More Related Content
Similar to GARTNER IT EXPO - Protecting Content in a Mobile & Cloud World
Similar to GARTNER IT EXPO - Protecting Content in a Mobile & Cloud World (20)
GARTNER IT EXPO - Protecting Content in a Mobile & Cloud World
- 2. © Intralinks 2014
2
Intralinks – Secure cloud content collaboration leader
Company
• Founded in 1996 by banks; currently 780 employees
• 8 year leader in Gartner Collaboration Suites Category*
• Publically traded (NYSE:IL)
• $234.5M revenue (2013)
• Has been used by 99% of the Fortune 1000
• Over $23.5T of financial transactions completed
• 3.1M paid users across 90K organizations since launch
• 35K new users per month, 68K logins per day
*Sources: Gartner, Inc., ‘Market Share: All Software Markets, Worldwide, 2013,’ March 2014, G00260918
Gartner Magic Quadrant for Enterprise File Synchronization and Sharing, 2014; July 2014, G00261766
Financials
Customer footprint
Technology platform
- 3. © Intralinks 2014
3
Business needs and new technologies are upending traditional
protection models
Historical view:
The firewall is
the perimeter
Common view:
Identity is the
new perimeter
Current reality:
Content is the
new perimeter
wherever it exists
- 4. © Intralinks 2014
How do I protect content that
is with my cloud vendor?
How do I protect content that
leaves my cloud?
- 5. © Intralinks 2014
Intralinks Customer Managed Keys (CMK)
We give enterprises sole control of their data encryption
keys so that even Intralinks can’t retrieve file contents
and provide it to a third party (e.g. subpoena)
- 6. © Intralinks 2014
“The first step of encryption is ensuring that files are encrypted in
transit, the next is that they’re encrypted at rest. But even at that
level, there’s a problem…The traditional approach is to have the
vendor manage the decryption keys. This works fine, but is a major
source of stress for those enterprises with a particular focus on
security. For those organizations, only fully customer-managed keys
will suffice. Customer Managed Keys are an important addition…to
the multi-layer key management system Intralinks has been using
with customers for years.”
6
- Ben Kepes, Contributor
Forbes.com
http://www.forbes.com/sites/benkepes/2014/09/29/intralinks-rolls-out-customer-managed-encryption-keys/
- 7. © Intralinks 2014
7
Customer Managed Keys (CMK) is a core service required for a secure
cloud content services platform infrastructure
Encryption
Secure Data Centers
Fault Tolerant
Architecture
Intrusion
Detection
Personnel
Security
Multi-Factor
Authentication
Customer
Managed Keys
Single Sign-On
Certifications
(SAS 70, SOC 2)
Secure Multi-Tenant SaaS Infrastructure
- 8. © Intralinks 2014
8
Intralinks Customer Managed Keys (CMK) Overview
Technology will give enterprises:
• Complete control over the
encryption key lifecycle
• Ability to revoke content access
without relying on Intralinks
• Ability to rotate encryption keys
without requiring re-encryption
of existing content
• Certainty that Intralinks is not
storing encryption keys
anywhere else
• Auditability of the entire key
management process
ILP CMK Service HSM Cluster
User uploads
And downloads
Files to ILP
Client services
turns on CMK
for client
services.intralinks.com
End User
Laura
Intralinks Client Services
Chris
Create, disable, and
enable keys directly
connected to HSM
Customer Key Manager
Kevin
SSH Commands
PED
HTTPS
VPN
- 9. © Intralinks 2014
Intralinks Information Rights Management (IRM)
is a subset of digital rights management (DRM),
technologies that protect sensitive information from
unauthorized access.
9
- 10. © Intralinks 2014
10
Information Rights Management (IRM) is a core service
required for cloud content lifecycle management
Information Rights
Management
Secure Multi-Tenant SaaS Infrastructure
Content
Management
File Sync & Share
Workflow Metadata
Search
Compliance
Reporting
Secure
Distribution
Core Content Services
- 11. © Intralinks 2014
11
Granular control of content at rest and in use
• Plug-in free: Share outside of enterprise
• Seamless to use: No training required
• UNshare™ that works: Apply IRM everywhere
• One key for each single file downloaded from
Intralinks platform (or API)
• Content Analytics and Audit: Visibility into how
content is used, shared, copied, printed, edited, etc.
• Control of data in use: Granular content-level
permissions including view, edit, annotate, print, open
locations (IP) and device pinning
Information Rights Management
- 12. © Intralinks 2014
Intralinks IRM as implemented within the
Intralinks VIATM Pro collaboration solution.
12
“A day in the life…” Scenario
- 13. © Intralinks 2014
Visual indicator
of IRM
protection
13
Bill Jones
Sally Smith
Ted Walters
Bill Jones
Bill Jones
Bill Jones
Bill Jones
Bill Jones
Once inside an Intralinks VIA Pro
Workspace users can quickly determine
whether or not IRM protection is enabled.
- 15. © Intralinks 2014
15
Bill Jones
Bill Jones
Bill Jones
Jones
Ted Walters
With just two clicks users can
quickly enable IRM for all
documents in the Workspace.
- 16. © Intralinks 2014
Bill Jones
Sally Smith
Bill Jones
Ted Walters
Bill Jones
Bill Jones
Bill Jones
Bill Jones
16
Visual indicator
of IRM
protection
Visual indicators now extend to the
documents themselves highlighting
the enhanced protection for users.
- 17. © Intralinks 2014
17
Bill Jones
Bill Jones
Jones
With the Workspace and its
documents now secure, and the
added confidence that the protection
travel with the file itself, the user can
invite external collaborators.
- 18. © Intralinks 2014
18
Bill Jones
Sally Smith
Ted WaltersBill Jones
Bill Jones
Bill Jones
Bill Jones
Bill Jones
When a user opens an IRM protected
document Intralinks VIA Pro will simply
download and open it in its native
authoring application.
- 19. © Intralinks 2014
Indication of Intralinks
protected document
within the native
authoring application.
No cumbersome plug-in’s or configuration
is required by the end user, the document
is opened and the user notified that it is
protected.
19
- 21. © Intralinks 2014
21
CMK and IRM now available with Intralinks VIATM:
Securely sync, share, collaborate … and manage your business content
With Intralinks VIA™,
users can sync, share,
and collaborate on
business content to get
work done while
enterprises can manage
that content to protect IP
and meet compliance
- 22. © Intralinks 2014
For more information:
Sri Chilukuri
VP Product Marketing
schilukuri@intralinks.com
Intralinks.com