Presentation is loading. Please wait.

Presentation is loading. Please wait.

Trust 2 ™ Share your confidential information assets without headaches about unauthorized leakage WIM COULIER, SENIOR PROJECT MANAGER CERTIPOST

Similar presentations


Presentation on theme: "Trust 2 ™ Share your confidential information assets without headaches about unauthorized leakage WIM COULIER, SENIOR PROJECT MANAGER CERTIPOST"— Presentation transcript:

1 Trust 2 ™ Share your confidential information assets without headaches about unauthorized leakage WIM COULIER, SENIOR PROJECT MANAGER CERTIPOST WIM.COULIER@STAFF.CERTIPOST.BE

2 2 Agenda Short intro of Certipost Trust 2, boosted by the Belgian electronic ID Card Trust 2, a cost-effective and secure way to exchange business documents with business partners Trust 2 demo Trust 2 case studies Institutes of Belgian Accountants and Company Auditors Simont Braun Conclusion

3 3 Direct model vs Consolidator Inhouse costs Software purchase Implementation Maintenance Upgrades Inhouse services User management Support Archiving Applications Connectivity Interconnections Proof of delivery Payment Translation Print gateway Security SMS gateway Centralized & outsourced services platform customer 1 customer 2 customer 3 customer 4 supplier 1 supplier 2 supplier 3 residential CertiONE Large company SME Residential customer Hybrid gateway eGOV interconnections

4 4 Trust 2, boosted by the Belgian electronic ID Card Role of Certipost Architect & manager of digital certificates on eID cards Service provider of eID validation services (cfr. card stop for credit cards) Our role: eID applications: Trust², registered mail, others,... eID shop: help companies with eID implementation IAM : help organisations use eID as a unique tool for authentication

5 5 4 eID applications Physical Identification Data capture eID validation services Authentication Signature

6 6 CertiONE e-Worker: Trust² CertiONE Trust 2 Distributor defines document rights & sends via e-mail Read access Trust² identified via user/password Trust² identified Trust² identified via eID no identification Read, write, copy & print access Read access

7 7 Trust 2, a cost-effective and secure way to exchange business documents with business partners Today, most communication policies only exist on paperToday, most communication policies only exist on paper Its easy to unintentionally forward e-mails & documentsIts easy to unintentionally forward e-mails & documents Its easy to intentionally share/sell plans w/competitors, press, InternetIts easy to intentionally share/sell plans w/competitors, press, Internet

8 8 Re-usage rights cleared via Get-a-Copy 29/05/2004 The need: Collaborative working requires persistent information Protection

9 9 The solution Define and Enforce your usage and distribution policies of your information assets via Information Rights Management

10 10 Access Control User Management Yes No People Fil e The solution: Trust 2 based on information Rights Management Information Rights Management Do not forward Do not Copy …. People Yes

11 11 Information flows within and across the organizational borders Publish confidential information on portal only accessible by authorized members without risk of accidental or intentional leakages Safeguard the confidentiality of financial and audit reports when shared with customer Sales manager preventing dissemination of business intelligence embedded in a proposal ….

12 12 UID/PSWD

13 13 Trust 2 for MS Office at Work.. Trustworthy information exchange for Office documents, web content and Outlook emails

14 Content Distributor

15 15

16 16

17 17

18 18

19 19

20 20

21 21

22 22

23 23

24 24

25 25

26 26

27 27

28 28

29 29

30 30

31 Content Recipient

32

33 33

34 34

35 35

36 36

37 37

38 38

39 39

40 40

41 41 Trust 2 for MS Office at Work.. Trustworthy information exchange for Office documents, web content and Outlook emails

42 Scenario’s

43 43 Inhouse

44 44 Service Model

45 45 Hybrid Model

46 Case studies

47 47 Trust 2 Case Study (1) : IAB-I.B.R. Institutes of Tax Accountants and Company Auditors Usage of a professional token/smartcard Various confidential information flows identified

48 48 Trust 2 case studies (1) : IAB-I.B.R. Relations with the Institute Either via secured e-mail or Intranet secure access Secure sending of expertise reports, permanent training annual attests, modification of personal or professional coordinates Deposit of deontologically requested reports Disciplinary related documents exchange Publication of Members Lists, Stagiairs Lists and Masters of “Stagiairs” Relations with confraters Any confidential information exchange Exchange of working documents, reports Any confraternal information exchange Relations with Third parties & customers Audit Reports Any confidential information exchange Relations with authorities Any confidential information exchange Answers to “avis” from the Administration Fiscal agreement Complaints introduction

49 49 Pilot project : Law Firm Simont Braun Headquartered in the middle of the traditional Brussels business district, The firm Simont Braun is the result of the merger between two groups of lawyers, one gathered around Lucien Simont and the other coming from the firm Braun Bigwood Its activities cover business law at large, their practice areas are Arbitration & Litigation Corporate law Finance & Banking Intellectual property & Competition law Public and Administrative Law Real estate and Construction law Tax & Labor law Trade practices, E-commerce & Distribution Trust2 Case Study (2) : Simont Braun

50 50 Trust 2 Case Study (2) : Simont Braun Case study In the process of deploying Office 2003 Pro 70 collaborators exchange monthly more or less than 500.000 emails Trust² would be the right means for Simont Braun to exchange confidential documents,contracts with other Lawyer’s firms To provide legal documents just in time, replacing fax transmission (ex: conclusions, …)

51 51 Conclusion Trust 2 for cost-effective and secure way to exchange business documents with business partners DRM Leveraging on Microsoft RMS Technology Strong Authentication Leveraging on the Belgian eID project Policy based for customisation Available “out-of-the box” as standard feature of MS Office 2003 Pro Different models are available Outsourced Insourced Hybrid

52 52 Questions and Answers See you on http://www.trust2.com or mailto:wim.coulier@staff.certipost.be


Download ppt "Trust 2 ™ Share your confidential information assets without headaches about unauthorized leakage WIM COULIER, SENIOR PROJECT MANAGER CERTIPOST"

Similar presentations


Ads by Google