements • Protect highly valuable financial information sold as a subscription • Ensure that documents are not forwarded to unauthorized users, especially competitors • Regulate what recipients can do with the information (e.g., print, edit) consistently for all reports regardless of who distributes them IRM Solution • “The product has been trouble-free from the start. We've never had a problem with the software, ever.“ • Mark Roberts, CEO • Increases revenue: users cannot access reports without paying for it • Provides policy-based usage controls and audit trail for information access

  19. Industry Use Examples for IRM • Manufacturing • Sharing of new product specifications, planning, R&D, and pricing documents • Government • Share information on a need-to-know basis within intelligence community • Healthcare • Communications with business associates • Control of PHI dissemination • Financial and Legal Services • On-line mergers and acquisitions • Protect customer data • High value research circulation control • Secure distribution of bills of lading 28

More Related