Download presentation
Presentation is loading. Please wait.
Published byWilfred Patrick Modified over 6 years ago
1
Securing Information for a Shared Services Infrastructure
Rick Freeman Mgr, Professional Services Connie Tidy, EW Solutions Consultant © 2012 Ricoh Americas Corporation. All Rights Reserved.
2
Making Information Work
SCAN Secure Institutional Knowledge Collaborate Anytime Anywhere SCAN FAX JPG PDF XLS DOC Mobile worker Information mobility On premise Work From Anywhere, on Any Mobile Device PDF Digital SEARCH Archive Turn Trapped Information Into Useful Data Unlock Data & Insights From Information Silos Optimize Workflows Improve Processes © 2016 Ricoh USA, Inc. All Rights Reserved.
3
© 2012 Ricoh Americas Corporation. All Rights Reserved.
4
© 2012 Ricoh Americas Corporation. All Rights Reserved.
Digital Transformation © 2012 Ricoh Americas Corporation. All Rights Reserved.
5
© 2012 Ricoh Americas Corporation. All Rights Reserved.
The Digital Dilemma © 2012 Ricoh Americas Corporation. All Rights Reserved.
6
Gaps in Current Technologies
Firewalls Virus Protection YOUR DATA VPN End Point Encryption DLP
7
Constant Risk of Data Loss
8
© 2012 Ricoh Americas Corporation. All Rights Reserved.
The End Result © 2012 Ricoh Americas Corporation. All Rights Reserved.
9
© 2012 Ricoh Americas Corporation. All Rights Reserved.
Content is Everywhere © 2012 Ricoh Americas Corporation. All Rights Reserved.
10
© 2012 Ricoh Americas Corporation. All Rights Reserved.
New Challenges Tightened regulations and compliance Losing intellectual property & trade secrets Threats by insiders & authorized users Security in cloud, mobile & social computing © 2012 Ricoh Americas Corporation. All Rights Reserved.
11
© 2012 Ricoh Americas Corporation. All Rights Reserved.
Relationships Don’t Last Forever © 2012 Ricoh Americas Corporation. All Rights Reserved.
12
© 2012 Ricoh Americas Corporation. All Rights Reserved.
13
© 2012 Ricoh Americas Corporation. All Rights Reserved.
Top Insider Threats © 2012 Ricoh Americas Corporation. All Rights Reserved.
14
© 2012 Ricoh Americas Corporation. All Rights Reserved.
Most Vulnerable Applications © 2012 Ricoh Americas Corporation. All Rights Reserved.
15
© 2012 Ricoh Americas Corporation. All Rights Reserved.
The Rise of Insider Attacks © 2012 Ricoh Americas Corporation. All Rights Reserved.
16
© 2012 Ricoh Americas Corporation. All Rights Reserved.
Focus on Deterrence © 2012 Ricoh Americas Corporation. All Rights Reserved.
17
Enterprise Digital Rights Management Multi-layered Approach
The Three Phases of Data Wide Data/Document Policy Enterprise Digital Rights Management Multi-layered Approach Internal use External use VPN Network Transport Encryption Controlled Perimeter Enterprise Content Management Data Loss Prevention Full Disk Encryption Narrow Data at Rest Data in Transit Data in Use Controlled Phase © 2012 Ricoh Americas Corporation. All Rights Reserved.
18
Prevent unintended information disclosure or exposure
What is Enterprise DRM? Prevent unintended information disclosure or exposure File encryption – persistent document security Permission control – prevent unauthorized use of digital files Audit trail – consistent protection and verification © 2012 Ricoh Americas Corporation. All Rights Reserved.
19
How Enterprise DRM Works
Title Month Year How Enterprise DRM Works VIEW Corporate VPN Partner Network Author Partner Review Internet Unauthorized User Content Server EDRM Policy Server © 2012 Ricoh Americas Corporation. All Rights Reserved.
20
Covering Document Lifecycle
Sales Mary Revoke Partner Tina Create Edit 30 days Legal Ethan Edit VP Mark Revoke Finance Chris Content Repository View Edit Print Print Chris Peters 9:37 11/7/ © 2012 Ricoh Americas Corporation. All Rights Reserved.
21
Regardless of its location!
Control Your Content Regardless of its location! © 2012 Ricoh Americas Corporation. All Rights Reserved.
22
© 2012 Ricoh Americas Corporation. All Rights Reserved.
Canadian Implications © 2012 Ricoh Americas Corporation. All Rights Reserved.
23
© 2012 Ricoh Americas Corporation. All Rights Reserved.
Mandatory Reporting © 2012 Ricoh Americas Corporation. All Rights Reserved.
24
© 2012 Ricoh Americas Corporation. All Rights Reserved.
Provinces © 2012 Ricoh Americas Corporation. All Rights Reserved.
25
Classify, Prioritize and Protect
© 2012 Ricoh Americas Corporation. All Rights Reserved.
26
Value Proposition Protects valuable information beyond controlled boundaries using data-centric security strategies Ensures valuable digital assets are viewed only by the intended audience with file-level permission control and unauthorized users cannot access the digital assets Reduces the risk of intellectual property loss from insiders or while collaborating with 3rd parties Most effective tools for insider threat management Suitable for diversified collaboration environment in cloud and mobile Last resort against possible Advanced Persistent Threat (APT) attacks © 2012 Ricoh Americas Corporation. All Rights Reserved.
27
© 2012 Ricoh Americas Corporation. All Rights Reserved.
Summary © 2012 Ricoh Americas Corporation. All Rights Reserved.
28
May is the IA awareness month
29
IIA-Calgary / Upcoming Events
May = IIA-Canada Training Week in Vancouver, BC May 17 = “EHS Auditing - Environmental Auditing in Oil & Gas: A look back and a look ahead” UofC Downtown Campus ALMOST SOLD OUT May (TBA) = AGM Meeting & Summer National 8th June 15 = “Governance and Audit Oversight within Canadian Municipalities” - Afternoon session from 16h00 to UofC Downtown Campus
30
Calgary Chapter’s Partner
Ask for a Quote ! Home & Auto Insurance Rates negotiated for the IIA Calgary Chapter’s members Daniel Engman FCIP, CRM Business Development Advisor
31
© 2012 Ricoh Americas Corporation. All Rights Reserved.
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.