Access Protected Content                                     Anytime, from Anywhere                                     IN...
Complicating Factors For ITTHREE DIMENSIONAL                            DATA CENTERS UNIFY,       EXPANDING          CHOIC...
Complicating Factors For IT                                     CLOUD                     CAN ADD COMPLEXITY© Copyright 20...
In The News© Copyright 2012 EMC Corporation. All rights reserved.   4
Secure Content – Important Than Ever                                                         Value continues to migrate   ...
Secure Content – Important Than Ever                                                         Verizons Data Breach Investig...
Focus On GovernanceDigital data is                  Business value              Sharing       Social networking   Risk of ...
THE FIRST STEP    ENTERPRISE                                           EXTENDED   PERVASIVE       Understand              ...
Unified and simple                                                         eDiscovery, content                            ...
Pervasive Governance Requirements     UNDERSTAND                                              AUTOMATE    YOUR CONTENT    ...
Pieces of the Compliance Portfolio                                                • Search on external content            ...
What Problems IRM Can Solve?                                                         •Even a Secure ECM Repository is not ...
IRM – Like Having Remote Control                                        EMC IRM is equivalent to having a remote          ...
Security is Focused on the Perimeter                        Anti-virus                                                  Th...
Secure Repository does not Address theEntire Problem     You secure your content at rest…                              You...
Content is Constantly Copied                                                                 Document Generation          ...
Content is Constantly CopiedIn a recent survey, 49 percent of the respondents said that they werent sure or did notbelieve...
What is EMC Documentum IRM                                        IRM is a suite of products that encrypts                ...
Who Needs Protection?Secure Data Sharing                                                         Legal departments need to...
Who Needs Protection?Secure Data Sharing                                                         Product groups need to   ...
Who Needs Protection?Secure Data Sharing                                                         Finance needs to limit ac...
Who Needs Protection?Secure Data Sharing                                                         Sales & Marketing need to...
Who Needs Protection?Secure Data Sharing                                                         Board Members want to kee...
Who Needs Protection?Secure Data Sharing                                                 ENTERPRISE© Copyright 2012 EMC Co...
IRM Product Suite                                                                       Other                             ...
Unified Rights and Retention                                                                 Document Generation          ...
Unified Rights and RetentionAt that time of disposition the original is deleted and so is the key to the copies           ...
Version Control Is CriticalDynamic policy control allows recipient entitlements changed on-the-fly when individualroles or...
EMC DOCUMENTUMINFORMATION RIGHTSMANAGEMENTWHAT’S NEW  SECURE ACCESS VIA  IPAD & IPHONE© Copyright 2012 EMC Corporation. Al...
Secure Access via iPad & iPhone                                                                              Partner      ...
EMC Documentum IRM Mobile Client   Use IRM Client with orwithout protected documentsOpen protected/unprotected        docu...
EMC DOCUMENTUMINFORMATION RIGHTSMANAGEMENTWHAT’S NEW                                             APPLY USAGE  SECURE ACCES...
Apply Usage Controls Seamlessly                                                                          Print            ...
EMC DOCUMENTUMINFORMATION RIGHTSMANAGEMENTWHAT’S NEW                                             APPLY USAGE  SECURE ACCES...
Easily Request Additional Controls                                                   Full Content Author Collaboration    ...
EMC DOCUMENTUMINFORMATION RIGHTSMANAGEMENTOVERVIEW  PROTECT NATIVE  BUSINESS  INFORMATION© Copyright 2012 EMC Corporation....
Protect Native Business Information© Copyright 2012 EMC Corporation. All rights reserved.   37
Protect Native Business Information                                                         • Clients for major business  ...
EMC DOCUMENTUMINFORMATION RIGHTSMANAGEMENTOVERVIEW  PROTECT NATIVE                             RIGHTS ENFORCEMENT  BUSINES...
Rights Enforcement by Policy                                                         •   Who can view                     ...
Rights Enforcement by Policy                                                         •   If printing is allowed           ...
Rights Enforcement by Policy                                                         • Choose rights enforcement with     ...
EMC DOCUMENTUMINFORMATION RIGHTSMANAGEMENTOVERVIEW  PROTECT NATIVE                             RIGHTS ENFORCEMENT   DYNAMI...
Dynamic Watermarking                                                         • Dynamic watermarking provide visible indica...
EMC DOCUMENTUMINFORMATION RIGHTSMANAGEMENTOVERVIEW  PROTECT NATIVE                             RIGHTS ENFORCEMENT   DYNAMI...
Auditing, Reporting, & Notification                                                         IRM provides granular audit tr...
EMC DOCUMENTUMINFORMATION RIGHTSMANAGEMENTOVERVIEW  PROTECT NATIVE                             RIGHTS ENFORCEMENT   DYNAMI...
Offline Access                                                         Dynamic policies require a policy                  ...
EMC DOCUMENTUMINFORMATION RIGHTSMANAGEMENTOVERVIEW  PROTECT NATIVE                             RIGHTS ENFORCEMENT   DYNAMI...
Automatic Expiration Control                                                         Enforce version control and          ...
EMC DOCUMENTUMINFORMATION RIGHTSMANAGEMENTOVERVIEW  PROTECT NATIVE                             RIGHTS ENFORCEMENT   DYNAMI...
Leverage Existing AuthenticationInfrastructure                                                         Leverages an organi...
EMC DOCUMENTUMINFORMATION RIGHTSMANAGEMENTOVERVIEW  PROTECT NATIVE                             RIGHTS ENFORCEMENT   DYNAMI...
IRM Software Development Kit (SDK)                                                         APIs and documentation that ena...
Additional Resources –                               Pervasive Governance Community on ECN                               ...
IRM Overview Presentation
Upcoming SlideShare
Loading in …5
×

IRM Overview Presentation

2,867 views

Published on

See how you can control, track, and secure sensitive content wherever it resides, regardless of location, even beyond the enterprise’s firewalls.

Published in: Technology
0 Comments
4 Likes
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total views
2,867
On SlideShare
0
From Embeds
0
Number of Embeds
3
Actions
Shares
0
Downloads
122
Comments
0
Likes
4
Embeds 0
No embeds

No notes for slide

IRM Overview Presentation

  1. 1. Access Protected Content Anytime, from Anywhere INTRODUCING EMC DOCUMENTUM INFORMATION RIGHTS MANAGEMENT 5.1© Copyright 2012 EMC Corporation. All rights reserved. 1
  2. 2. Complicating Factors For ITTHREE DIMENSIONAL DATA CENTERS UNIFY, EXPANDING CHOICE INFORMATION BUT DATA REGULATORY COMPUTING GROWTH DISAGGREGATES REQUIRMENTS Data Centers • Amount • Regulations, • Mobile • Richness Standards, Acts… • 7x24 • Dispersion • Digital • Distributed Data • Global© Copyright 2012 EMC Corporation. All rights reserved. 2
  3. 3. Complicating Factors For IT CLOUD CAN ADD COMPLEXITY© Copyright 2012 EMC Corporation. All rights reserved. 3
  4. 4. In The News© Copyright 2012 EMC Corporation. All rights reserved. 4
  5. 5. Secure Content – Important Than Ever Value continues to migrate online, and digital data have become more pervasive* Corporations are expected to be more “open” and supply chains increasingly interconnected * Malevolent individuals are becoming uber-sophisticated* *McKinsey Quarterly – June 2011© Copyright 2012 EMC Corporation. All rights reserved. 5
  6. 6. Secure Content – Important Than Ever Verizons Data Breach Investigations Report – 2010 *McKinsey Quarterly – June 2011© Copyright 2012 EMC Corporation. All rights reserved. 6
  7. 7. Focus On GovernanceDigital data is Business value Sharing Social networking Risk of security growing & & risk is often information & mobile access breach or datamoving beyond unknown & with partners & is prevalent loss is growingthe enterprise unmanaged suppliers is routine© Copyright 2012 EMC Corporation. All rights reserved. 7
  8. 8. THE FIRST STEP ENTERPRISE EXTENDED PERVASIVE Understand Audit Centralize Automate Policy Track Embed Protect Control Federate© Copyright 2012 EMC Corporation. All rights reserved. 2011 8
  9. 9. Unified and simple eDiscovery, content management and federated compliance solutions PERVASIVE GOVERNANCE PERVASIVE© Copyright 2012 EMC Corporation. All rights reserved. 9
  10. 10. Pervasive Governance Requirements UNDERSTAND AUTOMATE YOUR CONTENT & ENFORCE POLICIES Value & Risk Prove Compliance DISCOVER PROTECT & PRODUCE & CONTROL Early Case Assessment On & Off Premise© Copyright 2012 EMC Corporation. All rights reserved. 10
  11. 11. Pieces of the Compliance Portfolio • Search on external content File • Determine what resides externally and what can be moved within Intelligence • Link with CIS and RPS once content is moved within • Retention policies applied at container level Retention Policy • Multiple policy reconciliation and disposition Services • Seamless to the end user • 5015.2 Compliant Records Management Records • Adherence to corporate file plans and policies RM Management • Integrations with common business apps Trusted Content • Secure connections within the Documentum platform TCS Services • Encryption of underlying file stores • FIPS and other government standards Information Rights • Secure the integrity of content outside the repository IRM Management • Integration with common business authoring applications • Works stand-alone or integrated with Documentum repository security eDiscovery • Conduct Early Assessment to quickly gain insight into case merit • Protect against fines and sanctions with a defensible in-house process • Eliminate risk of spoiliation with an automated legal hold process© Copyright 2012 EMC Corporation. All rights reserved. 11
  12. 12. What Problems IRM Can Solve? •Even a Secure ECM Repository is not sufficient for Security Beyond the some content, when it leaves the repository for Repository viewing or editing •At that point object level security is required •Retention manages the original object however Ensure Retention & copies are not under retention Disposition •Object level security ensures that retention can be applied to copies of Records •How do you enable version control outside a Location- repository? Independent •Object level security provides the ability to disable access to older versions of content as Version Control required© Copyright 2012 EMC Corporation. All rights reserved. 12
  13. 13. IRM – Like Having Remote Control EMC IRM is equivalent to having a remote control for your confidential information EMC IRM allows instant response to events and changing security conditions: • Employee changes • Changing partner relationships and roles • True version control • Loss of laptops and storage media • Instant expiration control© Copyright 2012 EMC Corporation. All rights reserved. 13
  14. 14. Security is Focused on the Perimeter Anti-virus Threat Change/Patch Detection Management VPN Servers Firewall Clients LAN SAN Authentication Web Filtering Anti-virus Information security products don’t actually secure information Anti-spyware • They protect information containers, repositories, networks, laptops, and servers • They do little to protect confidentiality and integrity of information© Copyright 2012 EMC Corporation. All rights reserved. 14
  15. 15. Secure Repository does not Address theEntire Problem You secure your content at rest… You ensure only certain people can access the content… This is where IRM is neededBut once an authorized user opens the content,they are free to do whatever they want with it!© Copyright 2012 EMC Corporation. All rights reserved. 15
  16. 16. Content is Constantly Copied Document Generation Data values drive business rules to generate document from template Name J.Doe Age 27 Cust. No Transaction Data Document Assembly Engine • CRM • Policy origination system • Loan management system© Copyright 2012 EMC Corporation. All rights reserved. 16
  17. 17. Content is Constantly CopiedIn a recent survey, 49 percent of the respondents said that they werent sure or did notbelieve that their organization consistently deleted all data inclusive of any copies whenit was no longer needed for compliance, legal or business purposes. Storage Policy Server Multi-Channel Delivery Generated documents Store rights Document delivered managed and archived management policies via selected channel with rights policy and encryption keys automatically assignedReview/Edit (with integrated At time of disposition only Portal Email workflow) the original is deleted. CD-ROM© Copyright 2012 EMC Corporation. All rights reserved. 17
  18. 18. What is EMC Documentum IRM IRM is a suite of products that encrypts the most popular file formats and allows decryption within the business application subject to policy verification (real-time or cached)© Copyright 2012 EMC Corporation. All rights reserved. 18
  19. 19. Who Needs Protection?Secure Data Sharing Legal departments need to maintain confidentiality of legal matters© Copyright 2012 EMC Corporation. All rights reserved. 19
  20. 20. Who Needs Protection?Secure Data Sharing Product groups need to collaborate without their IP leaking into the public domain© Copyright 2012 EMC Corporation. All rights reserved. 20
  21. 21. Who Needs Protection?Secure Data Sharing Finance needs to limit access to financial documents to insiders© Copyright 2012 EMC Corporation. All rights reserved. 21
  22. 22. Who Needs Protection?Secure Data Sharing Sales & Marketing need to keep price lists and contracts current for their customers© Copyright 2012 EMC Corporation. All rights reserved. 22
  23. 23. Who Needs Protection?Secure Data Sharing Board Members want to keep board communications confidential© Copyright 2012 EMC Corporation. All rights reserved. 23
  24. 24. Who Needs Protection?Secure Data Sharing ENTERPRISE© Copyright 2012 EMC Corporation. All rights reserved. 24
  25. 25. IRM Product Suite Other Systems Documentum eRoom A/X© Copyright 2012 EMC Corporation. All rights reserved. 25
  26. 26. Unified Rights and Retention Document Generation Data values drive business rules to generate document from template Name J.Doe Age 27 Cust. No Transaction Data Document Assembly Engine • CRM • Policy origination system • Loan management system© Copyright 2012 EMC Corporation. All rights reserved. 26
  27. 27. Unified Rights and RetentionAt that time of disposition the original is deleted and so is the key to the copies Storage Policy Server Multi-Channel Delivery Generated documents Store rights Document delivered managed and archived management policies via selected channel with rights policy and encryption keys automatically assignedReview/Edit (with integrated Portal workflow) Email CD-ROM© Copyright 2012 EMC Corporation. All rights reserved. 27
  28. 28. Version Control Is CriticalDynamic policy control allows recipient entitlements changed on-the-fly when individualroles or business needs change, regardless of where the content resides APRIL APRIL MAY In April, a price list protected with IRM is downloaded by a sales person The sales person e-mails the price list to multiple customers On May 1, prices change and a new pricelist is issued At that time, rights on the old price list are revoked, affecting all copies, regardless of location© Copyright 2012 EMC Corporation. All rights reserved. 28
  29. 29. EMC DOCUMENTUMINFORMATION RIGHTSMANAGEMENTWHAT’S NEW SECURE ACCESS VIA IPAD & IPHONE© Copyright 2012 EMC Corporation. All rights reserved. 29
  30. 30. Secure Access via iPad & iPhone Partner IRM Policy Server Network Corporate VPN Partner Author Network LAN Internet Mobile Client Content Server User Expedite business processing via secure mobile access© Copyright 2012 EMC Corporation. All rights reserved. 30
  31. 31. EMC Documentum IRM Mobile Client Use IRM Client with orwithout protected documentsOpen protected/unprotected document Open, scroll, page, or print document Log onto IRM Server (e.g. change IRM password) Access Help from IRM Client View/Respond to Messages from IRM Server/Client Open protected attachments from an email© Copyright 2012 EMC Corporation. All rights reserved. 31
  32. 32. EMC DOCUMENTUMINFORMATION RIGHTSMANAGEMENTWHAT’S NEW APPLY USAGE SECURE ACCESS VIA CONTROLS IPAD & IPHONE SEAMLESSLY© Copyright 2012 EMC Corporation. All rights reserved. 32
  33. 33. Apply Usage Controls Seamlessly Print Copy Print IRM Policy Server Save Mobile Client EMC.COM Client Plug-in Mobile App Redirects Redirects Automatic redirects to instantly apply controls© Copyright 2012 EMC Corporation. All rights reserved. 33
  34. 34. EMC DOCUMENTUMINFORMATION RIGHTSMANAGEMENTWHAT’S NEW APPLY USAGE SECURE ACCESS VIA EASILY REQUEST CONTROLS IPAD & IPHONE ADDITIONAL CONTROLS SEAMLESSLY© Copyright 2012 EMC Corporation. All rights reserved. 34
  35. 35. Easily Request Additional Controls Full Content Author Collaboration Print Print Modify Control & Permissions Copy Save Swift turn-around with requested access & control changes© Copyright 2012 EMC Corporation. All rights reserved. 35
  36. 36. EMC DOCUMENTUMINFORMATION RIGHTSMANAGEMENTOVERVIEW PROTECT NATIVE BUSINESS INFORMATION© Copyright 2012 EMC Corporation. All rights reserved. 36
  37. 37. Protect Native Business Information© Copyright 2012 EMC Corporation. All rights reserved. 37
  38. 38. Protect Native Business Information • Clients for major business applications • Other formats can be protected using the IRM SDK • Works within native application • Allows secure sharing of sensitive documents with users© Copyright 2012 EMC Corporation. All rights reserved. 38
  39. 39. EMC DOCUMENTUMINFORMATION RIGHTSMANAGEMENTOVERVIEW PROTECT NATIVE RIGHTS ENFORCEMENT BUSINESS BY POLICY INFORMATION© Copyright 2012 EMC Corporation. All rights reserved. 39
  40. 40. Rights Enforcement by Policy • Who can view • From where it can viewed • What pages can be viewed • When it can viewed • If copy or edit is allowed© Copyright 2012 EMC Corporation. All rights reserved. 40
  41. 41. Rights Enforcement by Policy • If printing is allowed • If guest access is allowed • If offline viewing is allowed • Automatic expiration • Dynamic watermarks© Copyright 2012 EMC Corporation. All rights reserved. 41
  42. 42. Rights Enforcement by Policy • Choose rights enforcement with administratively-defined templates or ad-hoc policies • Flexibility supports organizational rollout • Allows for workgroup and enterprise-wide applications • Administrator configured options for allowing custom policies© Copyright 2012 EMC Corporation. All rights reserved. 42
  43. 43. EMC DOCUMENTUMINFORMATION RIGHTSMANAGEMENTOVERVIEW PROTECT NATIVE RIGHTS ENFORCEMENT DYNAMIC BUSINESS BY POLICY WATERMARKING INFORMATION© Copyright 2012 EMC Corporation. All rights reserved. 43
  44. 44. Dynamic Watermarking • Dynamic watermarking provide visible indication of who printed a copy and when they printed it • Used for compliance and editing • Provide watermarks while viewing and/or printing • Watermarks are customizable • Watermarks support Unicode • Watermarks can use LDAP attributes • On-screen watermarks safeguard against image being photographed with a digital era (PDF only)© Copyright 2012 EMC Corporation. All rights reserved. 44
  45. 45. EMC DOCUMENTUMINFORMATION RIGHTSMANAGEMENTOVERVIEW PROTECT NATIVE RIGHTS ENFORCEMENT DYNAMIC AUDITING, BUSINESS BY POLICY WATERMARKING REPORTING, & INFORMATION NOTIFICATION© Copyright 2012 EMC Corporation. All rights reserved. 45
  46. 46. Auditing, Reporting, & Notification IRM provides granular audit trail of what recipients did - See who did what, when Delivers on-going assurance of policy compliance; Auditing is continuous, whether online or offline Leverage XML logging standards for reporting on audit trail - Email, audio and SNMP trap notifications on events© Copyright 2012 EMC Corporation. All rights reserved. 46
  47. 47. EMC DOCUMENTUMINFORMATION RIGHTSMANAGEMENTOVERVIEW PROTECT NATIVE RIGHTS ENFORCEMENT DYNAMIC AUDITING, BUSINESS BY POLICY WATERMARKING REPORTING, & INFORMATION NOTIFICATION OFFLINE ACCESS© Copyright 2012 EMC Corporation. All rights reserved. 47
  48. 48. Offline Access Dynamic policies require a policy server, and that requires a network connection Documentum IRM allows users to view/edit a document offline for a period of time—policies may allow offline usage for a set period of time The audit logs are fully maintained during offline usage to ensure a contiguous audit trail© Copyright 2012 EMC Corporation. All rights reserved. 48
  49. 49. EMC DOCUMENTUMINFORMATION RIGHTSMANAGEMENTOVERVIEW PROTECT NATIVE RIGHTS ENFORCEMENT DYNAMIC AUDITING, BUSINESS BY POLICY WATERMARKING REPORTING, & INFORMATION NOTIFICATION AUTOMATIC OFFLINE ACCESS EXPIRATION CONTROL© Copyright 2012 EMC Corporation. All rights reserved. 49
  50. 50. Automatic Expiration Control Enforce version control and document retention policies Access can be revoked no matter where files reside Example: A monthly price list can be set to automatically revoke all rights at the end of the month© Copyright 2012 EMC Corporation. All rights reserved. 50
  51. 51. EMC DOCUMENTUMINFORMATION RIGHTSMANAGEMENTOVERVIEW PROTECT NATIVE RIGHTS ENFORCEMENT DYNAMIC AUDITING, BUSINESS BY POLICY WATERMARKING REPORTING, & INFORMATION NOTIFICATION AUTOMATIC LEVERAGING EXISTING OFFLINE ACCESS EXPIRATION AUTHENTICATION CONTROL INFRASTRUCTURE© Copyright 2012 EMC Corporation. All rights reserved. 51
  52. 52. Leverage Existing AuthenticationInfrastructure Leverages an organizations exiting authentication security infrastructure Minimizes impact to administration of E-DRM policies and speeds deployments IRM participates in Documentum’s open authentication framework© Copyright 2012 EMC Corporation. All rights reserved. 52
  53. 53. EMC DOCUMENTUMINFORMATION RIGHTSMANAGEMENTOVERVIEW PROTECT NATIVE RIGHTS ENFORCEMENT DYNAMIC AUDITING, BUSINESS BY POLICY WATERMARKING REPORTING, & INFORMATION NOTIFICATION AUTOMATIC LEVERAGING EXISTING IRM SOFTWARE OFFLINE ACCESS EXPIRATION AUTHENTICATION DEVELOPMENT KIT CONTROL INFRASTRUCTURE© Copyright 2012 EMC Corporation. All rights reserved. 53
  54. 54. IRM Software Development Kit (SDK) APIs and documentation that enable the augmentation and extension of the EMC Documentum IRM Available for free download from the EMC Developer Network Helps integrating Documentum IRM with custom or third-party applications© Copyright 2012 EMC Corporation. All rights reserved. 54
  55. 55. Additional Resources –  Pervasive Governance Community on ECN – https://community.emc.com/docs/DOC-18052 – Vanity URL: www.emc.com/pg-ecn  IRM Community Site on ECN – https://community.emc.com/docs/DOC-3503  Powerlink (http://powerlink.emc.com/km/appmanager/km/s ecureDesktop) – Home > Products > Software D > Documentum Information Rights Management >  Marketing Contact – Raul Gabriel (raul.gabriel@emc.com)© Copyright 2012 EMC Corporation. All rights reserved. 55

×