Persistent Protection Using E-DRM Technology Jason Fasoo 06/18/2008.

Slides:



Advertisements
Similar presentations
CONFIDENTIAL DIGITAL WATERMARKING ALLIANCE. CONFIDENTIAL DIGITAL WATERMARKING ALLIANCE 2 Digital Watermarking Alliance Charter The Digital Watermarking.
Advertisements

Microsoft Confidential Solution Overview: Foxit Software Corporation’s PDF Security Suite.
Data Security The Best Data Security In The Industry.
ACG 6415 SPRING 2012 KRISTIN DONOVAN & BETH WILDMAN IT Security Frameworks.
PETs and ID Management Privacy & Security Workshop JC Cannon Privacy Strategist Corporate Privacy Group Microsoft Corporation.
6/4/2015National Digital Certification Agency1 Security Engineering and PKI Applications in Modern Enterprises Mohamed HAMDI National.
Enterprise security How to bring security transparency into your organization ISSA EDUCATIONAL SESSION Nicklaus Schleicher, VP Support & Customer Service.
Sophos / Utimaco Data Loss Prevention Peter Szendröi, SOPHOS Nordics Jan 20, 2010.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Security and Policy Enforcement Mark Gibson Dave Northey
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
Introduction to PKI Mark Franklin September 10, 2003 Dartmouth College PKI Lab.
Creating a Secured and Trusted Information Sphere in Different Markets Giuseppe Contino.
1 © Copyright 2007 EMC Corporation. All rights reserved. EMC Documentum Information Rights Management EMC Content Management and Archiving.
Lexmark Print Management
MobileFirst Protect 1. MobileFirst Protect (MaaS360) 2 Mobile Device Management Enable and Manage Apple iOS smartphones, and tablets with Apple DEP Gain.
Managing BYOD Legal IT’s Next Great Challenge. Agenda  The BYOD Trend – benefits and risks  Best practices for managing mobile device usage  Overview.
Virtual Private Network
Public Key Infrastructure Ammar Hasayen ….
© 2011 Autodesk Securing AutoCAD IP in the era of WikiLeaks Presenter: Rahul Kopikar Co-Founder, Seclore Technology.
© 2010 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice Ville Norpo Hewlett-Packard Oy
Enterprise Content Management In Microsoft Office SharePoint Server 2007 Lionel Moyal Intervate Solutions
Raz-Lee Security iSecurity for iSeries. 2 Facts about Raz-Lee  Internationally renowned iSeries solutions provider  Founded in 1983  100% focused on.
Deploying a Certification Authority for Networks Security Prof. Dr. VICTOR-VALERIU PATRICIU Cdor.Prof. Dr. AUREL SERB Computer Engineering Department Military.
Lecture 12 Electronic Business (MGT-485). Recap – Lecture 11 E-Commerce Security Environment Security Threats in E-commerce Technology Solutions.
1 Managed Security. 2 Managed Security provides a comprehensive suite of security services to manage and protect your network assets –Managed Firewall.
Market Trends Enterprise Web Applications Cloud Computing SaaS Applications BYOD Data Compliance Regulations 30 Second Elevator Pitch Web browsers have.
RSA Security Validating Users and Devices to Protect Network Assets Endpoint Solutions for Cisco Environments.
The Internetworked E-Business Enterprise
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Best Practices in Deploying a PKI Solution BIEN Nguyen Thanh Product Consultant – M.Tech Vietnam
IGEL UMS Product Marketing Manager October 2011 Florian Spatz Universal Management Suite.
1 Deployment of Computer Security in an Organization CE-408 Sir Syed University of Engineering & Technology 99-CE-282, 257 & 260.
Marketing of Information Security Products. The business case for Information Security Management.
1. Windows Vista Enterprise And Mid-Market User Scenarios 2. Customer Profiling And Segmentation Tools 3. Windows Vista Business Value And Infrastructure.
Deploying PKI Inside Microsoft The experience of Microsoft in deploying its own corporate PKI Published: December 2003.
DRM Building Blocks - Protecting and Tracking Content Adopted from Chapter 5, Digital Rights Management Business and Technology.
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
Oracle Universal Content Management Standard Edition.
ISO17799 Maturity. Confidentiality Confidentiality relates to the protection of sensitive data from unauthorized use and distribution. Examples include:
SIM328. Access Control List Perimeter No Yes Firewall Perimeter Authorized Users Unauthorized Users Information Leakage Unauthorized Users …but.
Name Company A Day in the Life… A Demonstration of Application Delivery.
Pedigree: Network-wide Protection Against Enterprise Data Leaks Team: Nick Feamster, Assistant Professor, School of CS Anirudh Ramachandran, PhD candidate,
Securing Data in Transit and Storage Sanjay Beri Co-Founder & Senior Director of Product Management Ingrian Networks.
Business Productivity Infrastructure Optimization Campaign 1 Agenda: BPIO Partner Sales Readiness Workshop Day 3: Topic: Enterprise Content management.
McGraw-Hill/Irwin ©2008 The McGraw-Hill Companies, All Rights Reserved INFORMATION SECURITY SECTION 4.2.
Identity Assurance Emory University Security Conference March 26, 2008.
Introduction to Information Security
Computer Security By Duncan Hall.
About Softex Mission Statement: “To provide innovative security software products and solutions for computing devices” Softex was founded in 1992 by IBM.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Minimising IT costs, maximising operational efficiency IO and NIMM: Now is the time Glyn Knaresborough Director of Strategic Consulting.
IS3220 Information Technology Infrastructure Security
Enterprise Mobility Suite: Simplify security, stay productive Protect data and empower workers Unsecured company data can cost millions in lost research,
UNCLASSIFIED Matthew Bruce, Senior Solutions Consultant, Adobe Using Logic, Strategy, and DRM to Protect and Manage Content.
Barracuda Networks. Safe Public Cloud Transitions Why Barracuda? The Challenge When organizations move workloads to the public cloud, data protection.
Your data, protected and under control wherever they go SealPath Enterprise – IRM
Cloud adoption NECOOST Advisory | June 2017.
9/14/2018 2:22 AM THR2026 Set up secure and efficient collaboration for your organization with Office 365 Joe Davies Senior Content Developer Brenda Carter.
Securing Information for a Shared Services Infrastructure
Unit 27: Network Operating Systems
Cloud Access Security Broker Lets Enterprises Enforce Security and Compliance in Office 365 Partner Logo “Skyhigh helps us securely enable high-impact.
Azure Information Protection
Azure Information Protection
Azure Information Protection
Azure Information Protection
Encryption in Office 365 Shobhit Sahay Technical Product Manager
Identity & Access Management
Corporate Encryption:
Presentation transcript:

Persistent Protection Using E-DRM Technology Jason Fasoo 06/18/2008

Executive Summary Strategic Value Proposition of Enterprise DRM (E-DRM) –Protect your knowledge assets and client’s confidential information even from insiders and after the delivery –Fully utilize your IT investments –Take most out of your partners and clients –Comply with regulatory compliances

Increased Risk of Losing Confidential Information The volume of documents shared explodes due to the successful adoption of document distribution/management systems Loss of data from insiders are increasing dramatically Emergence of high technology Documents shared Information leak , CMS, PDM, ERP etc. Document leak is just a click away~

Are you protected? Existing security solutions are effective to protect from hackers (outsiders) but fail to prevent document leak by authorized users (insiders) Authorized User Unauthorized User File-server Application Systems (CMS, KMS, etc.) Unauthorized User Partner Hackers Firewall, IDS, VPN, Date encryption, Authentication, ACL, PKI, …

A Glance at Enterprise DRM You can control document usages

E-DRM for Persistent Protection of Documents A solution that protects information persistently, even after it has been delivered, and it is strongly required in the market. E-DRM enables persistent control of document use –Who and where (Device, Network address, …) –How (View, Print, Print watermark, Edit, Copy/Paste, Screen capture, Revoke, …) –When (Set period, How long, How many, …) E-DRM traces the log of document usages E-DRM covers all perimeters: PC, File-server, Application Systems, , FTP, CD/DVD/USB, Web, etc. E-DRM is the only systematic solution against document leak by the authorized users (solution for insider threat management).

Data Encryption Is Not Enough The encryption key needs to be delivered securely After decryption, the content is out of control. It can be used and forwarded freely Content Encrypted Content EncryptionDecryption Key Management Rendering Applications

Architecture Model of Enterprise DRM Technology Content use is governed by DRM Client according to the policy of DRM Server Key delivery is automated by DRM Server Content Rendering Applications DRM Packager DRM Server Metadata Identifier Metadata Signature Secure Container Encrypted Content Policy License Metadata Signature Secure Container

S Group Ad-hoc DRM (Securing deliverable file w/o managing –was deployed for all S Group companies’ systems since November, 2006 Server DRM (ERM download/upload from Apps) –was deployed since May, 2002 for more than 50 S Group Companies and expected to complete for all S Group companies before (S Electronics, SDI, SDS, Life Insurance, Fire & Marine Insurance, Corning, Semiconductor, Electro Mechanics, Heavy Industries, Networks, Foundation, SERI, Card, Total, Fund, etc.) PC DRM (Enforce automatic ERM encryption from all PC) –was deployed since December, 2006 for 3 S Group Companies and expected to complete for all S Group companies before 2009 (S Electronics, Life Insurance, Engineering, etc.)

S Group E-DRM systems –are successfully deployed and running under S Group companies’ environment that has more than “300,000 active users, 1,000,000 total transactions and 100,000 file packaging transactions per day on average. Allowing S to have complete protection of their documents and application systems including MS Office, PDF, various CAD apps, PLM, KMS, CMS, Web Collaboration, etc. against both outsiders & insiders. S Group’s security infrastructure –is now considered as a best practice benchmarking case to raise strategic value of organization by fully utilizing inter- organization communication, knowledge management and comply with regulations.

Strategic Value of E-DRM Technology Inter-organization Communication Knowledge ManagementRegulatory Compliance Competitive Advantage

Wrap-up Any Questions? Inquiry: