Your data, protected and under control wherever they go SealPath Enterprise – IRM - 2016.

Slides:



Advertisements
Similar presentations
Rights Management Services (RMS) Paul Cullimore Graham Calladine Security Solutions Team, MCS, UK.
Advertisements

| Copyright© 2010 Microsoft Corporation Quick Start into Activating and Selling Office 365.
1 © Copyright 2013 EMC Corporation. All rights reserved. Online File Synchronization and Sharing for the Enterprise.
Microsoft Confidential Solution Overview: Foxit Software Corporation’s PDF Security Suite.
Persistent Protection Using E-DRM Technology Jason Fasoo 06/18/2008.
About DataViz, Inc. In business 25 years 13+ years experience in the mobile industry Specializing in Office compatibility for non-Microsoft platforms.
1 © Copyright 2007 EMC Corporation. All rights reserved. EMC Documentum Information Rights Management EMC Content Management and Archiving.
1 of 2 This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. © 2006 Microsoft Corporation.
Introducing TakeCharge SyncedTool The most secure, agile hosted file-sharing platform for business.
What’s New in Exchange Online. Disclaimer This presentation contains preliminary information that may be changed substantially prior to final commercial.
1 Box Overview Session Getting Started on Box. 2 Agenda What is Box? Box Basics Live Q&A.
© 2011 Autodesk Securing AutoCAD IP in the era of WikiLeaks Presenter: Rahul Kopikar Co-Founder, Seclore Technology.
L a r y s s a J a c k i e &. Founded in 2003, DocuSign is committed to transforming the way people like you work, live and connect by providing the freedom.
SHARESYNCPage 1 of 2 ShareSync is a business-grade file sync and share service Sync files across devices Share files and folders easily and securely Business-grade.
Empower Enterprise Mobility Jasbir Gill Azure Mobility.
Virtual techdays INDIA │ august 2010 Secure Collaboration: All You Need to Know about Extending Active Directory Rights Management Services (AD RMS)
Office 365 Message Encryption – Encrypt messages to any SMTP address Personal account statement from a financial institutions Information Rights Management.
Mobility Without Vulnerability: Secure and Enable Your Mobile Users, Apps, and Devices David Clapp – Intuitive.
Clinton Ho Program Manager Microsoft Corporation SESSION CODE: SIA311.
Market Trends Enterprise Web Applications Cloud Computing SaaS Applications BYOD Data Compliance Regulations 30 Second Elevator Pitch Web browsers have.
Demos Sharing a document B2B Protected with Policy Tips Departmental Templates Mac Outlook Protected PDF OneDrive / SharePoint Document Tracking.
Keep Your Information Safe! Josh Heller Sr. Product Manager Microsoft Corporation SIA206.
Extending Forefront beyond the limit TMG UAG ISA IAG Security Suite
OFC290 Information Rights Management in Microsoft Office 2003 Lauren Antonoff Group Program Manager.
…. PrePlanPrepareMigratePost Pre- Deployment PlanPrepareMigrate Post- Deployment First Mailbox.
Empowering people-centric IT Unified device management Access and information protection Desktop Virtualization Hybrid Identity.
Module 7 Planning and Deploying Messaging Compliance.
Virtual Classes Provides an Innovative App for Education that Stimulates Engagement and Sharing Content and Experiences in Office 365 MICROSOFT OFFICE.
User and Device Management
What’s New Data Loss Prevention 14. Information is Everywhere Brings Productivity, Agility, Convenience ……and Problems Copyright © 2015 Symantec Corporation.
Keep Your Information Safe! Josh Heller Sr. Product Manager Microsoft Corporation SIA206.
Why EMS? What benefit does EMS provide O365 customers Manage Mobile Productivity Increase IT ProductivitySimplify app delivery and deployment LOB Apps.
One Drive for Business: More Than a File Share Erica Toelle
Short Customer Presentation September The Company  Storgrid delivers a secure software platform for creating secure file sync and sharing solutions.
Lucidchart Extends Collaborative, Cross-Platform Diagramming Solution for Individuals, SMBs, and Enterprises with New Microsoft Office 365 Add-Ins OFFICE.
Microsoft Virtual Academy
Secure your complete data lifecycle using Azure Information Protection
Contract Lifecycle Management In the Disruptive Age
StreetSmart Mobile Workforce App Incorporates Microsoft Office 365 Outlook Add-In for Improved Field Worker Scheduling and Streamlined Invoicing OFFICE.
9/12/2018 6:21 PM BRK2203 Protect and control your sensitive s with new Office 365 Message Encryption capabilities Praveen Vijayaraghavan Principal.
Azure Information Protection Strategy and Roadmap
Letsignit, an Automated Signature Solution for Microsoft Office 365 and Microsoft Exchange, Provides Efficiency in Branding and Customization OFFICE.
Protect sensitive information with Office 365 DLP
7/23/2018 6:01 PM BRK2282 Protecting complete data lifecycle using Microsoft’s information protection capabilities Gagan Gulati Alex Li Principal.
Azure RMS Deep Dive.
The Information Protection Problem
Secure your complete data lifecycle using Azure Information Protection
Rights Management Services (RMS)
Understanding best practices in classifying sensitive data
Microsoft Intune MAM without Device Enrollment
Introduction to Soonr by ….
File Stream and Team Drives
Skyhigh Enables Enterprises to Use Productivity Tools of Microsoft Office 365 While Meeting Their Security, Compliance & Governance Requirements Partner.
It’s About Time – ScheduleMe Outlook Add-In for Office 365 Enables Users to Schedule Meetings Easily with People Outside of Your Organization Partner Logo.
With IvSign, Office 365 Users Can Digitally Sign Word Documents in the Cloud from Any Device Without Having to Install Any Digital Certificates OFFICE.
Securely run and grow your business with Microsoft 365 Business
ForceManager Integrates with Office 365 Outlook Mail, Calendar, Contacts, Word, and Excel for a Smart, Fast, Intuitive Mobile CRM Sales Solution OFFICE.
Get Enterprise-Grade Call Handling and Control for Microsoft Office 365 and Skype for Business with the Bridge Boss-Admin Executive Console OFFICE 365.
Azure Information Protection
Azure Information Protection
Built on the Powerful Microsoft Office 365 Platform, My Intranet Boosts Efficiency with Support of Daily Tasks, Internal Communications and Collaboration.
Encryption in Office 365 Shobhit Sahay Technical Product Manager
Wade Bumgarner AD RMS at UNC Wade Bumgarner
Letsignit, an Automated Signature Solution for Microsoft Office 365 and Microsoft Exchange, Provides Efficiency in Branding and Customization OFFICE.
Yooba File Sync: A Microsoft Office 365 Add-In That Syncs Sales Content in SharePoint Online to Yooba’s Sales Performance Management Solution OFFICE 365.
IN THE PAST, THE FIREWALL WAS THE SECURITY PERIMETER devicesdata users apps On-premises.
4/9/ :42 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
Anyshare solution.
Microsoft Data Insights Summit
Presentation transcript:

Your data, protected and under control wherever they go SealPath Enterprise – IRM

© SealPath Technologies – Confidential Propietary What is SealPath? SealPath protects your documents and allows you to control them remotely

© SealPath Technologies – Confidential Propietary millions of confidential documents (2.6 Terabytes) 2.2 millions of PDFs and other formats The Data Leak Problem

© SealPath Technologies – Confidential Propietary The Data Leak Problem Executives resign Loss of reputationLoss of customers

© SealPath Technologies – Confidential Propietary How do they happen? Hacking Malware Former employees Negligence, unintentional Loss of devices

© SealPath Technologies – Confidential Propietary Data travels everywhere without control Control over data is lost

© SealPath Technologies – Confidential Propietary Current solutions do not solve the problem Perimeter Protection Encryption DLP

© SealPath Technologies – Confidential Propietary What kind of solution is required? PERSISTENT PROTECTION THAT TRAVELS WITH THE DOCUMENT Monitor activity. Control documents. Anywhere, anytime.

© SealPath Technologies – Confidential Propietary The SealPath Solution ENCRYPT DATA ENFORCE ACCESS CONTROLS PREVENT DATA LEAKS Who, When, Permissions (View, Edit, Print, Copy&Paste, etc.) The document can be destroyed by remote

© SealPath Technologies – Confidential Propietary Data travels everywhere WITH control Keep control over data Access Denied

© SealPath Technologies – Confidential Propietary Deployment On-Premise Cloud/SaaS TWO OPTIONS can be installed SealPath doesn´t store documents. Just protect them Both can be integrated with AD/LDAP A Protection Client is installed in Desktop or File Servers

© SealPath Technologies – Confidential Propietary How does it work? Protect the document View, edit, not printing View only Expiration date: 30/06/2018, Watermark

© SealPath Technologies – Confidential Propietary How does it work? Share it

© SealPath Technologies – Confidential Propietary How does it work? Use your native tools to open it

© SealPath Technologies – Confidential Propietary How does it work? Monitor activity

© SealPath Technologies – Confidential Propietary Easy to share with external users. Invitations. External user receives an invitation to open protected documents Possibility of customizing the invitation with the look and feel of the customer

© SealPath Technologies – Confidential Propietary What the user sees when he opens the doc… With Office installed, you just need to enter your SealPath credentials For Adobe you need to download SealPath Lite plugin (5MB, installs in seconds, no admin privileges).

© SealPath Technologies – Confidential Propietary Supported Platforms and Formats Document Protection Windows XP SP3 Windows Vista Windows 7 Windows 8, 8.1, 10 Windows Server 2003 Windows Server 2008 Windows Server 2008R2 Windows Server 2012, R2 Protected Documents Consumption Mac OSX (Office 2011, App) iOS, Android, Windows Phone (viewers) Microsoft Office Versions Office , 2010, 2013, (Mac) Other supported formats apart from Office Edit/Read PDFs (Adobe, Foxit, etc.), XPS, Text, RTF, Images, Audio, Video, AutoCAD, SolidWorks and other industrial file formats

© SealPath Technologies – Confidential Propietary Mobile Apps

© SealPath Technologies – Confidential Propietary protection Ability to protect attachments and message bodies from Outlook The body and attachments can be opened from any client. Easy to use by the end user Protection for all recipients or with pre-configured policy. It includes a footer or signature with indications for the recipients. Configurable options.

© SealPath Technologies – Confidential Propietary Example of CAD protection sealpath controls

© SealPath Technologies – Confidential Propietary Ability to protect for domains or subdomains. Examples: Any user of this domain can access the Similar to the previous case but with other Anyone with an with the.ext in the name can Users with in the can Anyone from any domain can access the Ability to lock individual documents without modifying the policy Protection for Domains

© SealPath Technologies – Confidential Propietary On-Premise Deployment All the Information is kept on-premise and under the control of the Customer: Logs, Document ids, keys, etc.

© SealPath Technologies – Confidential Propietary Use cases Management concerned about access to specific internal documents (Board, Commercial, Product, etc.). Companies that exchange documentation (product guides, specifications) with contractors, and worry about if they documents will go to the wrong hands. Companies in the healthcare sector that manage third-party data that must be protected and controlled under certain data protection regulations. Companies in the financial sector that manage regulated data that they have to be protect by law. Need of sending documentation to external auditors that must be controlled. Companies involved in R&D projects that collaborate with third-parties sending them internal information. Companies that collaborate with temporary sales partners in other countries and want to control the documents to which they have access. Need of protecting data managed by the legal department, very sensitive content for the company. Human Resources department data with sensitive information about employees that must be protected by law (trade union membership, health data, etc.). Contractors working temporarily on the client premises with access to sensitive documents that the company wants to have controlled

© SealPath Technologies – Confidential Propietary Advantages Protect inside & outside the network Easy to deploy. Easy to share Information classification Monitoring & Tracking Edit and view with Office, Adobe Don´t need to upload to the cloud to protect