Presentation is loading. Please wait.

Presentation is loading. Please wait.

Rights Management Services (RMS)

Similar presentations


Presentation on theme: "Rights Management Services (RMS)"— Presentation transcript:

1 Rights Management Services (RMS)
Matt Green – Solution Architect Cloud Collaboration and Communications Netrix, LLC

2 Compliance and Security Considerations
TechEd 2013 9/13/ :19 PM Compliance and Security Considerations Datacenter Security Independent auditing Real time issue tracking and root cause analysis BitLocker for hardware encryption Encryption of data at rest and in transit Data Loss Prevention Legal Hold and eDiscovery Rights Management Services (RMS) © 2013 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

3 Automated operations Office 365 datacenter network
TechEd 2013 9/13/ :19 PM Automated operations Office 365 datacenter network Microsoft corporate network Lock box: Role based access control Grants temporary privilege O365 Admin requests access Grants least privilege required to complete task. Verify eligibility by checking if Background Check Completed Fingerprinting Completed Security Training Completed © 2013 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

4 Advanced encryption using RMS
TechEd 2013 9/13/ :19 PM Advanced encryption using RMS Data protection in motion Data protection in motion Information can be protected with RMS at rest or in motion Data protection at rest Data protection at rest © 2013 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

5 RMS over standard approaches
Functionality RMS in Office 365 S/MIME ACLs (Access Control Lists) BitLocker Data is encrypted in the cloud Encryption persists with content Protection tied to user identity Protection tied to policy (edit, print, do not forward, expire after 30 days) Secure collaboration with teams and individuals Native integration with my services (Content indexing, eDiscovery, BI, virus/malware scanning) Helps meet compliance requirements Lost or stolen hard disk

6 Microsoft Office365 9/13/2018 User access Integrated with Active Directory, Azure Active Directory, and Active Directory Federation Services Can share with external businesses Enables additional authentication mechanisms: Two-factor authentication – including phone-based 2FA Client-based access control based on devices/locations Role-based access control © 2012 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

7 Template Types Do Not Forward – specific to email
Company Confidential - consumers of the content are allowed all rights needed to work with and modify the content but are not permitted to copy and print the content Company Confidential View Only - consumers of the content are enabled to only read or view the content but are not permitted to modify the content in any way from its original published form

8 RMS Demo

9 Potential Hurdles (Today…)
External user access Two Factor Authentication and RMS Templates Template customization needs End user training Malicious behavior

10 Upcoming Features Support for external “individual user” domains, such as Google IDs, Live accounts, etc. Custom templates for RMS for Azure AD (AAD)

11 Questions?


Download ppt "Rights Management Services (RMS)"

Similar presentations


Ads by Google