As we all know the state of information protection is in dire need of change. Clearly, the information protection currently used by many organizations is not working, resulting in massive potential for identity fraud and billions of dollars in losses across the business world; and scarier yet, breaches in national security that could cost millions of lives.
2. Agenda
• Business Needs and IT Challenges
• Business Ready Security
• Information Protection
• Customer Testimonial
• The Road Ahead
• Getting Started
• Summary
3. Customer Problem and Pains
“Information Privacy is the most important security concern in the enterprise, outranking
malware in 2007 for the first time”
Personal Information Loss IP2, National Security Personal Information Loss
-Sci-tech today 06/21/07 -Sci-tech today 06/15/07 -www.privacyrights.org, August 2008
Ohio state government loses 269,000 A consultant from Los Alamos sent an A flash drive with Social Security
confidential information of taxpayers e-mail containing highly classified, numbers and other personal
and employees. See more… non-encrypted nuclear weapons to information was removed from the
several board members who unattended laptop of a state employee.
forwarded it to other members
Source: Ohio Data Loss Scope Broadens. Sci-Tech Today.com,
June 2007. http://www.sci-tech- see more…
today.com/story.xhtml?story_id=53225
Other high-profile incidents:
1. T.J.Maxx , 45Million PCI3 records stolen. Financial loss: $75M
2. Veterans Affairs, 26.5M PII1 records. Financial loss: $500M
3. Boeing, 382,000 PII1 records stolen. Financial loss: undetermined
Significant financial, business, and reputation loss due to regulatory
compliance violations and intellectual property leaks
4. Business Needs and IT Challenges
Discover and classify information Sensitive information stored
based on business importance in multiple locations
Secure sensitive information
Difficulty in discovering and
while in use, in motion,
securing information
and at rest
Enable simplified access to
Multiple locations and devices
information from anywhere
Demonstrate compliance with Easy access to sensitive
information control policies information on multiple devices
BUSINESS Needs IT Needs
Agility and Flexibility Control
5. Business Ready Security
Help securely enable business by managing risk and empowering people
Protect everywhere, Identity Simplify the security
access anywhere experience,
manage compliance
Highly Secure & Interoperable Platform
Integrate and extend
security across the
enterprise
from: to:
Block Enable
Cost Value
Siloed Seamless
6. Business Ready Security Solutions
Secure Messaging Secure Collaboration Secure Endpoint
Information Protection
Identity and Access Management
7. Information Protection
Discover, protect, and manage confidential data throughout your business with a
comprehensive solution integrated with the computing platform and applications
PROTECT everywhere INTEGRATE and SIMPLIFY security,
ACCESS anywhere EXTEND security MANAGE compliance
• Protect critical data • Extend confidential • Simplify deployment
wherever It goes communication to and ongoing
partners management
• Protect data wherever it
resides • Built into the Windows • Enable compliance with
platform and information policy
• Secure endpoints to applications
reduce risk
8. Protect Critical Information Wherever It Goes
• Automatically protect sensitive
e-mail with Active Directory
Rights Management Services
• Filter message body and subject
based on content criteria
SSN# 0000
• Policy-based restricted usage of
e-mail attachments
“
Source: Food Distributor Deploys Enterprise Rights Management to Help Protect Sensitive Data. Microsoft case study, February 2008. http://www.microsoft.com/casestudies/Case_Study_Detail.aspx?CaseStudyID=4000001482
9. Protect Information Wherever It Resides
• Automatically discover and
classify sensitive information
• Protect information based on
content, context, and identity
• Ensure only authorized usage
through persistent policies
• Restricts users from sharing
inappropriate content
“
Source: Microsoft, RSA Partner to Develop Next-Gen Data Loss Prevention. Channel Insider, December 2008. http://www.channelinsider.com/c/a/Security/Microsoft-RSA-Partner-to-Develop-NextGen-Data-Loss-Prevention/
10. Secure Endpoints to Reduce Risk
Access policy for Reduce information loss risk Classify and protect
removable media through integrated disk information with
encryption built-in AD RMS
Device Control BitLocker
“
Source: Customs Service Improves Reporting with Simplified, Integrated Antivirus Solution. Microsoft case study, April 2007. http://www.microsoft.com/casestudies/Case_Study_Detail.aspx?CaseStudyID=201402
11. Enable Secure, Seamless Access to Information
• Ability to move seamlessly between
applications
• Eliminate the need to manage external
accounts
• Simplified and flexible claims-based
federation
• Simplified partner on-boarding through
administrative tools and wizards
“
Source: Malicious insider attacks to rise. BBC News, February 2009. http://news.bbc.co.uk/2/low/technology/7875904.stm
12. Simplify Management
• Automatically apply information policies
from within Microsoft Office SharePoint®
Server and Microsoft Exchange Server
• Demonstrate compliance with logging
and auditing tools
• Simplify management by centrally
applying information protection
templates
“
Source: Food Distributor Deploys Enterprise Rights Management to Help Protect Sensitive Data. Microsoft case study, February 2008. http://www.microsoft.com/casestudies/Case_Study_Detail.aspx?CaseStudyID=4000001482
13. Current Situation
Discovery, classification, and protection of sensitive information is expensive
Sensitive information is sent via e-mail
because partners do not have access
to collaboration site
Limited to no access
Limited to no access
SSN# 0000
15. Customer Testimonial
Dow Corning uses enterprise rights management to help protect intellectual property
A global leader in silicon-based technology and innovation through a joint
venture between Corning and Dow Chemical
BUSINESS SITUATION SOLUTION BENEFITS PROVIDED
• With 4,000 patents globally, • The company deployed Active • Ease of use and management
protecting its intellectual Directory Rights Management
property (IP) is a business Services in Windows Server • Minimal additional
imperative 2008, which enables users to infrastructure and complexity
limit how others can open,
• More specifically, Dow Corning modify, print, forward, or take • Extensibility to business partners
wanted to institutionalize how it other actions with content
protected IP in a way that could • Full corporate control and
be scaled across the enterprise auditability
• Low total cost of ownership
“
Source: Dow Corning Uses Enterprise Rights Management to Help Protect Intellectual Property. Microsoft case study, February 2008. http://www.microsoft.com/casestudies/Case_Study_Detail.aspx?CaseStudyID=4000001501
16. Getting Started
Hands-on Labs and VMs
Architecture Planning and
Evaluation Guides
Design Guides
Infrastructure Planning
Proof of Concepts
Guide
Operations Guides Data Protection Using Rights
Management Services
Administrator Guides Secure Remote Application
Publishing
Troubleshooting Guides
17. The Road Ahead
Management
Management Consoles
Access Solutions
Protection &
Platform
Subject to Change
18. Information Protection
Discover, protect, and manage confidential data throughout your business with a
comprehensive solution integrated with the computing platform and applications
PROTECT everywhere INTEGRATE and SIMPLIFY security,
ACCESS anywhere EXTEND security MANAGE compliance
• Protect critical data • Extend confidential • Simplify deployment
wherever It goes communication to and ongoing
partners management
• Protect data wherever it
resides • Built into the Windows • Enable compliance with
platform and information policy
• Secure endpoints to applications
reduce risk
Learn more at: www.microsoft.com/forefront