1 / 48

Windows Rights Management Services

Agenda. TerminologyThe Business ProblemRMS IntroductionRMS Keys and CredentialsTechnical Prerequisites and Components. Terminology. RMS: Rights Management ServicesWindows client and server add-onIRM: Information Rights ManagementMicrosoft Office features enabled by RMSDRM: Digital Rights Man

deandra
Download Presentation

Windows Rights Management Services

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


    1. Windows Rights Management Services Kim Mikkelsen Chief Security Advisor Microsoft Denmark

    2. Agenda Terminology The Business Problem RMS Introduction RMS Keys and Credentials Technical Prerequisites and Components

    3. Terminology RMS: Rights Management Services Windows client and server add-on IRM: Information Rights Management Microsoft Office features enabled by RMS DRM: Digital Rights Management Windows Media DRM

    4. Traditional solutions protect initial access…

    5. Today’s policy expression…

    6. Information Loss is Costly Information loss—whether via theft or accidental leakage—is costly on several levels

    7. Information Protection Needs are Increasing Rapidly

    8. Information leakage is top-of-mind with Business Decision Makers

    9. RMS, EFS, and BL-FVE Partners in Protection

    10. How does RMS address this?

    11. RMS Overview

    12. Client Usage Scenarios

    13. Protecting Intellectual Capital: RMS Workflow

    14. RMS/PKI Technology Comparison

    15. RMS does not protect against analog attacks…

    16. Rights Management Services Keys, Credentials, and Key Flow

    17. RMS Credentials and Licenses

    18. Example: Rights-Protected Document Word, Excel, or Powerpoint 2003 Pro

    19. How does RMS work?

    46. Rights Management Services RMS Technical Prerequisites

    47. RMS Solution Components

More Related