extending information controls beyond ecm
DESCRIPTION
In the "new new" world of consumerization, cloud, and mobile, controlling information usage as it flows within and outside the enterprise requires new approaches. Traditional access control and governance frameworks break down when devices, applications and networks are "unmanaged". Information centric view of security, privacy, & compliance controls then becomes the only option. This session introduces IRM as a technology & how it can be used along with enterprise content management (ECM) systems to extend ECM security controls.TRANSCRIPT
![Page 1: Extending Information Controls Beyond ECM](https://reader034.vdocument.in/reader034/viewer/2022042714/54b6be544a795956098b45e7/html5/thumbnails/1.jpg)
#AIIM14 #AIIM14
#AIIM14
Extending informa/on controls beyond ECM
Vishal Gupta CEO, Seclore @secloretech
![Page 2: Extending Information Controls Beyond ECM](https://reader034.vdocument.in/reader034/viewer/2022042714/54b6be544a795956098b45e7/html5/thumbnails/2.jpg)
#AIIM14
The balancing act : Security and Collabora/on
![Page 3: Extending Information Controls Beyond ECM](https://reader034.vdocument.in/reader034/viewer/2022042714/54b6be544a795956098b45e7/html5/thumbnails/3.jpg)
#AIIM14
BYOD … Even Chuck Norris cannot stop it
![Page 4: Extending Information Controls Beyond ECM](https://reader034.vdocument.in/reader034/viewer/2022042714/54b6be544a795956098b45e7/html5/thumbnails/4.jpg)
#AIIM14
Collabora/on Is a Differen/ator of any value chain
![Page 5: Extending Information Controls Beyond ECM](https://reader034.vdocument.in/reader034/viewer/2022042714/54b6be544a795956098b45e7/html5/thumbnails/5.jpg)
#AIIM14
Data on the cloud …
Is making informaCon ubiquitously available
![Page 6: Extending Information Controls Beyond ECM](https://reader034.vdocument.in/reader034/viewer/2022042714/54b6be544a795956098b45e7/html5/thumbnails/6.jpg)
#AIIM14
ECM context – Cloud, Mobile and external users
![Page 7: Extending Information Controls Beyond ECM](https://reader034.vdocument.in/reader034/viewer/2022042714/54b6be544a795956098b45e7/html5/thumbnails/7.jpg)
www.aiim.org/infochaos�
Do YOU understand the business challenge of the next 10 years?
This ebook from AIIM President John Mancini explains.
![Page 8: Extending Information Controls Beyond ECM](https://reader034.vdocument.in/reader034/viewer/2022042714/54b6be544a795956098b45e7/html5/thumbnails/8.jpg)
#AIIM14
Client scenarios § 240,000 employee European bank
§ Extensive usage of ECM § Worried about security and compliance of content when FileNet use is
extended to external agencies
§ One of the five largest telecom companies in the world § Centralized use of ECM across operaCons § Worried about regulatory compliance around customer and employee data
§ One of the five largest paints and coa/ngs company in the world § Usage of ECM across group R&D funcCons § Worried about “opening up” FileNet for mobile access due to security
reasons
![Page 9: Extending Information Controls Beyond ECM](https://reader034.vdocument.in/reader034/viewer/2022042714/54b6be544a795956098b45e7/html5/thumbnails/9.jpg)
#AIIM14
ECM security -‐ stand alone ECM User
Edited
Copied
Printed
Shared
Un-protected File
Authorized access
Unauthorized use
![Page 10: Extending Information Controls Beyond ECM](https://reader034.vdocument.in/reader034/viewer/2022042714/54b6be544a795956098b45e7/html5/thumbnails/10.jpg)
#AIIM14
The dream … WHO can use People & groups within and outside of the organization can be
defined as rightful users of the information
WHAT can (s)he do Individual actions like reading, editing, printing, distributing,
copy-pasting, screen grabbing etc. can be controlled
WHEN can (s)he use it Information usage can be time based e.g. can only be used by
Mr. A till 28th Sept OR only for the 2 days
WHERE can (s)he use it from Information can be linked to locations e.g. only 3rd floor
office by private/public IP addresses
![Page 11: Extending Information Controls Beyond ECM](https://reader034.vdocument.in/reader034/viewer/2022042714/54b6be544a795956098b45e7/html5/thumbnails/11.jpg)
#AIIM14
The dream …
![Page 12: Extending Information Controls Beyond ECM](https://reader034.vdocument.in/reader034/viewer/2022042714/54b6be544a795956098b45e7/html5/thumbnails/12.jpg)
#AIIM14
• WHO can use the information
People & groups within and outside of the organization can be defined as rightful users of the information
• WHAT can each person do
Individual actions like reading, editing, printing, distributing, copy-pasting, screen grabbing etc. can be controlled
• WHEN can he use it
Information usage can be time based e.g. can only be used by Mr. A till 28th Sept OR only for the 2 days
• WHERE can he use it from
Information can be linked to locations e.g. only 3rd floor office by private/public IP addresses
IRM allow enterprises to define, implement & audit information usage “policies”. A “policy” defines :
Informa/on Rights Management -‐ defined
![Page 13: Extending Information Controls Beyond ECM](https://reader034.vdocument.in/reader034/viewer/2022042714/54b6be544a795956098b45e7/html5/thumbnails/13.jpg)
#AIIM14
ECM and IRM combined User
Authorized access
ECM + Seclore FileSecure
Authorized use only
Edited
Copied
Printed
Viewed Protected File
Distributed
![Page 14: Extending Information Controls Beyond ECM](https://reader034.vdocument.in/reader034/viewer/2022042714/54b6be544a795956098b45e7/html5/thumbnails/14.jpg)
#AIIM14
FileNet + FileSecure – What and Why ?
![Page 15: Extending Information Controls Beyond ECM](https://reader034.vdocument.in/reader034/viewer/2022042714/54b6be544a795956098b45e7/html5/thumbnails/15.jpg)
#AIIM14
FileNet + FileSecure – What and Why ?
![Page 16: Extending Information Controls Beyond ECM](https://reader034.vdocument.in/reader034/viewer/2022042714/54b6be544a795956098b45e7/html5/thumbnails/16.jpg)
#AIIM14
Policy defini/on
§ ECM + Seclore FileSecure A walkthrough
![Page 17: Extending Information Controls Beyond ECM](https://reader034.vdocument.in/reader034/viewer/2022042714/54b6be544a795956098b45e7/html5/thumbnails/17.jpg)
#AIIM14
Policy defini/on
![Page 18: Extending Information Controls Beyond ECM](https://reader034.vdocument.in/reader034/viewer/2022042714/54b6be544a795956098b45e7/html5/thumbnails/18.jpg)
#AIIM14
Policy defini/on
![Page 19: Extending Information Controls Beyond ECM](https://reader034.vdocument.in/reader034/viewer/2022042714/54b6be544a795956098b45e7/html5/thumbnails/19.jpg)
#AIIM14
Applying policies to IBM FileNet Folders
![Page 20: Extending Information Controls Beyond ECM](https://reader034.vdocument.in/reader034/viewer/2022042714/54b6be544a795956098b45e7/html5/thumbnails/20.jpg)
#AIIM14
Applying policies to IBM FileNet Folders
![Page 21: Extending Information Controls Beyond ECM](https://reader034.vdocument.in/reader034/viewer/2022042714/54b6be544a795956098b45e7/html5/thumbnails/21.jpg)
#AIIM14
Policy implementa/on
![Page 22: Extending Information Controls Beyond ECM](https://reader034.vdocument.in/reader034/viewer/2022042714/54b6be544a795956098b45e7/html5/thumbnails/22.jpg)
#AIIM14
Policy implementa/on
![Page 23: Extending Information Controls Beyond ECM](https://reader034.vdocument.in/reader034/viewer/2022042714/54b6be544a795956098b45e7/html5/thumbnails/23.jpg)
#AIIM14
Policy implementa/on
![Page 24: Extending Information Controls Beyond ECM](https://reader034.vdocument.in/reader034/viewer/2022042714/54b6be544a795956098b45e7/html5/thumbnails/24.jpg)
#AIIM14
Adding content to the protected folder
![Page 25: Extending Information Controls Beyond ECM](https://reader034.vdocument.in/reader034/viewer/2022042714/54b6be544a795956098b45e7/html5/thumbnails/25.jpg)
#AIIM14
Adding content to the protected folder
![Page 26: Extending Information Controls Beyond ECM](https://reader034.vdocument.in/reader034/viewer/2022042714/54b6be544a795956098b45e7/html5/thumbnails/26.jpg)
#AIIM14
Document uploaded
![Page 27: Extending Information Controls Beyond ECM](https://reader034.vdocument.in/reader034/viewer/2022042714/54b6be544a795956098b45e7/html5/thumbnails/27.jpg)
#AIIM14
Document download from IBM FileNet
![Page 28: Extending Information Controls Beyond ECM](https://reader034.vdocument.in/reader034/viewer/2022042714/54b6be544a795956098b45e7/html5/thumbnails/28.jpg)
#AIIM14
Extending IBM FileNet’s control outside
Downloaded document from FileNet.
NoCce the red lock!
![Page 29: Extending Information Controls Beyond ECM](https://reader034.vdocument.in/reader034/viewer/2022042714/54b6be544a795956098b45e7/html5/thumbnails/29.jpg)
#AIIM14
Explicit display of rights : Privacy compliance
![Page 30: Extending Information Controls Beyond ECM](https://reader034.vdocument.in/reader034/viewer/2022042714/54b6be544a795956098b45e7/html5/thumbnails/30.jpg)
#AIIM14
AWempt to perform unauthorized ac/on
![Page 31: Extending Information Controls Beyond ECM](https://reader034.vdocument.in/reader034/viewer/2022042714/54b6be544a795956098b45e7/html5/thumbnails/31.jpg)
#AIIM14
AWempt to perform unauthorized ac/on
![Page 32: Extending Information Controls Beyond ECM](https://reader034.vdocument.in/reader034/viewer/2022042714/54b6be544a795956098b45e7/html5/thumbnails/32.jpg)
#AIIM14
AWempt to perform unauthorized ac/on
![Page 33: Extending Information Controls Beyond ECM](https://reader034.vdocument.in/reader034/viewer/2022042714/54b6be544a795956098b45e7/html5/thumbnails/33.jpg)
#AIIM14
AWempt to perform unauthorized ac/on
![Page 34: Extending Information Controls Beyond ECM](https://reader034.vdocument.in/reader034/viewer/2022042714/54b6be544a795956098b45e7/html5/thumbnails/34.jpg)
#AIIM14
AWempt to perform unauthorized ac/on
![Page 35: Extending Information Controls Beyond ECM](https://reader034.vdocument.in/reader034/viewer/2022042714/54b6be544a795956098b45e7/html5/thumbnails/35.jpg)
#AIIM14
AWempt to perform unauthorized ac/on
![Page 36: Extending Information Controls Beyond ECM](https://reader034.vdocument.in/reader034/viewer/2022042714/54b6be544a795956098b45e7/html5/thumbnails/36.jpg)
#AIIM14
AWempt to perform unauthorized ac/on
![Page 37: Extending Information Controls Beyond ECM](https://reader034.vdocument.in/reader034/viewer/2022042714/54b6be544a795956098b45e7/html5/thumbnails/37.jpg)
#AIIM14
Informa/on audit
![Page 38: Extending Information Controls Beyond ECM](https://reader034.vdocument.in/reader034/viewer/2022042714/54b6be544a795956098b45e7/html5/thumbnails/38.jpg)
#AIIM14
Other IRM possibili/es
IRM
DLP ECM Desktops File servers
Messaging ERP Custom apps
![Page 39: Extending Information Controls Beyond ECM](https://reader034.vdocument.in/reader034/viewer/2022042714/54b6be544a795956098b45e7/html5/thumbnails/39.jpg)
#AIIM14
Ques/ons ?
§ hXp://www.seclore.com/ibm_filenet.html § www.ibm.com/so]ware/products/en/filecontmana
§ Email : [email protected]
![Page 40: Extending Information Controls Beyond ECM](https://reader034.vdocument.in/reader034/viewer/2022042714/54b6be544a795956098b45e7/html5/thumbnails/40.jpg)
www.aiim.org/infochaos�
Do YOU understand the business challenge of the next 10 years?
This ebook from AIIM President John Mancini explains.