What is IRM? bright talk

615 views

Published on

IRM will address information security needs for all types of enterprises.IRM is a set of policies and technologies that help enterprises control the usage of information contained in shared documents.

Published in: Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
615
On SlideShare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
25
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

What is IRM? bright talk

  1. 1. What is IRM Security and Compliance for unstructured information Vishal Gupta CEO Seclore www.seclore.com
  2. 2. TELEMARKETER Information exchange in the collaborative world Information is exchanged between Employees of the organisation Enterprise CUSTOMERS VENDORS Information is exchanged between employees & vendors & employees & customers Competitors VPN SSL UTM Firewall … Firewalls
  3. 3. TELEMARKETER Information exchange in the collaborative world Enterprise CUSTOMERS VENDORS Competitors What happens if an employee with privileged access leaves to join a competitor ? What happens if information shared with a vendor is lost by the vendor ? VPN SSL UTM Firewall … Firewalls
  4. 4. Underlying Issues Share it = It becomes his (also) Ownership and usage cannot be separated Shared once = Shared forever Impossible to “recall” information Out of the enterprise = Free for all Technology & processes are only applicable within
  5. 5. The Result Information lands up in public websites !
  6. 6. Create Store Transmit & collaborate Use Archive & Backup Delete DLP Anti-virus Anti-… Hard disk encryption SSL UTM Application security IDM DLP Vaults Digital shredders Desktops Laptops Heterogeneous policies … Heterogeneous infrastructure Mobile devices Removable media Email Content Management Online workspaces Remote desktops Information lifecycle … Shared folders Removable media Instant Messaging Desktops Laptops Mobile devices Archive Backup Document retention Security
  7. 7. Options for securing unstructured information Option 1 : Control Distribution . . . Security Collaboration
  8. 8. Options for securing unstructured information Option 2 : Control Usage . . . Security Collaboration Right Location Right Time Right Action Right Person
  9. 9. • WHO can use the information People & groups within and outside of the organization can be defined as rightful users of the information • WHAT can each person do Individual actions like reading, editing, printing, distributing, copy-pasting, screen grabbing etc. can be controlled • WHEN can he use it Information usage can be time based e.g. can only be used by Mr. A till 28th Sept OR only for the 2 days • WHERE can he use it from Information can be linked to locations e.g. only 3rd floor office by private/public IP addresses IRM allow enterprises to define, implement & track information usage “policies”. A “policy” defines : Information Rights Management
  10. 10. Policy Admin Computer Policy definition …
  11. 11. … Policy definition Policy Admin Computer
  12. 12. Owners’s Computer Policy application by end users …
  13. 13. Owners’s Computer Information Classification
  14. 14. Protected document Owners’s Computer
  15. 15. Receiver’s Computer Disclaimer on document access
  16. 16. Unauthorized attempt to print Receiver’s Computer
  17. 17. Unauthorized attempt to print Receiver’s Computer
  18. 18. Unauthorized attempt to copy Receiver’s Computer
  19. 19. Unauthorized attempt to copy Receiver’s Computer
  20. 20. “Screen Print” of a protected document Unauthorized attempt to print screen Receiver’s Computer
  21. 21. Audit trails capture authorized activities AND unauthorized attempts Audit trail for compliance Owners’s Computer
  22. 22. Audit trail for compliance Owners’s Computer
  23. 23. About …About … Seclore is a high growth information security product company focussed on providing Security without compromising collaboration Seclore’s flagship product Seclore FileSecure is used by More than 1 million users & some of the largest enterprises . . .
  24. 24. Thank You Vishal Gupta info [at] seclore dot com +91-22-4015-5252 www.seclore.com
  25. 25. Scenario: Research reports & drawings WHO WHAT WHEN WHERE Read Edit Print Distri bute Sanjiv Yes Yes No No Till the time of employment Within office network Rahul Yes No No No 30th November 2009 Within office network organization Rahul Sanjiv

×