Trust 2 ™ Share your confidential information assets without headaches about unauthorized leakage WIM COULIER, SENIOR PROJECT MANAGER CERTIPOST

Slides:



Advertisements
Similar presentations
We have to Share Data - Now What? Jon R. Wall Security / IA Microsoft.
Advertisements

Compliance storyboard: Classifying & controlling content at the input device.
Company Philosophy Desktop Solutions for the New Age of Banking Internet and intranet desktop solutions that simplify and streamline trust management.
Dematerialization of Organisations’ Key Business Processes Security and e-Invoicing ATHENEE PALACE HILTON, Bucuresti September 21 st 2004 Genovel Iovu.
Internet2, CENIC and Merit: Partnering to Deliver Cloud Services to California.
Microsoft Confidential Solution Overview: Foxit Software Corporation’s PDF Security Suite.
PETs and ID Management Privacy & Security Workshop JC Cannon Privacy Strategist Corporate Privacy Group Microsoft Corporation.
Department of Information Engineering1 Major Concerns in Electronic Commerce Authentication –there must be proof of identity of the parties in an electronic.
Understanding Active Directory
Designing and Implementing Secure ID Management Systems: BELGIUM’s Experience Washington - September 27 th, 2010 Frank LEYMAN © fedict All rights.
CSE 4482, 2009 Session 21 Personal Information Protection and Electronic Documents Act Payment Card Industry standard Web Trust Sys Trust.
Creating a Secured and Trusted Information Sphere in Different Markets Giuseppe Contino.
MAGNET ™ Sales Manual Storage Assets Real-Time Networks Projects
1 © Copyright 2007 EMC Corporation. All rights reserved. EMC Documentum Information Rights Management EMC Content Management and Archiving.
E-Business: Intra-Business E-Commerce
“Electronic Payment System”
Financial Transactions on Internet Financial transactions require the cooperation of more than two parties. Transaction must be very low cost so that small.
Electronic Customer Portal System. Reducing Risks – Increasing Efficiency – Lowering Costs Secure Internet based Communication Gateway direct to your.
© 2011 Autodesk Securing AutoCAD IP in the era of WikiLeaks Presenter: Rahul Kopikar Co-Founder, Seclore Technology.
The proof of your digital documents. Copyright Lex Persona – All rights reserved 2 Our approach to paper reduction The current approach –The.
Virtual techdays INDIA │ august 2010 Secure Collaboration: All You Need to Know about Extending Active Directory Rights Management Services (AD RMS)
Clinton Ho Program Manager Microsoft Corporation SESSION CODE: SIA311.
Lecture 12 Electronic Business (MGT-485). Recap – Lecture 11 E-Commerce Security Environment Security Threats in E-commerce Technology Solutions.
Windows Rights Management Services (RMS) Moshe Zrihen CTO, TrustNet.
Design, Implementation & Roll-out of e-Procurement May 2013 Kang-il Seo | Deputy Director, International Cooperation Division Public Procurement Service.
Christopher Chapman | MCT Content PM, Microsoft Learning, PDG Planning, Microsoft.
The Internetworked E-Business Enterprise
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Secure Electronic Transaction (SET)
BITS Proprietary and Confidential © BITS Security and Technology Risks: Risk Mitigation Activities of US Financial Institutions John Carlson Senior.
Deploying PKI Inside Microsoft The experience of Microsoft in deploying its own corporate PKI Published: December 2003.
1 International Forum on Trade Facilitation May 2003 Trade Facilitation, Security Concerns and the Postal Industry Thomas E. Leavey Director General, UPU.
Introduction to Secure Messaging Issues Russ Chung, American Eagle Group The Open Group Messaging Forum July 24, 2003.
Module 9 Configuring Messaging Policy and Compliance.
Presentation Path  Introduction to Ved Consultancy and OpenText  Current Challenges  The Valued Customers and Sectors  Our Solutions  Demo. Together,
ISO17799 Maturity. Confidentiality Confidentiality relates to the protection of sensitive data from unauthorized use and distribution. Examples include:
E-Commerce Security Professor: Morteza Anvari Student: Xiaoli Li Student ID: March 10, 2001.
OFC290 Information Rights Management in Microsoft Office 2003 Lauren Antonoff Group Program Manager.
DEP350 Windows ® Rights Management (Part 1): Introduction, Concepts, And Technology Marco DeMello Group Program Manager Windows Trusted Platforms & Infrastructure.
Solution Briefing Connecting with Extranets. Solution Briefing Why SharePoint 2010? What are the value adds in extranet deployments?
More Competitive, Lower Cost How Standardization Fuels Growth
SMU Dedman School of Law September 29, Agenda Topics  Who is PaymentsNation?  Who Are The Other Players?  What is Happening in Payments?  Emerging.
OCTAVE-S on TradeSolution Inc.. Introduction Phase 1: Critical Assets and threats Phase 2: Critical IT Components Phase 3: Changes Required in current.
COMMUNICATION WITH CREDITORS AND DEBTORS IN ACCORDANCE WITH THE NEW CIVIL CODE OF PROCEDURE (NCCP) USING TECHNOLOGY INFORMATION AND COMMUNICATIONS André.
İntroduction to Business 2 BUS 102 Erlan Bakiev, Ph. D. Zirve University BUS 102.
Customer Interface for wuw.com 1.Context. Customer Interface for wuw.com 2. Content Our web-site can be classified as an service-dominant website. 3.
The Microsoft Services Provider License Program (SPLA)
E-Finance in India A Perspective Geneva October 24, 2001.
1 © 2000 Arthur Andersen All rights reserved. Arthur Andersen Then and Now …. TODAY14 YRS. AGO $7 billion $1 billion ( ) (about 75 yrs to.
Module 7 Planning and Deploying Messaging Compliance.
Security fundamentals Topic 5 Using a Public Key Infrastructure.
Comprehensive Project Management Solutions with the.NET Server family.
Module 1: Overview of Microsoft Office SharePoint Server 2007.
EAP’s Sponsored and in Partnership withTrust² Bart Callens Senior Product Manager Certipost Erwin Vercammen Vice President Belgian Institute of Chartered.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Purchasing Cards. What is a Purchasing Card? It is a type of commercial credit card, used by organizations for payment of goods and services. This tool.
INTRODUCTION  netCORE offers 360 degree digital communication solutions Messaging and Mobility  Pioneers in Linux based mailing solution and catering.
UBAX14 - Convergence Session: Unlocking and Benefiting from Advanced Shared Services in Microsoft Dynamics AX 2012 Nima Bakhtiary, Arbela Technologies.
The technology behind the USPS EPM. AND COMPLIANCE March 25, 2004 Adam Hoffman.
SOFTWARE PIRACY & WORKPLACE ETHICS. What Is Software Piracy? Unauthorized copying/installation/use Unauthorized distribution or sale.
Integrating E-Signatures Into Your Web Application
Paperless & Cashless Poland Program overview
Andy Taylor Partner Program, RPost
BY GAWARE S.R. DEPT.OF COMP.SCI
Health Care: Privacy in a Digital Age
Business Document Platform
Presentation transcript:

Trust 2 ™ Share your confidential information assets without headaches about unauthorized leakage WIM COULIER, SENIOR PROJECT MANAGER CERTIPOST

2 Agenda Short intro of Certipost Trust 2, boosted by the Belgian electronic ID Card Trust 2, a cost-effective and secure way to exchange business documents with business partners Trust 2 demo Trust 2 case studies Institutes of Belgian Accountants and Company Auditors Simont Braun Conclusion

3 Direct model vs Consolidator Inhouse costs Software purchase Implementation Maintenance Upgrades Inhouse services User management Support Archiving Applications Connectivity Interconnections Proof of delivery Payment Translation Print gateway Security SMS gateway Centralized & outsourced services platform customer 1 customer 2 customer 3 customer 4 supplier 1 supplier 2 supplier 3 residential CertiONE Large company SME Residential customer Hybrid gateway eGOV interconnections

4 Trust 2, boosted by the Belgian electronic ID Card Role of Certipost Architect & manager of digital certificates on eID cards Service provider of eID validation services (cfr. card stop for credit cards) Our role: eID applications: Trust², registered mail, others,... eID shop: help companies with eID implementation IAM : help organisations use eID as a unique tool for authentication

5 4 eID applications Physical Identification Data capture eID validation services Authentication Signature

6 CertiONE e-Worker: Trust² CertiONE Trust 2 Distributor defines document rights & sends via Read access Trust² identified via user/password Trust² identified Trust² identified via eID no identification Read, write, copy & print access Read access

7 Trust 2, a cost-effective and secure way to exchange business documents with business partners Today, most communication policies only exist on paperToday, most communication policies only exist on paper Its easy to unintentionally forward s & documentsIts easy to unintentionally forward s & documents Its easy to intentionally share/sell plans w/competitors, press, InternetIts easy to intentionally share/sell plans w/competitors, press, Internet

8 Re-usage rights cleared via Get-a-Copy 29/05/2004 The need: Collaborative working requires persistent information Protection

9 The solution Define and Enforce your usage and distribution policies of your information assets via Information Rights Management

10 Access Control User Management Yes No People Fil e The solution: Trust 2 based on information Rights Management Information Rights Management Do not forward Do not Copy …. People Yes

11 Information flows within and across the organizational borders Publish confidential information on portal only accessible by authorized members without risk of accidental or intentional leakages Safeguard the confidentiality of financial and audit reports when shared with customer Sales manager preventing dissemination of business intelligence embedded in a proposal ….

12 UID/PSWD

13 Trust 2 for MS Office at Work.. Trustworthy information exchange for Office documents, web content and Outlook s

Content Distributor

15

16

17

18

19

20

21

22

23

24

25

26

27

28

29

30

Content Recipient

33

34

35

36

37

38

39

40

41 Trust 2 for MS Office at Work.. Trustworthy information exchange for Office documents, web content and Outlook s

Scenario’s

43 Inhouse

44 Service Model

45 Hybrid Model

Case studies

47 Trust 2 Case Study (1) : IAB-I.B.R. Institutes of Tax Accountants and Company Auditors Usage of a professional token/smartcard Various confidential information flows identified

48 Trust 2 case studies (1) : IAB-I.B.R. Relations with the Institute Either via secured or Intranet secure access Secure sending of expertise reports, permanent training annual attests, modification of personal or professional coordinates Deposit of deontologically requested reports Disciplinary related documents exchange Publication of Members Lists, Stagiairs Lists and Masters of “Stagiairs” Relations with confraters Any confidential information exchange Exchange of working documents, reports Any confraternal information exchange Relations with Third parties & customers Audit Reports Any confidential information exchange Relations with authorities Any confidential information exchange Answers to “avis” from the Administration Fiscal agreement Complaints introduction

49 Pilot project : Law Firm Simont Braun Headquartered in the middle of the traditional Brussels business district, The firm Simont Braun is the result of the merger between two groups of lawyers, one gathered around Lucien Simont and the other coming from the firm Braun Bigwood Its activities cover business law at large, their practice areas are Arbitration & Litigation Corporate law Finance & Banking Intellectual property & Competition law Public and Administrative Law Real estate and Construction law Tax & Labor law Trade practices, E-commerce & Distribution Trust2 Case Study (2) : Simont Braun

50 Trust 2 Case Study (2) : Simont Braun Case study In the process of deploying Office 2003 Pro 70 collaborators exchange monthly more or less than s Trust² would be the right means for Simont Braun to exchange confidential documents,contracts with other Lawyer’s firms To provide legal documents just in time, replacing fax transmission (ex: conclusions, …)

51 Conclusion Trust 2 for cost-effective and secure way to exchange business documents with business partners DRM Leveraging on Microsoft RMS Technology Strong Authentication Leveraging on the Belgian eID project Policy based for customisation Available “out-of-the box” as standard feature of MS Office 2003 Pro Different models are available Outsourced Insourced Hybrid

52 Questions and Answers See you on or