<ul><li>Presented By: Peter Ward </li></ul><ul><li>June 26th, 2008  </li></ul>Information  Theft Document  Encryption Work...
<ul><li>Thank you for attending this web X </li></ul><ul><li>The conference call dial in will be put on  mute for the pres...
<ul><li>Information theft – How much of it really goes on </li></ul><ul><li>Document Encryption- Rights Information Manage...
<ul><li>U.S. companies lost $133 billion as a result of proprietary information theft in 2005, up from $59 billion in 2002...
<ul><li>Microsoft Rights Management Server </li></ul><ul><ul><li>Part of Windows Server 2003 </li></ul></ul><ul><ul><li>Wo...
<ul><li>Read/Edit </li></ul><ul><li>Stop deletion of documents </li></ul><ul><li>Copying of content </li></ul><ul><li>Prin...
<ul><li>IRM – Information Rights Management; term that refers to the abstract management of digital assets that are rights...
<ul><li>RMS is not a  ‘have a go’  technology  </li></ul><ul><li>You have to deploy it right the first time </li></ul><ul>...
Peter Ward Business Collaboration Manager E:  [email_address] P:  212-502-3937 W:  www.InterDynAKA.com B:  www.wardpeter.com
Upcoming SlideShare
Loading in …5
×

Microsoft Rights Management

1,986 views

Published on

Microsoft Rights Management

Published in: Technology
0 Comments
1 Like
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total views
1,986
On SlideShare
0
From Embeds
0
Number of Embeds
24
Actions
Shares
0
Downloads
0
Comments
0
Likes
1
Embeds 0
No embeds

No notes for slide

Microsoft Rights Management

  1. 1. <ul><li>Presented By: Peter Ward </li></ul><ul><li>June 26th, 2008 </li></ul>Information Theft Document Encryption Workflow Templates IRM Electronic Signature RMS Encryption
  2. 2. <ul><li>Thank you for attending this web X </li></ul><ul><li>The conference call dial in will be put on mute for the presentation </li></ul><ul><li>Q&A – We will have time at the end of the presentation for questions </li></ul><ul><li>A copy of the presentation is on my blog: www.wardpeter.com </li></ul>
  3. 3. <ul><li>Information theft – How much of it really goes on </li></ul><ul><li>Document Encryption- Rights Information Management </li></ul><ul><li>Reduce risks of spoliation, theft, and advanced security controls </li></ul><ul><li>Work with client installation and activation </li></ul><ul><li>Protection and consumption of data. </li></ul><ul><li>IRM vs RMS </li></ul><ul><li>Session Review </li></ul>
  4. 4. <ul><li>U.S. companies lost $133 billion as a result of proprietary information theft in 2005, up from $59 billion in 2002. CSI/FBI 2005 Computer Crime and Security Survey </li></ul><ul><li>None of the legacy security technologies solves the specific problem posed by unstructured data. CIO/Insight </li></ul><ul><li>Enterprise rights management will become the default approach used by organizations to managing access control policies and security for data at rest and in transit. Gartner Group </li></ul>How much is this data really worth to the company?
  5. 5. <ul><li>Microsoft Rights Management Server </li></ul><ul><ul><li>Part of Windows Server 2003 </li></ul></ul><ul><ul><li>Works with Active Directory </li></ul></ul><ul><ul><li>Encrypts documents </li></ul></ul><ul><li>End Users </li></ul><ul><ul><li>Office Professional 2003, or Professional Plus 2007, not standard, or anything else. </li></ul></ul><ul><ul><li>RMS client installed </li></ul></ul><ul><ul><li>Only Office documents, not PDF docs </li></ul></ul>
  6. 6. <ul><li>Read/Edit </li></ul><ul><li>Stop deletion of documents </li></ul><ul><li>Copying of content </li></ul><ul><li>Print screen </li></ul><ul><li>Log all activity </li></ul>
  7. 7. <ul><li>IRM – Information Rights Management; term that refers to the abstract management of digital assets that are rights-protected (managerial term). </li></ul><ul><li>RMS – Rights Management Services; term that refers to Microsoft’s technical implementation of IRM (technical term). </li></ul>
  8. 8. <ul><li>RMS is not a ‘have a go’ technology </li></ul><ul><li>You have to deploy it right the first time </li></ul><ul><li>Should consider the following: </li></ul><ul><ul><li>Recovery procedures </li></ul></ul><ul><ul><li>End user training </li></ul></ul><ul><ul><li>Templates and right management </li></ul></ul><ul><ul><li>Know what you want in terms of security. </li></ul></ul><ul><li>This is only part of the security solution </li></ul><ul><li>Ask yourself ‘How valuable is your data when it’s in the wrong hands?’ </li></ul>
  9. 9. Peter Ward Business Collaboration Manager E: [email_address] P: 212-502-3937 W: www.InterDynAKA.com B: www.wardpeter.com

×