Mobile Content Governance

1,942 views
1,867 views

Published on

With mobile apps becoming more ubiquitous, see how the new EMC Documentum Information Rights Management (IRM) mobile client can help enterprises access IRM-protected sensitive content on the go!

Published in: Technology, Business
0 Comments
1 Like
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total views
1,942
On SlideShare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
38
Comments
0
Likes
1
Embeds 0
No embeds

No notes for slide

Mobile Content Governance

  1. 1. MOBILE CONTENT GOVERNANCE Raul Gabriel Product Marketing Manager© Copyright 2012 EMC Corporation. All rights reserved. 1
  2. 2. The New User Social Computing Usage Surpasses Email Users Self Provision Users Want Choice© Copyright 2012 EMC Corporation. All rights reserved. 2
  3. 3. Mobile Media is Mainstream 93% of US Smartphone owners used connected media 60% growth, YoY Source: ComScore© Copyright 2012 EMC Corporation. All rights reserved. 3
  4. 4. What is mobile content? Mobile content is any type of media which is viewed or used on mobile phones, like ringtones, graphics, discount offers, games, movies, and GPS navigation "Mobile content." Wikipedia. Wikimedia Foundation, Inc., 25 Apr. 2012. Web. 3 May 2012. <http://en.wikipedia.org/wiki/Mobile_content>© Copyright 2012 EMC Corporation. All rights reserved. 4
  5. 5. Growth of Mobile  Content is becoming richer, denser, and more popular Massive Wireless Data Growth Usage by phone type3000 35002500 3000 25002000 2000 MB/User/mont1500 1500 h MB/User/Month 10001000 500 0 500 0 2010 2011 2012 2013 2014 2014 © Copyright 2012 EMC Corporation. All rights reserved. 5
  6. 6. Mobile is BIG BusinessFirst ringtones Progression of media types, "mobisodes," video contentgo on sale by from news, video games, that has been produced jokes, horoscopes, TV content Radiolinja in exclusively for mobile and advertising Finland phones 1998 today Source: Informa & ComScore© Copyright 2012 EMC Corporation. All rights reserved. 6
  7. 7. Mobile is BIG Business 2007 MOBILE-PHONE-PAID MEDIA CONTENT $31B $5B GAMING $9.3B MUSIC (2006) Source: Informa & ComScore© Copyright 2012 EMC Corporation. All rights reserved. 7
  8. 8. What is the Threat/Concern?  How many of you have two phones (1 for work, 1 for personal) – How many “share” phones, tablets? – How many people use personal tablet at work? – How many people have work provided tablet? ▪ Can you use for personal things (like Angry Birds?)© Copyright 2012 EMC Corporation. All rights reserved. 8
  9. 9. Information governance is a strategic issue for many organizations… the risks and costs of e-discovery and compliance have put litigation readiness and information retention management in the spotlight. Source: 451 Group, 2009© Copyright 2012 EMC Corporation. All rights reserved. 9
  10. 10. Areas of Concern Personal Corporate Government Digital Footprint Control Behavior© Copyright 2012 EMC Corporation. All rights reserved. 10
  11. 11. PERVASIVE GOVERNANCE The First Step In Action© Copyright 2012 EMC Corporation. All rights reserved. 11
  12. 12. THE FIRST STEP ENTERPRISE EXTENDED PERVASIVE Understand Audit Centralize Automate Policy Track Embed Protect Control Federate© Copyright 2012 EMC Corporation. All reserved.©Copyright 2011 EMC Corporation. All rightsrights reserved. 12 12
  13. 13. Pervasive Governance – The Cycle Understand Automate Your Content & Enforce Policies (Value & Risk) (Prove Compliance) Discover Protect & Produce & Control (Early Case Assessment) (On & Off Premise) Intelligent, High Performing, Transparent© Copyright 2012 EMC Corporation. All rights reserved. 13
  14. 14. Pervasive Governance Components • Search on external content File • Determine what resides externally and what can be moved within Intelligence • Link with CIS and RPS once content is moved within Retention Policy • Retention policies applied at container level Services • Multiple policy reconciliation and disposition • Seamless to the end user • 5015.2 Compliant Records Management Records • Adherence to corporate file plans and policies RM Management • Integrations with common business apps Trusted Content • Secure connections within the Documentum platformTCS Services • Encryption of underlying file stores • FIPS and other government standards Information Rights • Secure the integrity of content outside the repositoryIRM Management • Integration with common business authoring applications • Works stand-alone or integrated with Documentum repository security • Conduct Early Assessment to quickly gain insight into case merit eDiscovery • Protect against fines and sanctions with a defensible in-house process • Eliminate risk of spoliation with an automated legal hold process© Copyright 2012 EMC Corporation. All rights reserved. 14
  15. 15. What is EMC Documentum IRM? IRM is a suite of products that encrypts the most popular file formats and allows decryption within the business application subject to policy verification (real-time or cached)© Copyright 2012 EMC Corporation. All rights reserved. 15
  16. 16. EMC Documentum IRM Mobile Client Use IRM Client with orwithout protected documentsOpen protected/unprotected document Open, scroll, page, or print document Log onto IRM Server (e.g. change IRM password) Access Help from IRM Client View/Respond to Messages from IRM Server/Client Open protected attachments from an email© Copyright 2012 EMC Corporation. All rights reserved. 16
  17. 17. Rights Enforcement By Policy • Who can view • From where it can be viewed (which IP address or domain) • What pages can be viewed (PDF only) • When it can be viewed • If copy or edit is allowed© Copyright 2012 EMC Corporation. All rights reserved. 17
  18. 18. Rights Enforcement By Policy • If printing is allowed • If guest access is allowed • If offline viewing is allowed • Automatic expiration • Dynamic watermarks© Copyright 2012 EMC Corporation. All rights reserved. 18
  19. 19. Unified Rights and Retention Document Generation Data values drive business rules to generate document from template Name J.Doe Age 27 Cust. No Transaction Data Document Assembly Engine • CRM • Policy origination system • Loan management system© Copyright 2012 EMC Corporation. All rights reserved. 19
  20. 20. Unified Rights and RetentionAt that time of disposition the original is deleted and so is the key to the copies Storage Policy Server Multi-Channel Delivery Generated documents Store rights Document delivered managed and archived management policies via selected channel with rights policy and encryption keys automatically assignedReview/Edit (with integrated Portal workflow) Email CD-ROM© Copyright 2012 EMC Corporation. All rights reserved. 20
  21. 21. Version Control Is CriticalDynamic policy control allows recipient entitlements changed on-the-fly when individualroles or business needs change, regardless of where the content resides APRIL APRIL MAY In April, a price list protected with IRM is downloaded by a sales person The sales person e-mails the price list to multiple customers On May 1, prices change and a new pricelist is issued At that time, rights on the old price list are revoked, affecting all copies, regardless of location© Copyright 2012 EMC Corporation. All rights reserved. 21
  22. 22. EMC DOCUMENTUMINFORMATION RIGHTSMANAGEMENTOVERVIEW PROTECT NATIVE RIGHTS ENFORCEMENT DYNAMIC AUDITING, BUSINESS BY POLICY WATERMARKING REPORTING, & INFORMATION NOTIFICATION AUTOMATIC LEVERAGING EXISTING IRM SOFTWARE OFFLINE ACCESS EXPIRATION AUTHENTICATION DEVELOPMENT KIT CONTROL INFRASTRUCTURE© Copyright 2012 EMC Corporation. All rights reserved. 22
  23. 23. So What Can We Expect Going Forward? CHOICE A mandate for both IT and software providers looking to support COMPUTING user choice BIG DATA-ENABLED Organizations leveraging Big Data will leapfrog competition by allowing processes to enable better, faster, real-time insight and PROCESS action Cloud computing simplifies provisioning resulting in further CLOUD information disaggregation. SOCIAL Work patterns get more inherently social, collaborative, insightful, PROCESS personalized, etc., in-context of the business process PERVASIVE Federated, policy-based governance will be integrated transparently GOVERNANCE into the new information fabric© Copyright 2012 EMC Corporation. All rights reserved. 23

×