Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Enterprise Digital Rights Management (Persistent Security)


Published on

An Introduction to Persistent Security through Digital Rights Management and Fasoo as a DRM Leader.

  • Be the first to comment

  • Be the first to like this

Enterprise Digital Rights Management (Persistent Security)

  2. 2. <ul><li>SC Magazine found that more than 90% of an organisation’s intellectual capital – its inventions or know-how - can be found in a digital format. </li></ul>Security Fact Number 1
  3. 3. <ul><li>ERM stands for Enterprise Rights Management. Its also known as IRM , Information Rights Management and DRM , Digital Rights Management. </li></ul><ul><li>The commonly adopted name is Enterprise Digital Rights Management, eDRM . </li></ul>Introducing ERM
  4. 4. <ul><li>ERM is the persistent control of access to and usage of electronic information regardless of where it exists. Be it inside or outside your organisation’s firewall. </li></ul>Defining ERM
  5. 5. <ul><li>In the US the Gartner Group estimates the loss of business information via email is valued at more than $24 billion per year. </li></ul><ul><li>Source: Gartner Group 2008 </li></ul>Security Fact Number 2
  6. 6. <ul><li>The Enterprise strategy Group defined ERM as the Superior Approach to Information Protection and Control </li></ul><ul><li>Source: Enterprise Strategy Group March 2008 </li></ul>Why ERM?
  7. 7. Protecting Unstructured Data
  8. 8. <ul><li>According to the survey conducted by the Ponemon Institute targeting 945 adults in the United States who were laid-off, fired or changed jobs in the last 12 months, 59% of employees stole company data when they left their job. </li></ul><ul><li>Source: The Ponemon Institute 2009 </li></ul>Security Fact Number 3
  9. 9. <ul><li>Enterprise Rights Management provides superior information protection and control for data at rest, data in motion and data in use at all times. </li></ul>How Does ERM Protect Data?
  10. 10. <ul><li>In July 2009 HSBC was fined £3.3m for personal data loss. </li></ul><ul><li>“ HSBC failed their customers by being careless with personal details which could have ended up in the hands of criminals” </li></ul><ul><li>- Margaret Cole, Financial Services Authority </li></ul>Data Security Breach #1
  11. 11. The threat profile has shifted Perimeter-based Security Keeping the Bad Guys Out Necessary but insufficient Information-based Security Assume They’re Already In Addresses root cause Threat Denial of Service, network intrusion, external attack Focus Access and availability Approach Firewall, IPS/IDS, anti-malware Solution Build and protect perimeters Privacy breach, intellectual property theft, compromise of HR files, insider attack Authorization and accountability Identity management, data encryption Manage and protect information <ul><ul><li>59% of employees surveyed said that they removed confidential information when they were let go by their employers! </li></ul></ul><ul><ul><li>– Gartner Feb 2009 </li></ul></ul>
  12. 12. <ul><li>After a serious document breach </li></ul><ul><li>After a document breach in the same industry </li></ul><ul><li>A government regulation goes into effect </li></ul><ul><li>Client or supplier implements DRM </li></ul><ul><li>Senior Management implements a proactive document security strategy </li></ul>What initiates a DRM Project?
  13. 13. <ul><li>Eli Lilly Pharmaceuticals </li></ul><ul><li>In January 2008 one of Eli Lilly’s outside lawyers at Philadelphia-based Pepper Hamilton had mistakenly emailed highly confidential information on the talks to New York Times reporter Alex Berenson instead of Bradford Berenson, her co-counsel at another law firm Sidley Austin. </li></ul><ul><li>The content of the email was regarding a $1b secret settlement on the Zyprexa drug investigation. </li></ul>Data Security Breach #2
  14. 14. Who Leads a DRM Project? <ul><li>CEO </li></ul><ul><li>Compliance Officer </li></ul><ul><li>CIO/CSO </li></ul><ul><li>IT managers </li></ul><ul><li>Business managers </li></ul>Executive level sponsorship is required in order to overcome the reluctance of users to secure information
  15. 15. What most DRM Can Provide… <ul><li>Persistent protection of documents: </li></ul><ul><ul><li>Who and where (device, network address) </li></ul></ul><ul><ul><li>How (edit, save, print, copy … ) </li></ul></ul><ul><ul><li>When (period, how long, how many) </li></ul></ul><ul><ul><li>Protection of all kinds of documents </li></ul></ul><ul><ul><li>Some can revoke rights after delivery </li></ul></ul>
  16. 16. Fasoo Modules <ul><li>Fasoo Enterprise DRM is comprised of the following 6 modules: </li></ul><ul><ul><li>Fasoo Secure Document (FSD) </li></ul></ul><ul><ul><li>Fasoo Secure Node (FSN) </li></ul></ul><ul><ul><li>Fasoo Secure Exchange (FSE) </li></ul></ul><ul><ul><li>Fasoo Secure Web (FSW) </li></ul></ul><ul><ul><li>Fasoo Secure Print (FSP) </li></ul></ul><ul><ul><li>Fasoo Secure File-server (FSF) </li></ul></ul>
  17. 17. Complete Data Protection Cycle Usage Access Granularity of Control Protection of data at rest Protection of data in transit Protection of data in use Enterprise DRM Data Loss Prevention Public Key Infrastructure Enterprise Content Mgt. Network Transport Encryption Full Disk Encryption
  18. 18. Introducing Probably The World’s Largest eDRM Solution Provider by number of licensed seats
  19. 19. Introducing Documentti <ul><li>Specializes in </li></ul><ul><li>Enterprise Digital Rights Management </li></ul><ul><li>Enterprise Content Management </li></ul><ul><li>SaaS – Documentti on Demand </li></ul>
  20. 20. Technology Advantages <ul><li>Core Technology </li></ul><ul><ul><li>Fasoo’s DRM Client technology allows wide range of permission controls by controlling rendering apps </li></ul></ul><ul><li>Supported Apps/Formats </li></ul><ul><ul><li>Organizations are using a variety of rendering apps, yet other vendors only support limited apps </li></ul></ul>High Low High Security Any application Limited 2) Limited 1) Applicability EMC, Oracle Plug-In Fasoo Microsoft Vendors Overriding ( Hooking ) Embedded 1) Applicable only if its source code is available 2) Applicable when Plug-in is allowed Comparison of DRM Client Technologies Fasoo’s DRM Client technology allows wide range of permission controls by controlling rendering apps Applications & File Formats Supported by Fasoo’s E- DRM Suites psd, ai, bmp, tiff, jpg, gif, png Adobe Photoshop, Adobe Illustrator, MS Paint, ACD See Image Files avi, mpg, mpeg, mp3, wma, wmv, asf, mid, wav Windows Media Player Multi Media Files dwg, catpart, catproduct, prt, asm, mf1, mf2, sldprt, sldasm Autocad, Catia, Pro-E, I-deas, Solid Works CAD Documents doc, xls, ppt, pdf, hwp Microsoft Office, Acrobat, Area Hangul, Notepad, WordPad Documents Typical File Formats 3) Native Applications 3) 3) Upon request, others can also be supportable Organizations are using variety of rendering apps, yet other vendors only support limited apps.
  21. 21. Technology Advantages <ul><li>Fasoo E-DRM Suites </li></ul><ul><ul><li>To meet all the complicated document security needs throughout the full document lifecycles & workflows. </li></ul></ul><ul><ul><li>Easy to integrate with existing systems (Providing SDK for authentication, packaging, policy management). </li></ul></ul><ul><ul><li>To support all sorts of documents/files/content being circulated in the everyday enterprise work environment. </li></ul></ul><ul><ul><li>Proven security, reliability and scalability 24/7/365 since 2000 </li></ul></ul>Content Management Solutions Rendering Applications MS Office Adobe Acrobat CAD Others Others Documentum Stellent DRM solution must support multiple server applications, DMS, KMS, CMS, etc. Comparison of Security Domains 1) Supported * **** Liquid Machines ** ** * Microsoft * * Adobe ** * * **** Oracle * ** EMC ** ***** ***** ***** Fasoo Web Ad-hoc PC Server App Other DRM vendors’ solution does not cover all security domain (e.g., file creation)
  22. 22. <ul><li>Are you doing enough? </li></ul>Final Question The investment required to prevent a data breach is dwarfed by the resulting costs of a breach – Ponemon Institute