file secure - introduction to dduc & irm8
TRANSCRIPT
8/14/2019 File Secure - Introduction to DDUC & IRM8
http://slidepdf.com/reader/full/file-secure-introduction-to-dduc-irm8 1/13
Some thoughts….
• Have you ever felt the need to "recall" information that you have sent
to other people?
• Do you know what happens to your documents after distribution?
• What happens if an employee with access to confidential information
leaves?
• Do you know who is accessing your confidential business criticalinformation ?
•
Is confidential policy and circular information leaving the departmentahead of time?
• How can you prevent mass leakage of information from centralized ITsystems?
For Restricted Circulation Only 1
8/14/2019 File Secure - Introduction to DDUC & IRM8
http://slidepdf.com/reader/full/file-secure-introduction-to-dduc-irm8 2/13
Kapil [email protected] | +91-98220-84264
8/14/2019 File Secure - Introduction to DDUC & IRM8
http://slidepdf.com/reader/full/file-secure-introduction-to-dduc-irm8 3/13
Today's IT Challenges
For Restricted Circulation Only 3
More AgileBusiness
More SecuredBusiness
More Compliant Business
Increasing regulatory demands Increasing privacy concerns Business viability concerns
8/14/2019 File Secure - Introduction to DDUC & IRM8
http://slidepdf.com/reader/full/file-secure-introduction-to-dduc-irm8 4/13
State of Security in the Enterprise
For Restricted Circulation Only 4
• Multiple point solutions from multiple vendors
• Disparate technologies that don't work together
Incomplete
• Repeated point to point integrations
Complex
• Difficult to enforce consistent set of policies
• Difficult to measure compliance with these policies
Non-compliant
• Solutions not user centric, but technology centric
• Process not end user friendly
Business "un-friendly"
8/14/2019 File Secure - Introduction to DDUC & IRM8
http://slidepdf.com/reader/full/file-secure-introduction-to-dduc-irm8 5/13
The underlying issues
• Share it = It becomes his (also)
Usage and Access Control separation is not possible
• Share it once = Shared forever
No dynamic rights management
• Out of the Firewall = Free for All
No method of controlling information usage after it leaves the
perimeter
For Restricted Circulation Only 5
8/14/2019 File Secure - Introduction to DDUC & IRM8
http://slidepdf.com/reader/full/file-secure-introduction-to-dduc-irm8 6/13
IT's role in building corporate trust
For Restricted Circulation Only 6
8/14/2019 File Secure - Introduction to DDUC & IRM8
http://slidepdf.com/reader/full/file-secure-introduction-to-dduc-irm8 7/13
Its a "risky" business still…
For Restricted Circulation Only 7
8/14/2019 File Secure - Introduction to DDUC & IRM8
http://slidepdf.com/reader/full/file-secure-introduction-to-dduc-irm8 8/13
“Information Rights Management” is
• Information Rights Management (IRM) is "Information Centric" security
• It protects the information wherever it is and through out its life cycle.
• Information is protected
–
when in use – when in motion or
– when at rest.
“Most other information or data security solutions address only some of these
aspects, but not all from a single point”
For Restricted Circulation Only 8
8/14/2019 File Secure - Introduction to DDUC & IRM8
http://slidepdf.com/reader/full/file-secure-introduction-to-dduc-irm8 9/13
Information Rights Management Values
For Restricted Circulation Only 9
Trusted andReliableSecurity
Lower
Administrative/ Operational
Costs forEnforcement
Enable theextendedenterprise
Better end-user
experience
Efficient &Cost Effective
SecurityCompliance
8/14/2019 File Secure - Introduction to DDUC & IRM8
http://slidepdf.com/reader/full/file-secure-introduction-to-dduc-irm8 10/13
Distributed Document Usage Control
For Restricted Circulation Only 10
8/14/2019 File Secure - Introduction to DDUC & IRM8
http://slidepdf.com/reader/full/file-secure-introduction-to-dduc-irm8 11/13
FileSecure
For Restricted Circulation Only 11
FileSecure is a leadingsolution in the area of
information usagecontrol, information
rights management &secure outsourcing.
Some of the largestcompanies in various
verticals use this
technology to securedata that is usedinternally or provided
to a vendor foroutsourced processes.
FileSecure allowscontrol of intellectual
property to be retained
even after theinformation has beenshared with anotherperson / company.
8/14/2019 File Secure - Introduction to DDUC & IRM8
http://slidepdf.com/reader/full/file-secure-introduction-to-dduc-irm8 12/13
Some features…
• Support for most dominant document formats
• Protect documents within and outside of the enterprise
• No restrictions on method of information distribution
• Prevention of screen capture
• Multiplicity of clients
• Dynamic usage policies
• Full audit of authorized activities & unauthorized attempts on the document
within and outside the enterprise
• Manual and automated protection of documents
• Web based administration
• Easy integration with enterprise systems
For Restricted Circulation Only 12
8/14/2019 File Secure - Introduction to DDUC & IRM8
http://slidepdf.com/reader/full/file-secure-introduction-to-dduc-irm8 13/13
THANK YOU
MANIKS Systems Pvt Ltd502, Sai Radhe. RBM Compound, Behind Hotel Le-Meridian.
Pune – 411 001.
+91-20-41006700
www.manikssys.com
For Restricted Circulation Only 13