seclore: information rights management

16
Information Rights Management Concepts and Execution Sudha Chandrasekhar Vice President Seclore Technology

Upload: rahul-neel-mani

Post on 22-Jul-2015

164 views

Category:

Technology


1 download

TRANSCRIPT

Information Rights Management – Concepts and

Execution

Sudha Chandrasekhar Vice PresidentSeclore Technology

Securing Information Wherever It Goes

Most of us can keep a secret.

It is the people we tell it to, who cannot.

- Anonymous

Structured Databases

Digital

Information

ApplicationsERP, CRM, DW

MIS / Reports / Data Extracts ContentFiles, Folders, Emails

Unstructured Information

Gartner 2013Big Content: The Unstructured Side of Big Data

“Unstructured data represents as much as 80% of an organization’s total information assets”

Enterprise Information Universe

Internal: Perimeter Definition Challenges

End Points Locations

People Applications

Bring Your Own DeviceiPads in Boardroom

Mobile EmployeesExternal Collaboration

Lawyers, Auditors, Partners, Service Providers, Joint Ventures …

Cloud Applications: SalesForce…Cloud Services: DropBox…

Very often, information needs to travel outside the enterprise boundary to:

Every enterprise needs External Collaboration

External: Information Going Out

Legacy Handling of Information Loss #1

Non-Disclosure Agreement

Legacy Handling of Information Loss #2

Legacy Handling of Information Loss #3

INFORMATION OWNER

What Controls Are Required on your Information

PermanenceProtection will always persist with the file

Remote-ControlChange your protection policy,sitting anywhere in the world

Audit TrailAll activities on file tracked: Users, Activity type, Date/Time, Location

What other features will be required?

1. Ease of Protection - Automating Policy assignment

2. Easy for user

3. Senior Management involvement

Key requirements for successful

implementation of IRM

12 Seclore Company Confidential

API Integration ERP, CRM, DW, etc.

Data Loss Prevention

Content / Document

Management

Mail & Messaging * Recipient can use any mail client

Ease of protection (Automatic

Protection)

Use in native application • File extension in maintained• File opens in native application

(e.g. MS-Office, Acrobat Reader, AutoCAD, OpenOffice)

User authentication For internal users, integrate with AD and other IAM / SSO tools

Smart devices supportiOS and Android viewers, for smartphone and tabs

BYOD

Easy for Users

Access for external users

Senior Management Involvement

1. Buy in from the senior leadership of the organization

2. High visibility

• Internal marketing of the project

• Awareness of security risk

3. Process changes to handle regulatory and compliance data

Thank You!www.seclore.com | [email protected] | http://blog.seclore.com