Your SlideShare is downloading. ×
0
Protect your online with IRMS
Protect your online with IRMS
Protect your online with IRMS
Protect your online with IRMS
Protect your online with IRMS
Protect your online with IRMS
Protect your online with IRMS
Protect your online with IRMS
Protect your online with IRMS
Protect your online with IRMS
Protect your online with IRMS
Protect your online with IRMS
Protect your online with IRMS
Protect your online with IRMS
Protect your online with IRMS
Protect your online with IRMS
Protect your online with IRMS
Protect your online with IRMS
Protect your online with IRMS
Protect your online with IRMS
Protect your online with IRMS
Protect your online with IRMS
Protect your online with IRMS
Protect your online with IRMS
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

Protect your online with IRMS

729

Published on

Published in: Technology, Business
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
729
On Slideshare
0
From Embeds
0
Number of Embeds
2
Actions
Shares
0
Downloads
12
Comments
0
Likes
0
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide
  • Template may not be modified Twitter hashtag: #spsbe for all sessions
  • Transcript

    • 1. Protect your online data with IRMS #SPSBE20 Jethro Seghers April 26th, 2014
    • 2. Thanks to our sponsors! Gold Silver
    • 3. • Data Security? Why? What? • How does IRMS fit in this story • Demos • Q&A Agenda
    • 4. What is Data Security ?
    • 5. The protection of data from • Unauthorized (accidental or intentional) • Modification • Destruction • Disclosure Data Security
    • 6. Some numbers
    • 7. Authorisation
    • 8. Authorisation -> Increase
    • 9. Modification
    • 10. Destruction
    • 11. Disclosure
    • 12. Data Loss Prevention
    • 13. Information Rights Management
    • 14. How does this look in Exchange/Online
    • 15. How does this look for recipient
    • 16. What about SharePoint/Online
    • 17. What needs to be done for SPO
    • 18. Caveats
    • 19. External? https://portal.aadrm.com/
    • 20. Thank you!

    ×