480 likes | 966 Views
Agenda. TerminologyThe Business ProblemRMS IntroductionRMS Keys and CredentialsTechnical Prerequisites and Components. Terminology. RMS: Rights Management ServicesWindows client and server add-onIRM: Information Rights ManagementMicrosoft Office features enabled by RMSDRM: Digital Rights Man
E N D
1. Windows RightsManagement Services Kim MikkelsenChief Security AdvisorMicrosoft Denmark
2. Agenda Terminology
The Business Problem
RMS Introduction
RMS Keys and Credentials
Technical Prerequisites and Components
3. Terminology RMS: Rights Management Services
Windows client and server add-on
IRM: Information Rights Management
Microsoft Office features enabled by RMS
DRM: Digital Rights Management
Windows Media DRM
4. Traditional solutions protect initial access
5. Todays policy expression
6. Information Loss is Costly Information losswhether via theft or accidental leakageis costly on several levels
7. Information Protection Needs are Increasing Rapidly
8. Information leakage is top-of-mind with Business Decision Makers
9. RMS, EFS, and BL-FVEPartners in Protection
10. How does RMS address this?
11. RMS Overview
12. Client Usage Scenarios
13. Protecting Intellectual Capital: RMS Workflow
14. RMS/PKI Technology Comparison
15. RMS does not protect against analog attacks
16. Rights Management Services Keys, Credentials, and Key Flow
17. RMS Credentials and Licenses
18. Example: Rights-Protected Document Word, Excel, or Powerpoint 2003 Pro
19. How does RMS work?
46. Rights Management Services RMS Technical Prerequisites
47. RMS Solution Components