seclore: information rights management
TRANSCRIPT
Information Rights Management – Concepts and
Execution
Sudha Chandrasekhar Vice PresidentSeclore Technology
Securing Information Wherever It Goes
Most of us can keep a secret.
It is the people we tell it to, who cannot.
- Anonymous
Structured Databases
Digital
Information
ApplicationsERP, CRM, DW
MIS / Reports / Data Extracts ContentFiles, Folders, Emails
Unstructured Information
Gartner 2013Big Content: The Unstructured Side of Big Data
“Unstructured data represents as much as 80% of an organization’s total information assets”
Enterprise Information Universe
Internal: Perimeter Definition Challenges
End Points Locations
People Applications
Bring Your Own DeviceiPads in Boardroom
Mobile EmployeesExternal Collaboration
Lawyers, Auditors, Partners, Service Providers, Joint Ventures …
Cloud Applications: SalesForce…Cloud Services: DropBox…
Very often, information needs to travel outside the enterprise boundary to:
Every enterprise needs External Collaboration
External: Information Going Out
Information sent
out(side)is
IMPOSSIBLEto control
The Problem…
PermanenceProtection will always persist with the file
Remote-ControlChange your protection policy,sitting anywhere in the world
Audit TrailAll activities on file tracked: Users, Activity type, Date/Time, Location
What other features will be required?
1. Ease of Protection - Automating Policy assignment
2. Easy for user
3. Senior Management involvement
Key requirements for successful
implementation of IRM
12 Seclore Company Confidential
API Integration ERP, CRM, DW, etc.
Data Loss Prevention
Content / Document
Management
Mail & Messaging * Recipient can use any mail client
Ease of protection (Automatic
Protection)
Use in native application • File extension in maintained• File opens in native application
(e.g. MS-Office, Acrobat Reader, AutoCAD, OpenOffice)
User authentication For internal users, integrate with AD and other IAM / SSO tools
Smart devices supportiOS and Android viewers, for smartphone and tabs
BYOD
Easy for Users
Access for external users
Senior Management Involvement
1. Buy in from the senior leadership of the organization
2. High visibility
• Internal marketing of the project
• Awareness of security risk
3. Process changes to handle regulatory and compliance data
Thank You!www.seclore.com | [email protected] | http://blog.seclore.com