1 © Copyright 2008 EMC Corporation. All rights reserved. Information Rights Management EMC Content Management and Archiving.

Slides:



Advertisements
Similar presentations
2011 NetIS Presentation The Complete ePublishing Platform Designed for the 21 st Century.
Advertisements

Compliance storyboard: Classifying & controlling content at the input device.
© 2007 IBM Corporation Enterprise Content Management Integrating Content, Process, and Connectivity for Competitive Advantage Malcolm Holden October 2007.
Westbrook Technologies from Document Management’s Role in HIPAA.
Enterprise CAL Overview. Different Types of CALs Standard CAL base A component Standard CAL is a base CAL that provides access rights to basic features.
Building an Effective Compliance Architecture Alan Weintraub Sr. Director Hummingbird
Microsoft Confidential Solution Overview: Foxit Software Corporation’s PDF Security Suite.
Persistent Protection Using E-DRM Technology Jason Fasoo 06/18/2008.
Iron Mountain’s Continuity Service ©2006 Iron Mountain Incorporated. All rights reserved. Iron Mountain and the design of the mountain are registered.
PETs and ID Management Privacy & Security Workshop JC Cannon Privacy Strategist Corporate Privacy Group Microsoft Corporation.
Security Controls – What Works
Sophos / Utimaco Data Loss Prevention Peter Szendröi, SOPHOS Nordics Jan 20, 2010.
Understanding Active Directory
DATA SECURITY Social Security Numbers, Credit Card Numbers, Bank Account Numbers, Personal Health Information, Student and/or Staff Personal Information,
Creating a Secured and Trusted Information Sphere in Different Markets Giuseppe Contino.
Chapter 9 Information Systems Controls for System Reliability— Part 2: Confidentiality and Privacy Copyright © 2012 Pearson Education, Inc. publishing.
1 © Copyright 2007 EMC Corporation. All rights reserved. EMC Documentum Information Rights Management EMC Content Management and Archiving.
Windows Server 2012 R2 Capabilities for BYOD Scenario Yuri Diogenes Senior Knowledge Engineer Data Center, Devices & Enterprise Client – CSI Team’s Page:
1 © Copyright 2008 EMC Corporation. All rights reserved. EMC Documentum Trusted Content Services.
Live Meeting APIs Robert Devine Program Manager Microsoft Corporation.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Electronic Customer Portal System. Reducing Risks – Increasing Efficiency – Lowering Costs Secure Internet based Communication Gateway direct to your.
E-Book Repository Solution By Tim Haynes. Contents What is an E-book Repository My Solution Components of My Solution Diagram of My Solution Threats and.
Virtual techdays INDIA │ august 2010 Secure Collaboration: All You Need to Know about Extending Active Directory Rights Management Services (AD RMS)
Enterprise Content Management In Microsoft Office SharePoint Server 2007 Lionel Moyal Intervate Solutions
Mobility Without Vulnerability: Secure and Enable Your Mobile Users, Apps, and Devices David Clapp – Intuitive.
A Comprehensive Solution Team Mag 5 Valerie B., Derek C., Jimmy C., Julia M., Mark Z.
May 30 th – 31 st, 2006 Sheraton Ottawa. Microsoft Certificate Lifecycle Manager Saleem Kanji Technology Solutions Professional - Windows Server Microsoft.
1 Managed Security. 2 Managed Security provides a comprehensive suite of security services to manage and protect your network assets –Managed Firewall.
Christopher Chapman | MCT Content PM, Microsoft Learning, PDG Planning, Microsoft.
Market Trends Enterprise Web Applications Cloud Computing SaaS Applications BYOD Data Compliance Regulations 30 Second Elevator Pitch Web browsers have.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
High-Speed, High Volume Document Storage, Retrieval, and Manipulation with Documentum and Snowbound March 8, 2007.
Mike Hager Enterprise Security Advisor Unisys Corporation It’s All About The Data.
Teresa Macklin Information Security Officer 27 May, 2009 Campus-wide Information Security Activities.
1 © Copyright 2008 EMC Corporation. All rights reserved. David Mendel Sr. Product Marketing Manager EMC Corporation June 2008 EMC Documentum Information.
What Keeps You Awake at Night Compliance Corporate Governance Critical Infrastructure Are there regulatory risks? Do employees respect and adhere to internal.
Hands-On Microsoft Windows Server 2008
Copyright © 2000 Internet Document Security Alan Weintraub Research Director March 9, 2000.
Forms Management: Compliance, Security & Workflow Efficiencies.
Lecture Materials for the John Wiley & Sons book: Cyber Security: Managing Networks, Conducting Tests, and Investigating Intrusions October 7, 2015 DRAFT1.
PRIVACY, SECURITY & ID THEFT PREVENTION - TIPS FOR THE VIGILANT BUSINESS - SMALL BUSINESS & ECONOMIC DEVELOPMENT FORUM October 21, WITH THANKS TO.
OFC290 Information Rights Management in Microsoft Office 2003 Lauren Antonoff Group Program Manager.
DEP350 Windows ® Rights Management (Part 1): Introduction, Concepts, And Technology Marco DeMello Group Program Manager Windows Trusted Platforms & Infrastructure.
Managing Data Against Insider Threats Dr. John D. Johnson, CISSP.
© Copyright 2009 EMC Corporation. All rights reserved. Controlling Content Helps Achieve Compliance EMC & Informative Graphics Corp. EMC World 2010.
Module 9: Designing Public Key Infrastructure in Windows Server 2008.
Empowering people-centric IT Unified device management Access and information protection Desktop Virtualization Hybrid Identity.
James Akrigg Microsoft Ltd Integrating InfoPath Forms Into Workflow Solutions And Business Processes.
Module 7 Planning and Deploying Messaging Compliance.
McGraw-Hill/Irwin ©2008 The McGraw-Hill Companies, All Rights Reserved INFORMATION SECURITY SECTION 4.2.
I.R.I.S. © 2006, All rights reserved 1 GENERALI Belgium, a global Documentum Content Management Solution since 2004.
Access and Information Protection Product Overview Andrew McMurray Technical Evangelist – Windows
Information Security Measures Confidentiality IntegrityAccessibility Information cannot be available or disclosed to unauthorized persons, entities or.
User and Device Management
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
One Drive for Business: More Than a File Share Erica Toelle
Active Directory Domain Services (AD DS). Identity and Access (IDA) – An IDA infrastructure should: Store information about users, groups, computers and.
UNCLASSIFIED Matthew Bruce, Senior Solutions Consultant, Adobe Using Logic, Strategy, and DRM to Protect and Manage Content.
Your data, protected and under control wherever they go SealPath Enterprise – IRM
Novell iFolder Novell Academy QuickTrain. What is iFolder? Novell iFolder lets users’ files follow them anywhere A simple and secure way to access, organize.
Rights Management Services (RMS)
RMS with Microsoft SharePoint
Securing Information for a Shared Services Infrastructure
11/16/2018 © 2014 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks.
A 5-minute overview of ADAudit Plus
Presentation transcript:

1 © Copyright 2008 EMC Corporation. All rights reserved. Information Rights Management EMC Content Management and Archiving

2 © Copyright 2008 EMC Corporation. All rights reserved. Business Drivers for Content Security  Protect intellectual property –Trade secrets –Competitive information –IP theft –Secured collaboration  Compliance –Regulations –Audits  Risk mitigation –Legal exposure –Data loss –Privacy breaches “Despite massive investment in security technology and services… …fewer than one in five companies feel that all their data is adequately protected.” Source: Enterprise Strategy Group March % 18% 2

3 © Copyright 2008 EMC Corporation. All rights reserved. Implications of Information Loss Stock Plummets 3o%! March 2001 – Cerner Corp’s stock plummets 30% in one day after sensitive from CEO is posted on the internet Case Prejudiced! March 2005 – Morgan Stanley prejudices its own case in court by failing to provide relevant records on a timely basis. Personal Data Lost! October 2007 – The Gap loses laptop 800,000 encrypted job applications. Applications included applicants social security number and birth dates. Trade Secrets Public! August 2007 – The Federal Trade Commission accidentally posts a Finding of Fact document in Whole Foods/Wild Oats anti-trust case on a public server with all text available. Managers Charged! June 2003 – Former Boeing managers charged in a plot to steal trade secrets – Occurs during Lockheed Martin competitive bid Credit Card #’s Stolen! March 2007 – Hackers steal millions of customer credit card numbers from TJ Maxx stores. Stolen cards used to purchase millions of dollars of goods. TJ Maxx sued. 3

4 © Copyright 2008 EMC Corporation. All rights reserved. Regulators Are Getting Involved RegulationWhoData Retention and Data Privacy Gramm-Leach-Bliley Act (GLBA) Financial institutionsEnsure security, confidentiality and integrity of non-public client records (15 U.S.C. § 6801) Health Insurance Portability and Accountability Act (HIPAA) Healthcare IndustryPatient privacy (Sec ) Data encryption is an “addressable” requirement CA 1386 AB 1950 Companies with customers in California Encrypting stored data to prevent identity theft (SEC. 2. Section ) DoD SEC 17.a-4 U.S. GovernmentStorage encryption and secure deletion for records management applications and data archiving VISA CISPMerchants, payments processors Requirement to protect stored data, preferably with strong encryption (s.3) Sarbanes-OxleyU.S. CorporationsIntegrity of financial records and systems (Sec. 404) Consumers Demand Protection and Governments Respond with Regulation

5 © Copyright 2008 EMC Corporation. All rights reserved. The Threat Profile Has Shifted Necessary but insufficient Keeping the bad guys out Perimeter-based Security SolutionBuild and protect perimeters ApproachFirewall, IPS/IDS, anti-malware FocusAccess and availability ThreatDenial of Service, network intrusion, external attack + Assume they’re already in Information-based Security Manage and protect information Identity management, data encryption Authorization and accountability Privacy breach, intellectual property theft, insider attack Addresses root cause 84% of high cost security incidents are a result of insiders sending confidential material outside of their company. — Gartner 2006

6 © Copyright 2008 EMC Corporation. All rights reserved. Solutions Not Addressing the Root Issue Most information security products don’t actually secure information  They protect networks, laptops, and servers  They do little to protect confidentiality and integrity of information Authentication Clients SAN Web Filtering Anti-spyware LAN Anti-virus VPN Anti-virus Firewall Servers Threat Detection Change/Patch Management

7 © Copyright 2008 EMC Corporation. All rights reserved. Authentication Clients SAN Web Filtering Anti-spyware LAN Anti-virus VPN Anti-virus Firewall Servers Threat Detection Change/Patch Management Your Content is in Motion Information is in constant motion throughout its lifecycle, making it difficult to lock down  Perimeters and resources are constantly being traversed

8 © Copyright 2008 EMC Corporation. All rights reserved. Securing Content Across the Enterprise Confirm System is Secure – Auditing Securing the People Authentication Identity Management Access Control & Authorization Securing the Content Encryption (TCS) Digital Shredding (TCS) Retention Management Leaving the Repository – Information Rights Management Ensure System is Secure – Hardening and Validation Documentum Security Overview Inside the Repository

9 © Copyright 2008 EMC Corporation. All rights reserved. Information-Centric Security Protects Dynamic Content  Treat security as an information management problem  Secure information throughout its lifecycle Corporations cannot secure information they do not manage Capture Create Collaborate Version Manage Publish ArchiveRetire Re-archive Query THE LIFECYCLE OF ENTERPRISE CONTENT

10 © Copyright 2008 EMC Corporation. All rights reserved. Information Rights Management IRM actively controls, secures and tracks sensitive and confidential information wherever it resides.

11 © Copyright 2008 EMC Corporation. All rights reserved. EMC IRM Product Suite  ECM Documentum IRM Server (Policy Server) –ECM Documentum IRM Client for Microsoft Office –ECM Documentum IRM Client for Adobe Acrobat –ECM Documentum IRM Client for Lotus Notes –ECM Documentum IRM Client for RIM BlackBerry –ECM Documentum IRM Client for  ECM Documentum IRM Services for Documentum –ECM Documentum IRM Client Bundle  For Microsoft Office and Adobe Acrobat  ECM Documentum IRM Services for eRoom –ECM Documentum IRM Client Bundle  For Microsoft Office and Adobe Acrobat  ECM Documentum IRM SDK  Products with embedded IRM –EMC Infoscape –EMC Documentum Records Manager 11

12 © Copyright 2008 EMC Corporation. All rights reserved. IRM Server Key and Policy Management  Content is always encrypted  The keys are always separated from the content  The local key is destroyed after use Workflow Integrations Desktop Integration IRM Policy Server EMC Documentum eRoom EMC Documentum Repository File Share Content Owner + Policy + Policy

13 © Copyright 2008 EMC Corporation. All rights reserved. Partner Hacker Network IRM Policy Server Content Server EMC IRM Services for Documentum Workflow Secure Data Sharing Corporate VPN Partner Network Internet Author Review

14 © Copyright 2008 EMC Corporation. All rights reserved. Protection automatically applied based on folder, workspace, workflow, etc. EMC Documentum ACLs are interrogated by the IRM server when content is accessed and applied. Policy Server references enterprise directories for authentication and authorization. After authentication, content is viewed securely with policy enforced. Protected content accessed through normal interaction with EMC Documentum Content Server IRM for EMC Documentum Content Server IRM Policy Server ClientEnterprise Directory

15 © Copyright 2008 EMC Corporation. All rights reserved. EMC IRM Architecture Internet Explorer Adobe MS Office MS Outlook and Lotus Notes Xtender eRoom Documentum Admin Webtop Java, WDK-based Web Delivery Gateway File Share API Information Rights Management SDK Authentication Infrastructure ALL Authentication Domains LDAPWinX509RSADocumentumCustom EMC Documentum IRM Server Key MgmtAuthorizationPolicy MgmtAuthenticationAuditingEncryption

16 © Copyright 2008 EMC Corporation. All rights reserved. Features – Protects Native Business Information  Clients for major business applications – –Microsoft Office –Adobe –HTML –RIM Blackberry –Lotus Notes  Works within native application  Allows secure sharing of sensitive documents with internal and external users

17 © Copyright 2008 EMC Corporation. All rights reserved. Features – Rights Enforcement by Policy A document policy defines:  Who can view  What pages can be viewed (PDF only)  When it can be viewed  If copy or edit is allowed  If printing is allowed  If guest access is allowed  If offline viewing is allowed  Automatic expiration  Dynamic watermarks

18 © Copyright 2008 EMC Corporation. All rights reserved. Features – Rights Enforcement by Policy Mandatory and discretionary policy enforcement options  Choose rights enforcement using administratively-defined templates or ad-hoc policies  Flexibility supports organizational rollout  Allows for workgroup and enterprise-wide applications

19 © Copyright 2008 EMC Corporation. All rights reserved. Features – Dynamic Watermarking  Dynamic watermarking can provide visible indication of who printed a copy and when they printed it  Can be used for compliance and auditing  Provide watermarks while viewing and/or when printing  Watermarks are customizable  Watermarks supports Unicode  Watermarks can use LDAP attributes

20 © Copyright 2008 EMC Corporation. All rights reserved. Feature – Dynamic Policy Control Dynamic policy control allows recipient entitlements to be changed on-the-fly when individual roles or business needs change, regardless of where the content resides. Example:  In April a price list with IRM is downloaded by a sales person  The sales person s the price list to a customer  On May 17, prices change and new prices are issued  At that time, rights on the old price list are revoked, affecting all copies, regardless of location NEW

21 © Copyright 2008 EMC Corporation. All rights reserved. Feature – Automatic Expiration Control Rights can also be set to automatically expire  Enforce version control and document retention policies  Access can be revoked no matter where files reside  Example: A monthly price list can be set to automatically revoke all rights at the end of the month 21

22 © Copyright 2008 EMC Corporation. All rights reserved. Feature – Continuous Audit Trail All events in IRM are auditable  IRM provides granular audit trail of what recipients did with the documents, page by page  See who did what, when  Delivers on-going assurance of policy compliance  Auditing is continuous, whether online or offline  Leverage XML logging standards for reporting on audit trail 22

23 © Copyright 2008 EMC Corporation. All rights reserved. Feature – Leverages Existing Authentication Infrastructure  Leverages an organizations exiting authentication security infrastructure –Minimizes impact to administration of E-DRM policies –Speeds deployment  IRM participates in Documentum’s open authentication framework, allowing for integration with –LDAP directories –Multifactor authentication –Single Sign-on –Biometrics –X509.3 certificates –Smart cards 23

24 © Copyright 2008 EMC Corporation. All rights reserved. U.S. Congressional Committee Challenge  National security committees in the U.S. Congress handles tens of thousands of sensitive documents annually, all of which must be carefully controlled.  Prior to adopting IRM, one of the committees kept documents in locked cabinets and used a manual system to log, route and track documents. IRM Solution  Documents are converted to PDF, then are encrypted with a policy that determines how a document can be accessed and used.  Documents are stored on a standard file server and distributed to committee members via .  The committee can now move critical information much quicker while persistently projecting the documents, even after delivery to the committee staff.

25 © Copyright 2008 EMC Corporation. All rights reserved. Ford Motor Company Requirements  Securely share the 10 year “Vehicle Vision” product plan for the Ford brands and keep away from competitors and the media  Require multiple access levels for brand executives  Must be easy to use for 1,000 insiders around the world, including Chairman Bill Ford Jr. IRM Solution  Document owner protects and distributes through portal  No access outside of current insider list  Username watermark raises the bar on distribution “We don’t want to see this in the Detroit Free Press…” Customer Case Study

26 © Copyright 2008 EMC Corporation. All rights reserved. Case Study ROI: 6 month payback, elimination of paper and delivery costs Marketing update price books monthly instead of quarterly Challenges –Sharing price lists and competitive materials with 2000 sales agents and suppliers globally –High cost for logistics to distribute by paper –Competitors placing bounty on our price books IRM Solution –Access is tracked continuously and audited –Ensures only authorized users can access info. –Username is impressed as a watermark –Marketing can irrevocably delete at any time

27 © Copyright 2008 EMC Corporation. All rights reserved. Off Wall Street Requirements  Protect highly valuable financial information sold as a subscription  Ensure that documents are not forwarded to unauthorized users, especially competitors  Regulate what recipients can do with the information (e.g., print, edit) consistently for all reports regardless of who distributes them IRM Solution  “The product has been trouble-free from the start. We've never had a problem with the software, ever.“ —Mark Roberts, CEO  Increases revenue: users cannot access reports without paying for it  Provides policy-based usage controls and audit trail for information access Customer Case Study

28 © Copyright 2008 EMC Corporation. All rights reserved. Industry Use Examples for IRM  Manufacturing –Sharing of new product specifications, planning, R&D, and pricing documents  Government –Share information on a need-to-know basis within intelligence community  Healthcare –Communications with business associates –Control of PHI dissemination  Financial and Legal Services –On-line mergers and acquisitions –Protect customer data –High value research circulation control –Secure distribution of bills of lading 28