340 likes | 563 Views
Information Rights Management (IRM): Enhancing Security of IBM FileNet. The Problem:. A Typical File Downloading Scenario. User. IBM FileNet. Click for NEXT. Click for NEXT. Once the file is downloaded by the user, IBM FileNet has no control on the file. .
E N D
Information Rights Management (IRM): Enhancing Security of IBM FileNet
A Typical File Downloading Scenario User IBM FileNet Click for NEXT Click for NEXT Once the file is downloaded by the user, IBM FileNethas no control on the file.
A Typical File Sharing Scenario Edited Copied Printed Un-protected File Viewed Distributed Click for NEXT It can further be: Edited, Copied, Printed, Distributed, Viewed(by others) It can further be: Edited, Copied, Printed, Distributed, Viewed (by others) !!
File Downloading Scenario with Seclore FileSecure User IBM FileNet + Seclore FileSecure Click for NEXT Click for NEXT When the file is downloaded, SecloreFileSecure protects the file
File Downloading Scenario with Seclore FileSecure Edited Copied Printed Protected File Viewed Distributed Click for NEXT It can further be: Edited, Copied, Printed, Distributed, Viewed(by others) The user has only restricted usage rights (e.g. view only, edit + print only, etc)
Assigning Seclore Policies to FileNet folder “Hot-Folder”
Policy Admin Computer Policy definition could be centralized (done by central team) or decentralized (done by dept. level teams)
Internal Users External Users Policy Admin Computer Policy is defined as- a. WHO - people / groups within or outside of the enterprise
Policy Admin Computer Policy is defined as b. WHAT - (VIEW, EDIT, PRINT, FORWARD,… )
Policy Admin Computer WHEN date range, time span, … Policy Admin Computer Policy is defined as- c. WHEN - date range, time span, …
Policy Admin Computer Policy is defined as- d. WHERE - Specific computers, specific networks, only from the office, …
User’s Computer User logs into FileNetand downloads a file
User’s Computer The downloaded file is automatically protected with the policy of the “Hot Folder”. Notice the “red” lock
User’s Computer When the user opens the file, he gets to see the rights that he has on the document
User’s Computer If he tries to print….
User’s Computer He will be restricted from printing !!
User’s Computer If the user tries to copy data…
User’s Computer He will be restricted from copying data!!
User’s Computer Even print-screen is blocked !!
User’s Computer The system also maintains a complete audit trail of all the user actions, time & even location !!
Corporate Background … “Seclore is a high growth software product company. Seclore’s technology helps mitigate the risks arising out of information breaches whilst enhancing collaboration” 6 years old, Headquartered in Mumbai, India Geographical and customer presence Middle East, India, ASEAN, Western Europe, North Africa Keywords Information Rights Management, Secure outsourcing Investors The largest private bank in India, one of the foremost R&D institute & professional financial investors Why are we different Minimally intrusive security technology, value based pricing, usage without training
About … Seclore is a high growth information security product company focussed on providing Security without compromising collaboration Seclore’s flagship product Seclore FileSecure is used by More than 1.5 million users & some of the largest enterprises
For more information- http://www.seclore.com/ibm_filenet.html Email: info@seclore.com