file secure - introduction to dduc & irm8

13
8/14/2019 File Secure - Introduction to DDUC & IRM8 http://slidepdf.com/reader/full/file-secure-introduction-to-dduc-irm8 1/13 Some thoughts…. Have you ever felt the need to "recall" information that you have sent to other people? Do you know what happens to your documents after distribution? What happens if an employee with access to confidential information leaves? Do you know who is accessing your confidential business critical information ? Is confidential policy and circular information leaving the department ahead of time? How can you prevent mass leakage of information from centralized IT systems? For Restricted Circulation Only 1

Upload: santoshmaniks

Post on 30-May-2018

223 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: File Secure - Introduction to DDUC & IRM8

8/14/2019 File Secure - Introduction to DDUC & IRM8

http://slidepdf.com/reader/full/file-secure-introduction-to-dduc-irm8 1/13

Some thoughts….

• Have you ever felt the need to "recall" information that you have sent

to other people?

• Do you know what happens to your documents after distribution?

• What happens if an employee with access to confidential information

leaves?

• Do you know who is accessing your confidential business criticalinformation ?

Is confidential policy and circular information leaving the departmentahead of time?

• How can you prevent mass leakage of information from centralized ITsystems?

For Restricted Circulation Only 1

Page 2: File Secure - Introduction to DDUC & IRM8

8/14/2019 File Secure - Introduction to DDUC & IRM8

http://slidepdf.com/reader/full/file-secure-introduction-to-dduc-irm8 2/13

Kapil [email protected] | +91-98220-84264

Page 3: File Secure - Introduction to DDUC & IRM8

8/14/2019 File Secure - Introduction to DDUC & IRM8

http://slidepdf.com/reader/full/file-secure-introduction-to-dduc-irm8 3/13

Today's IT Challenges

For Restricted Circulation Only 3

More AgileBusiness

More SecuredBusiness

More Compliant Business

Increasing regulatory demands Increasing privacy concerns Business viability concerns

Page 4: File Secure - Introduction to DDUC & IRM8

8/14/2019 File Secure - Introduction to DDUC & IRM8

http://slidepdf.com/reader/full/file-secure-introduction-to-dduc-irm8 4/13

State of Security in the Enterprise

For Restricted Circulation Only 4

• Multiple point solutions from multiple vendors

• Disparate technologies that don't work together

Incomplete

• Repeated point to point integrations

Complex

• Difficult to enforce consistent set of policies

• Difficult to measure compliance with these policies

Non-compliant

• Solutions not user centric, but technology centric

• Process not end user friendly

Business "un-friendly"

Page 5: File Secure - Introduction to DDUC & IRM8

8/14/2019 File Secure - Introduction to DDUC & IRM8

http://slidepdf.com/reader/full/file-secure-introduction-to-dduc-irm8 5/13

The underlying issues

• Share it = It becomes his (also)

Usage and Access Control separation is not possible

• Share it once = Shared forever

No dynamic rights management

• Out of the Firewall = Free for All

No method of controlling information usage after it leaves the

perimeter

For Restricted Circulation Only 5

Page 6: File Secure - Introduction to DDUC & IRM8

8/14/2019 File Secure - Introduction to DDUC & IRM8

http://slidepdf.com/reader/full/file-secure-introduction-to-dduc-irm8 6/13

IT's role in building corporate trust

For Restricted Circulation Only 6

Page 7: File Secure - Introduction to DDUC & IRM8

8/14/2019 File Secure - Introduction to DDUC & IRM8

http://slidepdf.com/reader/full/file-secure-introduction-to-dduc-irm8 7/13

Its a "risky" business still…

For Restricted Circulation Only 7

Page 8: File Secure - Introduction to DDUC & IRM8

8/14/2019 File Secure - Introduction to DDUC & IRM8

http://slidepdf.com/reader/full/file-secure-introduction-to-dduc-irm8 8/13

“Information Rights Management” is

• Information Rights Management (IRM) is "Information Centric" security

• It protects the information wherever it is and through out its life cycle.

• Information is protected

 –

when in use – when in motion or

 – when at rest.

“Most other information or data security solutions address only some of these

aspects, but not all from a single point”

For Restricted Circulation Only 8

Page 9: File Secure - Introduction to DDUC & IRM8

8/14/2019 File Secure - Introduction to DDUC & IRM8

http://slidepdf.com/reader/full/file-secure-introduction-to-dduc-irm8 9/13

Information Rights Management Values

For Restricted Circulation Only 9

Trusted andReliableSecurity

Lower

Administrative/ Operational

Costs forEnforcement

Enable theextendedenterprise

Better end-user

experience

Efficient &Cost Effective

SecurityCompliance

Page 10: File Secure - Introduction to DDUC & IRM8

8/14/2019 File Secure - Introduction to DDUC & IRM8

http://slidepdf.com/reader/full/file-secure-introduction-to-dduc-irm8 10/13

Distributed Document Usage Control

For Restricted Circulation Only 10

Page 11: File Secure - Introduction to DDUC & IRM8

8/14/2019 File Secure - Introduction to DDUC & IRM8

http://slidepdf.com/reader/full/file-secure-introduction-to-dduc-irm8 11/13

FileSecure

For Restricted Circulation Only 11

FileSecure is a leadingsolution in the area of 

information usagecontrol, information

rights management &secure outsourcing.

Some of the largestcompanies in various

verticals use this

technology to securedata that is usedinternally or provided

to a vendor foroutsourced processes.

FileSecure allowscontrol of intellectual

property to be retained

even after theinformation has beenshared with anotherperson / company.

Page 12: File Secure - Introduction to DDUC & IRM8

8/14/2019 File Secure - Introduction to DDUC & IRM8

http://slidepdf.com/reader/full/file-secure-introduction-to-dduc-irm8 12/13

Some features…

• Support for most dominant document formats

• Protect documents within and outside of the enterprise

• No restrictions on method of information distribution

• Prevention of screen capture

• Multiplicity of clients

• Dynamic usage policies

• Full audit of authorized activities & unauthorized attempts on the document

within and outside the enterprise

• Manual and automated protection of documents

• Web based administration

• Easy integration with enterprise systems

For Restricted Circulation Only 12

Page 13: File Secure - Introduction to DDUC & IRM8

8/14/2019 File Secure - Introduction to DDUC & IRM8

http://slidepdf.com/reader/full/file-secure-introduction-to-dduc-irm8 13/13

THANK YOU

MANIKS Systems Pvt Ltd502, Sai Radhe. RBM Compound, Behind Hotel Le-Meridian.

Pune – 411 001.

[email protected]

+91-20-41006700

www.manikssys.com

For Restricted Circulation Only 13