• Share
  • Email
  • Embed
  • Like
  • Save
  • Private Content
Vishal Gupta - Information Rights Management - Interop Mumbai 2009
 

Vishal Gupta - Information Rights Management - Interop Mumbai 2009

on

  • 1,781 views

In a world of borderless organizations, how can organizations ensure security or confidentiality of information? This session will explore the potential and significance of Information Rights ...

In a world of borderless organizations, how can organizations ensure security or confidentiality of information? This session will explore the potential and significance of Information Rights Management (IRM), and explain how IRM can be used effectively to maintain security and integrity in an environment of changing business relationships. Gupta will also show how encryption technologies can be extended to secure information during the lifecycle of create-store-transmit-collaborate-use-archive-backup-delete.

Statistics

Views

Total Views
1,781
Views on SlideShare
1,771
Embed Views
10

Actions

Likes
1
Downloads
30
Comments
0

6 Embeds 10

http://www.crn.in 5
http://www.informationweek.in 1
http://informationweek.in 1
http://www.slideshare.net 1
http://www.banktechindia.com 1
http://www.slideee.com 1

Accessibility

Categories

Upload Details

Uploaded via as Adobe PDF

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

    Vishal Gupta - Information Rights Management - Interop Mumbai 2009 Vishal Gupta - Information Rights Management - Interop Mumbai 2009 Presentation Transcript

    • Information Rights Management Coming of age Presentation at InterOp 2009, Mumbai Vishal Gupta CEO, Seclore
    • Information exchange in the collaborative world WhatInformationaninformation shared withEmployees lost by organisation happens if is exchanged between & vendors of the join a competitor ? Information is exchanged between employees a vendor is & employees & customers What happens if employee with privileged access leaves to the vendor ? VENDORS CUSTOMERS Enterprise Firewalls Competitors TELEMARKETER VPN SSL UTM …
    • Underlying Issues Share it = It becomes his (also) Ownership and usage cannot be separated Shared once = Shared forever Impossible to “recall” information Out of the enterprise = Free for all Technology & processes are only applicable within
    • The Result Information lands up in public websites !
    • Information lifecycle … Create Store Transmit & collaborate Use Archive & Backup Delete Desktops Shared Desktops folders Removable media Laptops Content Backup Management Laptops Remote Document Mobile Email retention desktops devices Instant Mobile Archive Messaging Online devices Removable workspaces media Security DLP Anti-virus Anti-… SSL UTM IDM DLP Vaults Digital shredders Hard disk encryption Application security Heterogeneous policies … Heterogeneous infrastructure
    • Options for securing unstructured information Option 1 : Control Distribution ... Security Collaboration
    • Options for securing unstructured information Option 2 : Control Usage ... Security Collaboration
    • Information Rights Management Rights management technologies allow enterprises to define and implement information usage “policies”. A “policy” defines : • WHO can use the information People & groups within and outside of the organization can be defined as rightful users of the information • WHAT can each person do Individual actions like reading, editing, printing, distributing, copy-pasting, screen grabbing etc. can be controlled • WHEN can he use it Information usage can be time based e.g. can only be used by Mr. A till 28th Sept OR only for the 2 days • WHERE can he use it from Information can be linked to locations e.g. only 3rd floor office by private/public IP addresses
    • Information Rights Management Policies are • Persistent : Policies are implemented on information and all its copies wherever they are transmitted or stored • Dynamic : Policies can be changed without having access to or redistributing the information • Monitored : Policy changes can be monitored User actions are • Monitored : Individual actions ( authorized AND unauthorized ) like viewing, editing, printing etc. are monitored and centrally available in a reporting tool
    • Scenario: Research reports & drawings WHO WHAT WHEN WHERE Read Edit Print Distribute Sanjiv Yes Yes No No Till the time of Within office employment network Rahul Yes No No No 30th November Within office 2009 network Rahul a tion ani z org Sanjiv
    • About Seclore is a high growth information security product company focussed on providing Security without compromising collaboration Seclore’s flagship product Seclore FileSecure is used by More than 1 million users & some of the largest enterprises