SlideShare a Scribd company logo
1 of 22
Download to read offline
© Intralinks 2014
1
Sri Chilukuri, VP Product Marketing
© Intralinks 2014
2
Intralinks – Secure cloud content collaboration leader
Company
•  Founded in 1996 by banks; currently 780 employees
•  8 year leader in Gartner Collaboration Suites Category*
•  Publically traded (NYSE:IL)
•  $234.5M revenue (2013)
•  Has been used by 99% of the Fortune 1000
•  Over $23.5T of financial transactions completed
•  3.1M paid users across 90K organizations since launch
•  35K new users per month, 68K logins per day
*Sources: Gartner, Inc., ‘Market Share: All Software Markets, Worldwide, 2013,’ March 2014, G00260918
Gartner Magic Quadrant for Enterprise File Synchronization and Sharing, 2014; July 2014, G00261766
Financials
Customer footprint
Technology platform
© Intralinks 2014
3
Business needs and new technologies are upending traditional
protection models
Historical view:
The firewall is
the perimeter
Common view:
Identity is the
new perimeter
Current reality:
Content is the
new perimeter
wherever it exists
© Intralinks 2014
How do I protect content that
is with my cloud vendor?
How do I protect content that
leaves my cloud?
© Intralinks 2014
Intralinks Customer Managed Keys (CMK)
We give enterprises sole control of their data encryption
keys so that even Intralinks can’t retrieve file contents
and provide it to a third party (e.g. subpoena)
© Intralinks 2014
“The first step of encryption is ensuring that files are encrypted in
transit, the next is that they’re encrypted at rest. But even at that
level, there’s a problem…The traditional approach is to have the
vendor manage the decryption keys. This works fine, but is a major
source of stress for those enterprises with a particular focus on
security. For those organizations, only fully customer-managed keys
will suffice. Customer Managed Keys are an important addition…to
the multi-layer key management system Intralinks has been using
with customers for years.”
6
- Ben Kepes, Contributor
Forbes.com
http://www.forbes.com/sites/benkepes/2014/09/29/intralinks-rolls-out-customer-managed-encryption-keys/
© Intralinks 2014
7
Customer Managed Keys (CMK) is a core service required for a secure
cloud content services platform infrastructure
Encryption
Secure Data Centers
Fault Tolerant
Architecture
Intrusion
Detection
Personnel
Security
Multi-Factor
Authentication
Customer
Managed Keys
Single Sign-On
Certifications
(SAS 70, SOC 2)
Secure Multi-Tenant SaaS Infrastructure
© Intralinks 2014
8
Intralinks Customer Managed Keys (CMK) Overview
Technology will give enterprises:
•  Complete control over the
encryption key lifecycle
•  Ability to revoke content access
without relying on Intralinks
•  Ability to rotate encryption keys
without requiring re-encryption
of existing content
•  Certainty that Intralinks is not
storing encryption keys
anywhere else
•  Auditability of the entire key
management process
ILP CMK Service HSM Cluster
User uploads
And downloads
Files to ILP
Client services
turns on CMK
for client
services.intralinks.com
End User
Laura
Intralinks Client Services
Chris
Create, disable, and
enable keys directly
connected to HSM
Customer Key Manager
Kevin
SSH Commands
PED
HTTPS
VPN
© Intralinks 2014
Intralinks Information Rights Management (IRM)
is a subset of digital rights management (DRM),
technologies that protect sensitive information from
unauthorized access.
9
© Intralinks 2014
10
Information Rights Management (IRM) is a core service
required for cloud content lifecycle management
Information Rights
Management
Secure Multi-Tenant SaaS Infrastructure
Content
Management
File Sync & Share
Workflow Metadata
Search
Compliance
Reporting
Secure
Distribution
Core Content Services
© Intralinks 2014
11
Granular control of content at rest and in use
•  Plug-in free: Share outside of enterprise
•  Seamless to use: No training required
•  UNshare™ that works: Apply IRM everywhere
•  One key for each single file downloaded from
Intralinks platform (or API)
•  Content Analytics and Audit: Visibility into how
content is used, shared, copied, printed, edited, etc.
•  Control of data in use: Granular content-level
permissions including view, edit, annotate, print, open
locations (IP) and device pinning
Information Rights Management
© Intralinks 2014
Intralinks IRM as implemented within the
Intralinks VIATM Pro collaboration solution.
12
“A day in the life…” Scenario
© Intralinks 2014
Visual indicator
of IRM
protection
13
Bill Jones
Sally Smith
Ted Walters
Bill Jones
Bill Jones
Bill Jones
Bill Jones
Bill Jones
Once inside an Intralinks VIA Pro
Workspace users can quickly determine
whether or not IRM protection is enabled.
© Intralinks 2014
14
Bill Jones
Bill Jones
Bill Jones
Bill Jones
Ted Walters
Sally Smith
Jones
© Intralinks 2014
15
Bill Jones
Bill Jones
Bill Jones
Jones
Ted Walters
With just two clicks users can
quickly enable IRM for all
documents in the Workspace.
© Intralinks 2014
Bill Jones
Sally Smith
Bill Jones
Ted Walters
Bill Jones
Bill Jones
Bill Jones
Bill Jones
16
Visual indicator
of IRM
protection
Visual indicators now extend to the
documents themselves highlighting
the enhanced protection for users.
© Intralinks 2014
17
Bill Jones
Bill Jones
Jones
With the Workspace and its
documents now secure, and the
added confidence that the protection
travel with the file itself, the user can
invite external collaborators.
© Intralinks 2014
18
Bill Jones
Sally Smith
Ted WaltersBill Jones
Bill Jones
Bill Jones
Bill Jones
Bill Jones
When a user opens an IRM protected
document Intralinks VIA Pro will simply
download and open it in its native
authoring application.
© Intralinks 2014
Indication of Intralinks
protected document
within the native
authoring application.
No cumbersome plug-in’s or configuration
is required by the end user, the document
is opened and the user notified that it is
protected.
19
© Intralinks 2014
20
Intralinks IRM can display the
permissions set for the document;
permissions that will travel with the file
wherever it may go.
© Intralinks 2014
21
CMK and IRM now available with Intralinks VIATM:
Securely sync, share, collaborate … and manage your business content
With Intralinks VIA™,
users can sync, share,
and collaborate on
business content to get
work done while
enterprises can manage
that content to protect IP
and meet compliance
© Intralinks 2014
For more information:
Sri Chilukuri
VP Product Marketing
schilukuri@intralinks.com
Intralinks.com

More Related Content

What's hot

The Zero Trust Model of Information Security
The Zero Trust Model of Information Security The Zero Trust Model of Information Security
The Zero Trust Model of Information Security Tripwire
 
Office 365 Security: How to Safeguard Your Data
Office 365 Security: How to Safeguard Your DataOffice 365 Security: How to Safeguard Your Data
Office 365 Security: How to Safeguard Your DataBitglass
 
CASBs - A New Hope
CASBs - A New HopeCASBs - A New Hope
CASBs - A New HopeBitglass
 
Seclore File Secure Introduction Brief
Seclore File Secure Introduction   BriefSeclore File Secure Introduction   Brief
Seclore File Secure Introduction BriefNováccent
 
Augmate connect summary
Augmate connect summaryAugmate connect summary
Augmate connect summaryEtheralabs
 
Bitglass Webinar - A Primer on CASBs and Cloud Security
Bitglass Webinar - A Primer on CASBs and Cloud SecurityBitglass Webinar - A Primer on CASBs and Cloud Security
Bitglass Webinar - A Primer on CASBs and Cloud SecurityBitglass
 
4 Essential Components of Office 365 Security
4 Essential Components of Office 365 Security4 Essential Components of Office 365 Security
4 Essential Components of Office 365 SecurityBitglass
 
Google Case Study - Towards simpler, stronger authentication
Google Case Study - Towards simpler, stronger authenticationGoogle Case Study - Towards simpler, stronger authentication
Google Case Study - Towards simpler, stronger authenticationFIDO Alliance
 
Bitglass Webinar - Top 6 CASB Use Cases
Bitglass Webinar - Top 6 CASB Use CasesBitglass Webinar - Top 6 CASB Use Cases
Bitglass Webinar - Top 6 CASB Use CasesBitglass
 
Bitglass Webinar - 5 Cloud Security Best Practices for 2018
Bitglass Webinar - 5 Cloud Security Best Practices for 2018Bitglass Webinar - 5 Cloud Security Best Practices for 2018
Bitglass Webinar - 5 Cloud Security Best Practices for 2018Bitglass
 
Bitglass Webinar - BlueCross BlueShield of Tennessee's CASB Journey to Secure...
Bitglass Webinar - BlueCross BlueShield of Tennessee's CASB Journey to Secure...Bitglass Webinar - BlueCross BlueShield of Tennessee's CASB Journey to Secure...
Bitglass Webinar - BlueCross BlueShield of Tennessee's CASB Journey to Secure...Bitglass
 
Content is King - Symantec
Content is King - SymantecContent is King - Symantec
Content is King - SymantecHarry Gunns
 
Data Security Solutions @ Lithuania CIO Forum 2015 - Mobility will happen by ...
Data Security Solutions @ Lithuania CIO Forum 2015 - Mobility will happen by ...Data Security Solutions @ Lithuania CIO Forum 2015 - Mobility will happen by ...
Data Security Solutions @ Lithuania CIO Forum 2015 - Mobility will happen by ...Andris Soroka
 
Classification-HowToBoostInformationProtection
Classification-HowToBoostInformationProtectionClassification-HowToBoostInformationProtection
Classification-HowToBoostInformationProtectionGianmarco Ferri
 
CLOUDSEC2014 - Keith Prabhu - Bringing Trust To The Cloud
CLOUDSEC2014 - Keith Prabhu - Bringing Trust To The CloudCLOUDSEC2014 - Keith Prabhu - Bringing Trust To The Cloud
CLOUDSEC2014 - Keith Prabhu - Bringing Trust To The Cloudadministrator_confidis
 
CASBs and Office 365: The Security Menace
CASBs and Office 365: The Security MenaceCASBs and Office 365: The Security Menace
CASBs and Office 365: The Security MenaceBitglass
 

What's hot (20)

IQProtector Suite
IQProtector SuiteIQProtector Suite
IQProtector Suite
 
The Zero Trust Model of Information Security
The Zero Trust Model of Information Security The Zero Trust Model of Information Security
The Zero Trust Model of Information Security
 
Office 365 Security: How to Safeguard Your Data
Office 365 Security: How to Safeguard Your DataOffice 365 Security: How to Safeguard Your Data
Office 365 Security: How to Safeguard Your Data
 
CASBs - A New Hope
CASBs - A New HopeCASBs - A New Hope
CASBs - A New Hope
 
Seclore File Secure Introduction Brief
Seclore File Secure Introduction   BriefSeclore File Secure Introduction   Brief
Seclore File Secure Introduction Brief
 
Augmate connect summary
Augmate connect summaryAugmate connect summary
Augmate connect summary
 
Bitglass Webinar - A Primer on CASBs and Cloud Security
Bitglass Webinar - A Primer on CASBs and Cloud SecurityBitglass Webinar - A Primer on CASBs and Cloud Security
Bitglass Webinar - A Primer on CASBs and Cloud Security
 
4 Essential Components of Office 365 Security
4 Essential Components of Office 365 Security4 Essential Components of Office 365 Security
4 Essential Components of Office 365 Security
 
Google Case Study - Towards simpler, stronger authentication
Google Case Study - Towards simpler, stronger authenticationGoogle Case Study - Towards simpler, stronger authentication
Google Case Study - Towards simpler, stronger authentication
 
Bitglass Webinar - Top 6 CASB Use Cases
Bitglass Webinar - Top 6 CASB Use CasesBitglass Webinar - Top 6 CASB Use Cases
Bitglass Webinar - Top 6 CASB Use Cases
 
Bitglass Webinar - 5 Cloud Security Best Practices for 2018
Bitglass Webinar - 5 Cloud Security Best Practices for 2018Bitglass Webinar - 5 Cloud Security Best Practices for 2018
Bitglass Webinar - 5 Cloud Security Best Practices for 2018
 
Bitglass Webinar - BlueCross BlueShield of Tennessee's CASB Journey to Secure...
Bitglass Webinar - BlueCross BlueShield of Tennessee's CASB Journey to Secure...Bitglass Webinar - BlueCross BlueShield of Tennessee's CASB Journey to Secure...
Bitglass Webinar - BlueCross BlueShield of Tennessee's CASB Journey to Secure...
 
Content is King - Symantec
Content is King - SymantecContent is King - Symantec
Content is King - Symantec
 
Information Rights Management (IRM)
Information Rights Management (IRM)Information Rights Management (IRM)
Information Rights Management (IRM)
 
Hitachi ID Group Manager
Hitachi ID Group ManagerHitachi ID Group Manager
Hitachi ID Group Manager
 
Data Security Solutions @ Lithuania CIO Forum 2015 - Mobility will happen by ...
Data Security Solutions @ Lithuania CIO Forum 2015 - Mobility will happen by ...Data Security Solutions @ Lithuania CIO Forum 2015 - Mobility will happen by ...
Data Security Solutions @ Lithuania CIO Forum 2015 - Mobility will happen by ...
 
Classification-HowToBoostInformationProtection
Classification-HowToBoostInformationProtectionClassification-HowToBoostInformationProtection
Classification-HowToBoostInformationProtection
 
CLOUDSEC2014 - Keith Prabhu - Bringing Trust To The Cloud
CLOUDSEC2014 - Keith Prabhu - Bringing Trust To The CloudCLOUDSEC2014 - Keith Prabhu - Bringing Trust To The Cloud
CLOUDSEC2014 - Keith Prabhu - Bringing Trust To The Cloud
 
CASBs and Office 365: The Security Menace
CASBs and Office 365: The Security MenaceCASBs and Office 365: The Security Menace
CASBs and Office 365: The Security Menace
 
Identiverse Zero Trust Customer Briefing, Identiverse 2019
Identiverse Zero Trust Customer Briefing, Identiverse 2019Identiverse Zero Trust Customer Briefing, Identiverse 2019
Identiverse Zero Trust Customer Briefing, Identiverse 2019
 

Similar to GARTNER IT EXPO - Protecting Content in a Mobile & Cloud World

Migrating Critical Applications to the Cloud - isaca seattle - sanitized
Migrating Critical Applications to the Cloud - isaca seattle - sanitizedMigrating Critical Applications to the Cloud - isaca seattle - sanitized
Migrating Critical Applications to the Cloud - isaca seattle - sanitizedUnifyCloud
 
Migrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
Migrating Critical Applications To The Cloud - ISACA Seattle - SanitizedMigrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
Migrating Critical Applications To The Cloud - ISACA Seattle - SanitizedNorm Barber
 
Zero trust for everybody: 3 ways to get there fast
Zero trust for everybody: 3 ways to get there fastZero trust for everybody: 3 ways to get there fast
Zero trust for everybody: 3 ways to get there fastCloudflare
 
2016, A New Era of OS and Cloud Security - Tudor Damian
2016, A New Era of OS and Cloud Security - Tudor Damian2016, A New Era of OS and Cloud Security - Tudor Damian
2016, A New Era of OS and Cloud Security - Tudor DamianITCamp
 
2016, A new era of OS and Cloud Security
2016, A new era of OS and Cloud Security2016, A new era of OS and Cloud Security
2016, A new era of OS and Cloud SecurityTudor Damian
 
Catalyst 2015: Patrick Harding
Catalyst 2015: Patrick HardingCatalyst 2015: Patrick Harding
Catalyst 2015: Patrick HardingPing Identity
 
Adopting A Zero-Trust Model. Google Did It, Can You?
Adopting A Zero-Trust Model. Google Did It, Can You?Adopting A Zero-Trust Model. Google Did It, Can You?
Adopting A Zero-Trust Model. Google Did It, Can You?Zscaler
 
CIO Review - Top 20 CyberSecurity
CIO Review - Top 20 CyberSecurityCIO Review - Top 20 CyberSecurity
CIO Review - Top 20 CyberSecurityBob Guimarin
 
Six Steps to Secure Access for Privileged Insiders & Vendors
Six Steps to Secure Access for Privileged Insiders & VendorsSix Steps to Secure Access for Privileged Insiders & Vendors
Six Steps to Secure Access for Privileged Insiders & VendorsBomgar
 
BayBio - Facilitating R&D Collaborations through the Cloud
BayBio - Facilitating R&D Collaborations through the CloudBayBio - Facilitating R&D Collaborations through the Cloud
BayBio - Facilitating R&D Collaborations through the CloudSri Chilukuri
 
Forcepoint Corporate Presentation_Short.pptx
Forcepoint Corporate Presentation_Short.pptxForcepoint Corporate Presentation_Short.pptx
Forcepoint Corporate Presentation_Short.pptxcaesar92
 
CASBs: 8 Critical Capabilities in partnership with ISMG Media Group
CASBs: 8 Critical Capabilities in partnership with ISMG Media GroupCASBs: 8 Critical Capabilities in partnership with ISMG Media Group
CASBs: 8 Critical Capabilities in partnership with ISMG Media GroupBitglass
 
TEUNO Summit - Presentaciones
TEUNO Summit - PresentacionesTEUNO Summit - Presentaciones
TEUNO Summit - PresentacionesTEUNO
 
Certes webinar securing the frictionless enterprise
Certes webinar   securing the frictionless enterpriseCertes webinar   securing the frictionless enterprise
Certes webinar securing the frictionless enterpriseJason Bloomberg
 
Security in Mergers and Acquisitions - NTT Security - Miriam Levenstein
Security in Mergers and Acquisitions  - NTT Security - Miriam LevensteinSecurity in Mergers and Acquisitions  - NTT Security - Miriam Levenstein
Security in Mergers and Acquisitions - NTT Security - Miriam LevensteinMiriam L
 
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...Symantec
 
Fy11 Clearswift Corporate Presentation
Fy11 Clearswift Corporate PresentationFy11 Clearswift Corporate Presentation
Fy11 Clearswift Corporate Presentationrichard_turner
 

Similar to GARTNER IT EXPO - Protecting Content in a Mobile & Cloud World (20)

Migrating Critical Applications to the Cloud - isaca seattle - sanitized
Migrating Critical Applications to the Cloud - isaca seattle - sanitizedMigrating Critical Applications to the Cloud - isaca seattle - sanitized
Migrating Critical Applications to the Cloud - isaca seattle - sanitized
 
Migrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
Migrating Critical Applications To The Cloud - ISACA Seattle - SanitizedMigrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
Migrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
 
Zero trust for everybody: 3 ways to get there fast
Zero trust for everybody: 3 ways to get there fastZero trust for everybody: 3 ways to get there fast
Zero trust for everybody: 3 ways to get there fast
 
2016, A New Era of OS and Cloud Security - Tudor Damian
2016, A New Era of OS and Cloud Security - Tudor Damian2016, A New Era of OS and Cloud Security - Tudor Damian
2016, A New Era of OS and Cloud Security - Tudor Damian
 
2016, A new era of OS and Cloud Security
2016, A new era of OS and Cloud Security2016, A new era of OS and Cloud Security
2016, A new era of OS and Cloud Security
 
Catalyst 2015: Patrick Harding
Catalyst 2015: Patrick HardingCatalyst 2015: Patrick Harding
Catalyst 2015: Patrick Harding
 
Adopting A Zero-Trust Model. Google Did It, Can You?
Adopting A Zero-Trust Model. Google Did It, Can You?Adopting A Zero-Trust Model. Google Did It, Can You?
Adopting A Zero-Trust Model. Google Did It, Can You?
 
CIO Review - Top 20 CyberSecurity
CIO Review - Top 20 CyberSecurityCIO Review - Top 20 CyberSecurity
CIO Review - Top 20 CyberSecurity
 
Six Steps to Secure Access for Privileged Insiders & Vendors
Six Steps to Secure Access for Privileged Insiders & VendorsSix Steps to Secure Access for Privileged Insiders & Vendors
Six Steps to Secure Access for Privileged Insiders & Vendors
 
Secure enterprise mobility
Secure enterprise mobilitySecure enterprise mobility
Secure enterprise mobility
 
BayBio - Facilitating R&D Collaborations through the Cloud
BayBio - Facilitating R&D Collaborations through the CloudBayBio - Facilitating R&D Collaborations through the Cloud
BayBio - Facilitating R&D Collaborations through the Cloud
 
Forcepoint Corporate Presentation_Short.pptx
Forcepoint Corporate Presentation_Short.pptxForcepoint Corporate Presentation_Short.pptx
Forcepoint Corporate Presentation_Short.pptx
 
CASBs: 8 Critical Capabilities in partnership with ISMG Media Group
CASBs: 8 Critical Capabilities in partnership with ISMG Media GroupCASBs: 8 Critical Capabilities in partnership with ISMG Media Group
CASBs: 8 Critical Capabilities in partnership with ISMG Media Group
 
TEUNO Summit - Presentaciones
TEUNO Summit - PresentacionesTEUNO Summit - Presentaciones
TEUNO Summit - Presentaciones
 
Certes webinar securing the frictionless enterprise
Certes webinar   securing the frictionless enterpriseCertes webinar   securing the frictionless enterprise
Certes webinar securing the frictionless enterprise
 
Security and Data Breach
Security and Data BreachSecurity and Data Breach
Security and Data Breach
 
Security in Mergers and Acquisitions - NTT Security - Miriam Levenstein
Security in Mergers and Acquisitions  - NTT Security - Miriam LevensteinSecurity in Mergers and Acquisitions  - NTT Security - Miriam Levenstein
Security in Mergers and Acquisitions - NTT Security - Miriam Levenstein
 
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
 
Zero Trust Networks
Zero Trust NetworksZero Trust Networks
Zero Trust Networks
 
Fy11 Clearswift Corporate Presentation
Fy11 Clearswift Corporate PresentationFy11 Clearswift Corporate Presentation
Fy11 Clearswift Corporate Presentation
 

GARTNER IT EXPO - Protecting Content in a Mobile & Cloud World

  • 1. © Intralinks 2014 1 Sri Chilukuri, VP Product Marketing
  • 2. © Intralinks 2014 2 Intralinks – Secure cloud content collaboration leader Company •  Founded in 1996 by banks; currently 780 employees •  8 year leader in Gartner Collaboration Suites Category* •  Publically traded (NYSE:IL) •  $234.5M revenue (2013) •  Has been used by 99% of the Fortune 1000 •  Over $23.5T of financial transactions completed •  3.1M paid users across 90K organizations since launch •  35K new users per month, 68K logins per day *Sources: Gartner, Inc., ‘Market Share: All Software Markets, Worldwide, 2013,’ March 2014, G00260918 Gartner Magic Quadrant for Enterprise File Synchronization and Sharing, 2014; July 2014, G00261766 Financials Customer footprint Technology platform
  • 3. © Intralinks 2014 3 Business needs and new technologies are upending traditional protection models Historical view: The firewall is the perimeter Common view: Identity is the new perimeter Current reality: Content is the new perimeter wherever it exists
  • 4. © Intralinks 2014 How do I protect content that is with my cloud vendor? How do I protect content that leaves my cloud?
  • 5. © Intralinks 2014 Intralinks Customer Managed Keys (CMK) We give enterprises sole control of their data encryption keys so that even Intralinks can’t retrieve file contents and provide it to a third party (e.g. subpoena)
  • 6. © Intralinks 2014 “The first step of encryption is ensuring that files are encrypted in transit, the next is that they’re encrypted at rest. But even at that level, there’s a problem…The traditional approach is to have the vendor manage the decryption keys. This works fine, but is a major source of stress for those enterprises with a particular focus on security. For those organizations, only fully customer-managed keys will suffice. Customer Managed Keys are an important addition…to the multi-layer key management system Intralinks has been using with customers for years.” 6 - Ben Kepes, Contributor Forbes.com http://www.forbes.com/sites/benkepes/2014/09/29/intralinks-rolls-out-customer-managed-encryption-keys/
  • 7. © Intralinks 2014 7 Customer Managed Keys (CMK) is a core service required for a secure cloud content services platform infrastructure Encryption Secure Data Centers Fault Tolerant Architecture Intrusion Detection Personnel Security Multi-Factor Authentication Customer Managed Keys Single Sign-On Certifications (SAS 70, SOC 2) Secure Multi-Tenant SaaS Infrastructure
  • 8. © Intralinks 2014 8 Intralinks Customer Managed Keys (CMK) Overview Technology will give enterprises: •  Complete control over the encryption key lifecycle •  Ability to revoke content access without relying on Intralinks •  Ability to rotate encryption keys without requiring re-encryption of existing content •  Certainty that Intralinks is not storing encryption keys anywhere else •  Auditability of the entire key management process ILP CMK Service HSM Cluster User uploads And downloads Files to ILP Client services turns on CMK for client services.intralinks.com End User Laura Intralinks Client Services Chris Create, disable, and enable keys directly connected to HSM Customer Key Manager Kevin SSH Commands PED HTTPS VPN
  • 9. © Intralinks 2014 Intralinks Information Rights Management (IRM) is a subset of digital rights management (DRM), technologies that protect sensitive information from unauthorized access. 9
  • 10. © Intralinks 2014 10 Information Rights Management (IRM) is a core service required for cloud content lifecycle management Information Rights Management Secure Multi-Tenant SaaS Infrastructure Content Management File Sync & Share Workflow Metadata Search Compliance Reporting Secure Distribution Core Content Services
  • 11. © Intralinks 2014 11 Granular control of content at rest and in use •  Plug-in free: Share outside of enterprise •  Seamless to use: No training required •  UNshare™ that works: Apply IRM everywhere •  One key for each single file downloaded from Intralinks platform (or API) •  Content Analytics and Audit: Visibility into how content is used, shared, copied, printed, edited, etc. •  Control of data in use: Granular content-level permissions including view, edit, annotate, print, open locations (IP) and device pinning Information Rights Management
  • 12. © Intralinks 2014 Intralinks IRM as implemented within the Intralinks VIATM Pro collaboration solution. 12 “A day in the life…” Scenario
  • 13. © Intralinks 2014 Visual indicator of IRM protection 13 Bill Jones Sally Smith Ted Walters Bill Jones Bill Jones Bill Jones Bill Jones Bill Jones Once inside an Intralinks VIA Pro Workspace users can quickly determine whether or not IRM protection is enabled.
  • 14. © Intralinks 2014 14 Bill Jones Bill Jones Bill Jones Bill Jones Ted Walters Sally Smith Jones
  • 15. © Intralinks 2014 15 Bill Jones Bill Jones Bill Jones Jones Ted Walters With just two clicks users can quickly enable IRM for all documents in the Workspace.
  • 16. © Intralinks 2014 Bill Jones Sally Smith Bill Jones Ted Walters Bill Jones Bill Jones Bill Jones Bill Jones 16 Visual indicator of IRM protection Visual indicators now extend to the documents themselves highlighting the enhanced protection for users.
  • 17. © Intralinks 2014 17 Bill Jones Bill Jones Jones With the Workspace and its documents now secure, and the added confidence that the protection travel with the file itself, the user can invite external collaborators.
  • 18. © Intralinks 2014 18 Bill Jones Sally Smith Ted WaltersBill Jones Bill Jones Bill Jones Bill Jones Bill Jones When a user opens an IRM protected document Intralinks VIA Pro will simply download and open it in its native authoring application.
  • 19. © Intralinks 2014 Indication of Intralinks protected document within the native authoring application. No cumbersome plug-in’s or configuration is required by the end user, the document is opened and the user notified that it is protected. 19
  • 20. © Intralinks 2014 20 Intralinks IRM can display the permissions set for the document; permissions that will travel with the file wherever it may go.
  • 21. © Intralinks 2014 21 CMK and IRM now available with Intralinks VIATM: Securely sync, share, collaborate … and manage your business content With Intralinks VIA™, users can sync, share, and collaborate on business content to get work done while enterprises can manage that content to protect IP and meet compliance
  • 22. © Intralinks 2014 For more information: Sri Chilukuri VP Product Marketing schilukuri@intralinks.com Intralinks.com