Download presentation
Presentation is loading. Please wait.
Published byBryce Black Modified over 9 years ago
4
Key learnings from our customers Data privacy is important and is often mandated Regulatory requirements are on the rise IT must ‘reason over data’ as they do high value services Point to point encryption fails them today Peer to Peer federation is not practical or scalable There has to be a better way The perimeter is fading… Mobile workforces, BYOD, outsourcing, virtual orgs Many models of data protection polices are more reactive We need data to be born encrypted and to maintain a persistent protection Waiting for the “ultimate data protection solution” is tempting … yet data is leaking now
7
Secret Cola Formula Water HFCS Brown #16 Secret Cola Formula Water HFCS Brown #16 #!@#!#!@#! ()&)(*&)(@#! Use Rights + ProtectUnprotect Rights Management 101 Usage rights + symmetric key stored in file as ‘license’ License protected by customer owned RSA key File is protected by its own, unique AES symmetric key.
8
PC/DEVICE LOCAL PROCESSING #!@#!#!@#! ()&)(*&)(@#! Use Rights + Rights Management 101 File content is never sent to the RMS server/service. RMS-enlightened apps enforce rights Apps use the SDK to communicate with the RMS service/servers File content is never sent to the RMS server/service. Use Rights +
10
Activate RMS in Office 365 admin console
11
Office apps integrates with RMS
12
Office 365 (Exchange) integrates with RMS Powerful rules-based policies can enforce the automatic application of RMS to email and documents that include sensitive information. Protect SharePoint document libraries with on- exit protection of documents Enforce Data Loss Protection policies in e-mail with content scanning including attachments
13
Office 365 (Exchange) integrates with RMS A simple yet powerful rules generation experience with pre-canned templates makes it easy to quickly implement and provision data protection policies
14
Office 365 (SharePoint) integrates with RMS
17
Traditional Collaboration via P2P Trust
18
Using Azure AD as the Trust Fabric
19
Cn (common name)jdoe displayNameJohn Doe Mailjohn.doe@contoso.com proxyAddressesSMTP:john.doe@contoso.com userPrincipalNamejohn.doe@contoso.com accountEnabledTrue objectSID (sync ID) 01 05 00 00 00 00 00 05 15 00 00 00 E2 DB 08 EA EE 82 60 CC 4F CF A1 29 71 04 00 00 pwdLastSet20141013171110.0Z sourceAnchor (for Licensing)NyWoidInKk2S4xtxK+GsbQ== usageLocation (for Licensing)DE
21
Overview: Cloud Ready, Accepting, & Reluctant Azure RMS topologies Available Now CY16+ Available Now Limited O365 Integration Sync only 3 PII properties
23
Brad uses Share Protected
24
The document is sent with instant revocation
25
Bob receives an email with the document
26
Bob opens the document
27
Brad wants to track the document
28
Looks like Bob shared the document with Mary, but she couldn’t open it. Brad sends the document to Mary himself. Brad wants to track a document he sends to his staff Brad reaches the Document Tracking site
29
29 Brad tracks a document he sends to his staff
30
Summary View
31
31 Timeline View
32
32 Map View
33
33 Brad wants to revoke the document
34
Microsoft Confidential - EU RMS User Group / Oct 2014 34
38
Brad picks up a file for redaction
39
Marks the relevant text for Redaction
40
Chooses the right template
41
Saves the file as a PDF file, and sends it.
42
John’s view (redacted copy)
43
Kayla’s view (after authentication)
46
http://www.microsoft.com/enterprise/industry/manufacturing-and-resources/discrete-manufacturing/articles/jt2go-for-windows-8-facilities-mobility-processes-for-leading-enterprises.aspx
51
INTRODUCING Enterprise Data Protection A DIFFERENT APPROACH Corporate vs personal data identifiable wherever it rests on the device Protects data at rest, and wherever it rests or may roam to Seamless integration into the platform, No mode switching and use any app Prevents unauthorized apps from accessing business data IT has fully control of keys and data and can remote wipe data on demand Common experience across all Windows devices with cross platform support
52
Roam and share Enterprise data
54
For more information visit: microsoft.com/rms For latest updates follow on Twitter: @thermsguy
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.