file secure - introduction to dduc & irm8

Post on 30-May-2018

223 Views

Category:

Documents

0 Downloads

Preview:

Click to see full reader

TRANSCRIPT

8/14/2019 File Secure - Introduction to DDUC & IRM8

http://slidepdf.com/reader/full/file-secure-introduction-to-dduc-irm8 1/13

Some thoughts….

• Have you ever felt the need to "recall" information that you have sent

to other people?

• Do you know what happens to your documents after distribution?

• What happens if an employee with access to confidential information

leaves?

• Do you know who is accessing your confidential business criticalinformation ?

Is confidential policy and circular information leaving the departmentahead of time?

• How can you prevent mass leakage of information from centralized ITsystems?

For Restricted Circulation Only 1

8/14/2019 File Secure - Introduction to DDUC & IRM8

http://slidepdf.com/reader/full/file-secure-introduction-to-dduc-irm8 2/13

Kapil Kasetwarkapil@manikssys.com | +91-98220-84264

8/14/2019 File Secure - Introduction to DDUC & IRM8

http://slidepdf.com/reader/full/file-secure-introduction-to-dduc-irm8 3/13

Today's IT Challenges

For Restricted Circulation Only 3

More AgileBusiness

More SecuredBusiness

More Compliant Business

Increasing regulatory demands Increasing privacy concerns Business viability concerns

8/14/2019 File Secure - Introduction to DDUC & IRM8

http://slidepdf.com/reader/full/file-secure-introduction-to-dduc-irm8 4/13

State of Security in the Enterprise

For Restricted Circulation Only 4

• Multiple point solutions from multiple vendors

• Disparate technologies that don't work together

Incomplete

• Repeated point to point integrations

Complex

• Difficult to enforce consistent set of policies

• Difficult to measure compliance with these policies

Non-compliant

• Solutions not user centric, but technology centric

• Process not end user friendly

Business "un-friendly"

8/14/2019 File Secure - Introduction to DDUC & IRM8

http://slidepdf.com/reader/full/file-secure-introduction-to-dduc-irm8 5/13

The underlying issues

• Share it = It becomes his (also)

Usage and Access Control separation is not possible

• Share it once = Shared forever

No dynamic rights management

• Out of the Firewall = Free for All

No method of controlling information usage after it leaves the

perimeter

For Restricted Circulation Only 5

8/14/2019 File Secure - Introduction to DDUC & IRM8

http://slidepdf.com/reader/full/file-secure-introduction-to-dduc-irm8 6/13

IT's role in building corporate trust

For Restricted Circulation Only 6

8/14/2019 File Secure - Introduction to DDUC & IRM8

http://slidepdf.com/reader/full/file-secure-introduction-to-dduc-irm8 7/13

Its a "risky" business still…

For Restricted Circulation Only 7

8/14/2019 File Secure - Introduction to DDUC & IRM8

http://slidepdf.com/reader/full/file-secure-introduction-to-dduc-irm8 8/13

“Information Rights Management” is

• Information Rights Management (IRM) is "Information Centric" security

• It protects the information wherever it is and through out its life cycle.

• Information is protected

 –

when in use – when in motion or

 – when at rest.

“Most other information or data security solutions address only some of these

aspects, but not all from a single point”

For Restricted Circulation Only 8

8/14/2019 File Secure - Introduction to DDUC & IRM8

http://slidepdf.com/reader/full/file-secure-introduction-to-dduc-irm8 9/13

Information Rights Management Values

For Restricted Circulation Only 9

Trusted andReliableSecurity

Lower

Administrative/ Operational

Costs forEnforcement

Enable theextendedenterprise

Better end-user

experience

Efficient &Cost Effective

SecurityCompliance

8/14/2019 File Secure - Introduction to DDUC & IRM8

http://slidepdf.com/reader/full/file-secure-introduction-to-dduc-irm8 10/13

Distributed Document Usage Control

For Restricted Circulation Only 10

8/14/2019 File Secure - Introduction to DDUC & IRM8

http://slidepdf.com/reader/full/file-secure-introduction-to-dduc-irm8 11/13

FileSecure

For Restricted Circulation Only 11

FileSecure is a leadingsolution in the area of 

information usagecontrol, information

rights management &secure outsourcing.

Some of the largestcompanies in various

verticals use this

technology to securedata that is usedinternally or provided

to a vendor foroutsourced processes.

FileSecure allowscontrol of intellectual

property to be retained

even after theinformation has beenshared with anotherperson / company.

8/14/2019 File Secure - Introduction to DDUC & IRM8

http://slidepdf.com/reader/full/file-secure-introduction-to-dduc-irm8 12/13

Some features…

• Support for most dominant document formats

• Protect documents within and outside of the enterprise

• No restrictions on method of information distribution

• Prevention of screen capture

• Multiplicity of clients

• Dynamic usage policies

• Full audit of authorized activities & unauthorized attempts on the document

within and outside the enterprise

• Manual and automated protection of documents

• Web based administration

• Easy integration with enterprise systems

For Restricted Circulation Only 12

8/14/2019 File Secure - Introduction to DDUC & IRM8

http://slidepdf.com/reader/full/file-secure-introduction-to-dduc-irm8 13/13

THANK YOU

MANIKS Systems Pvt Ltd502, Sai Radhe. RBM Compound, Behind Hotel Le-Meridian.

Pune – 411 001.

infosec@manikssys.com

+91-20-41006700

www.manikssys.com

For Restricted Circulation Only 13

top related