SlideShare a Scribd company logo
Bringing Policy-
Based Classification
to SharePoint
www.watchfulsoftware.com
February, 17th 2016
Friday, February 26, 2016 © Copyright www.watchfulsoftware.com. 2016 All Rights Reserved. 2
Agenda
1 Introductions & “House Rules”
2 Business Context
3 Demo
4
What does RightsWATCH add to native IRM
support in SharePoint?
5 Q&A andWrap-up
Introductions
House Rules
 You are muted centrally.You don’t need to
mute/unmute yourself
 This webinar is being recorded.You’ll have access
to it On-demand at
www.watchfulsoftware.com/en/resources
 The Q&A session will be at the end.You are
welcomed to enter questions anytime, using the
Questions feature in the GoToWebinar control panel
© Copyright www.watchfulsoftware.com. 2016 All Rights Reserved. 3
Cátia Franco
Cátia serves as Product Marketing
Manager for Watchful Software, and is
responsible for product strategy,
positioning and messaging.
Friday, February 26, 2016
1 SharePoint is a powerful and widely used collaboration tool
2 SharePoint is used by companies that need to control access to files
3 Security is not in the average user job description
4 RightsWATCH is able to enforce it’s policy-driven classification engine to SharePoint
Business Context
© Copyright www.watchfulsoftware.com. 2016 All Rights Reserved. 4Friday, February 26, 2016
Enhancing SharePoint’s secure collaboration experience
© Copyright www.watchfulsoftware.com. 2016 All Rights Reserved. 5
SharePoint admin defines the policy:
Every Microsoft Office or PDF file that
is added to specified libraries on
SharePoint need to be classified as
“Confidential” or above
SharePoint running
RightsWATCH
SharePoint user uploads an
unclassified Microsoft Word, Excel,
PowerPoint and/or PDF file to one of
the SharePoint libraries that has
RightsWATCH policy rules
SharePoint user logs into SharePoint
on his/her desktop, smartphone,
laptop or tablet. He/she downloads
(or checks out) one (or more)
classified files. RightsWATCH tags
and marks, RMS encryption and
RBAC is enforced
The RightsWATCH SharePoint add-on
automatically classifies every Microsoft
Office and PDF file that is added to the
specified libraries as “Confidential”.
 If the files are previously classified
with a classification level below
”Confidential”, RightsWATCH
upgrades the file classification
 If the files are previously classified
with a classification level higher than
“Confidential”, RightsWATCH leaves
the file unchanged.
Friday, February 26, 2016
RightsWATCH & SharePoint Demo
© Copyright www.watchfulsoftware.com. 2016 All Rights Reserved. 6Friday, February 26, 2016
What does RightsWATCH add to native IRM support in SharePoint?
© Copyright www.watchfulsoftware.com. 2016 All Rights Reserved. 7
SharePoint with native IRM protection SharePoint with RightsWATCH
Data Classification
Role-based Access Control
Friday, February 26, 2016
What does RightsWATCH add to native IRM support in SharePoint?
© Copyright www.watchfulsoftware.com. 2016 All Rights Reserved. 8
SharePoint with native IRM protection SharePoint with RightsWATCH
Only MS Office files are supported MS Office and PDF files
Does not integrate with Microsoft RMS templates Integrates with Microsoft RMS templates
SharePoint manages what library can be accessed
RMS templates manage what can be done to/with the document
itself
Specific actions and who can take them are based upon the
LIBRARY
Specific actions and who can take them are based upon the USER
Users are assigned to levels and groups and thus inherit access
controls through that membership
Role-based access control is enforced over the files (without any
user intervention or security/control actions)
Documents are stored in the SharePoint database unencrypted
and unprotected
Every MS Office or PDF file that is added/uploaded becomes
automatically classified and/or RMS protected according to
corporate policy
Ad-hoc IRM permissions are applied - IRM rights being applied are
the same for every user (aka "One size fits all")
Corporate policy templates can be applied, ensuring that the
appropriate classification, marking, and protections are applied
Users are able to search the content of the files and have access to
the content
The content of the RMS protected files are not indexable nor
searchable by users while inside SP (except for file metadata)
Friday, February 26, 2016
Q&A andWrap-up
Check out the “Resources” area on www.watchfulsoftware.com and watch
short product walkthrough demonstrations of how RightsWATCH address a
comprehensive set of use cases
E-mail info@watchfulsoftware.com to request a demo of RightsWATCH
This webinar is being recorded.You’ll have access to it On-demand at
www.watchfulsoftware.com
Friday, February 26, 2016 © Copyright www.watchfulsoftware.com. 2016 All Rights Reserved. 9
Bringing Policy-
Based Classification
to SharePoint
www.watchfulsoftware.com
February, 17th 2016

More Related Content

What's hot

Global Thought Leadership Webcast, March 23
Global Thought Leadership Webcast, March 23Global Thought Leadership Webcast, March 23
Global Thought Leadership Webcast, March 23
Patrícia Alves
 
The 9 of SaaS: Widely-used legal clauses for Privacy Policy
The 9 of SaaS: Widely-used legal clauses for Privacy PolicyThe 9 of SaaS: Widely-used legal clauses for Privacy Policy
The 9 of SaaS: Widely-used legal clauses for Privacy Policy
termsfeed
 
Turtles, Trust and The Future of Cybersecurity
Turtles, Trust and The Future of Cybersecurity Turtles, Trust and The Future of Cybersecurity
Turtles, Trust and The Future of Cybersecurity
Digital Transformation EXPO Event Series
 
Secure your Access to Cloud Apps using Microsoft Defender for Cloud Apps
Secure your Access to Cloud Apps using Microsoft Defender for Cloud AppsSecure your Access to Cloud Apps using Microsoft Defender for Cloud Apps
Secure your Access to Cloud Apps using Microsoft Defender for Cloud Apps
Vignesh Ganesan I Microsoft MVP
 
10.5 commandments of Salesforce Users
10.5 commandments of Salesforce Users 10.5 commandments of Salesforce Users
10.5 commandments of Salesforce Users
Cloudingo
 
Brk30177 securing paas
Brk30177 securing paasBrk30177 securing paas
Brk30177 securing paas
Abou CONDE
 
M365 Gurgaon 2020 - How to manage sensitive and personal data in M365
M365 Gurgaon 2020 - How to manage sensitive and personal data in M365M365 Gurgaon 2020 - How to manage sensitive and personal data in M365
M365 Gurgaon 2020 - How to manage sensitive and personal data in M365
Sébastien Paulet
 
A beginners guide to administering office 365 with power shell antonio maio
A beginners guide to administering office 365 with power shell   antonio maioA beginners guide to administering office 365 with power shell   antonio maio
A beginners guide to administering office 365 with power shell antonio maio
AntonioMaio2
 
5 Security Questions To Ask When Deploying O365
5 Security Questions To Ask When Deploying O3655 Security Questions To Ask When Deploying O365
5 Security Questions To Ask When Deploying O365
Bitglass
 
Chapter 3: Vulnerabilities and threat models
Chapter 3: Vulnerabilities and threat modelsChapter 3: Vulnerabilities and threat models
Chapter 3: Vulnerabilities and threat models
Dr.Sami Khiami
 
Cloud Data Security Trends.pdf
Cloud Data Security Trends.pdfCloud Data Security Trends.pdf
Cloud Data Security Trends.pdf
Sun Technologies
 
The Security Gap: Protecting Healthcare Data in Office 365
The Security Gap: Protecting Healthcare Data in Office 365The Security Gap: Protecting Healthcare Data in Office 365
The Security Gap: Protecting Healthcare Data in Office 365
Bitglass
 
Chapter1:information security overview
Chapter1:information security overview Chapter1:information security overview
Chapter1:information security overview
Dr.Sami Khiami
 
DataMindsConnect2018_SECDEVOPS
DataMindsConnect2018_SECDEVOPSDataMindsConnect2018_SECDEVOPS
DataMindsConnect2018_SECDEVOPS
Tobias Koprowski
 
Office 365 Security - MacGyver, Ninja or Swat team
Office 365 Security -  MacGyver, Ninja or Swat teamOffice 365 Security -  MacGyver, Ninja or Swat team
Office 365 Security - MacGyver, Ninja or Swat team
AntonioMaio2
 
Office 365 security new innovations from microsoft ignite - antonio maio
Office 365 security   new innovations from microsoft ignite - antonio maioOffice 365 security   new innovations from microsoft ignite - antonio maio
Office 365 security new innovations from microsoft ignite - antonio maio
AntonioMaio2
 
Information protection & classification
Information protection & classificationInformation protection & classification
Information protection & classification
David De Vos
 

What's hot (17)

Global Thought Leadership Webcast, March 23
Global Thought Leadership Webcast, March 23Global Thought Leadership Webcast, March 23
Global Thought Leadership Webcast, March 23
 
The 9 of SaaS: Widely-used legal clauses for Privacy Policy
The 9 of SaaS: Widely-used legal clauses for Privacy PolicyThe 9 of SaaS: Widely-used legal clauses for Privacy Policy
The 9 of SaaS: Widely-used legal clauses for Privacy Policy
 
Turtles, Trust and The Future of Cybersecurity
Turtles, Trust and The Future of Cybersecurity Turtles, Trust and The Future of Cybersecurity
Turtles, Trust and The Future of Cybersecurity
 
Secure your Access to Cloud Apps using Microsoft Defender for Cloud Apps
Secure your Access to Cloud Apps using Microsoft Defender for Cloud AppsSecure your Access to Cloud Apps using Microsoft Defender for Cloud Apps
Secure your Access to Cloud Apps using Microsoft Defender for Cloud Apps
 
10.5 commandments of Salesforce Users
10.5 commandments of Salesforce Users 10.5 commandments of Salesforce Users
10.5 commandments of Salesforce Users
 
Brk30177 securing paas
Brk30177 securing paasBrk30177 securing paas
Brk30177 securing paas
 
M365 Gurgaon 2020 - How to manage sensitive and personal data in M365
M365 Gurgaon 2020 - How to manage sensitive and personal data in M365M365 Gurgaon 2020 - How to manage sensitive and personal data in M365
M365 Gurgaon 2020 - How to manage sensitive and personal data in M365
 
A beginners guide to administering office 365 with power shell antonio maio
A beginners guide to administering office 365 with power shell   antonio maioA beginners guide to administering office 365 with power shell   antonio maio
A beginners guide to administering office 365 with power shell antonio maio
 
5 Security Questions To Ask When Deploying O365
5 Security Questions To Ask When Deploying O3655 Security Questions To Ask When Deploying O365
5 Security Questions To Ask When Deploying O365
 
Chapter 3: Vulnerabilities and threat models
Chapter 3: Vulnerabilities and threat modelsChapter 3: Vulnerabilities and threat models
Chapter 3: Vulnerabilities and threat models
 
Cloud Data Security Trends.pdf
Cloud Data Security Trends.pdfCloud Data Security Trends.pdf
Cloud Data Security Trends.pdf
 
The Security Gap: Protecting Healthcare Data in Office 365
The Security Gap: Protecting Healthcare Data in Office 365The Security Gap: Protecting Healthcare Data in Office 365
The Security Gap: Protecting Healthcare Data in Office 365
 
Chapter1:information security overview
Chapter1:information security overview Chapter1:information security overview
Chapter1:information security overview
 
DataMindsConnect2018_SECDEVOPS
DataMindsConnect2018_SECDEVOPSDataMindsConnect2018_SECDEVOPS
DataMindsConnect2018_SECDEVOPS
 
Office 365 Security - MacGyver, Ninja or Swat team
Office 365 Security -  MacGyver, Ninja or Swat teamOffice 365 Security -  MacGyver, Ninja or Swat team
Office 365 Security - MacGyver, Ninja or Swat team
 
Office 365 security new innovations from microsoft ignite - antonio maio
Office 365 security   new innovations from microsoft ignite - antonio maioOffice 365 security   new innovations from microsoft ignite - antonio maio
Office 365 security new innovations from microsoft ignite - antonio maio
 
Information protection & classification
Information protection & classificationInformation protection & classification
Information protection & classification
 

Similar to Bringing policy based classification to Sharepoint

How classification changes the way you look into corporate data
How classification changes the way you look into corporate dataHow classification changes the way you look into corporate data
How classification changes the way you look into corporate data
Watchful Software
 
Strategies for policy driven information classification
Strategies for policy driven information classificationStrategies for policy driven information classification
Strategies for policy driven information classification
Watchful Software
 
Share point server 2016 as a document management solution
Share point server 2016 as a document management solutionShare point server 2016 as a document management solution
Share point server 2016 as a document management solution
Raghunathan M.S.
 
Security and Compliance with SharePoint and Office 365
Security and Compliance with SharePoint and Office 365Security and Compliance with SharePoint and Office 365
Security and Compliance with SharePoint and Office 365
Richard Harbridge
 
Make a case for Data Classification in your organization
Make a case for Data Classification in your organizationMake a case for Data Classification in your organization
Make a case for Data Classification in your organization
Watchful Software
 
Flare - Connecting Your Organization With Its Information
Flare - Connecting Your Organization With Its InformationFlare - Connecting Your Organization With Its Information
Flare - Connecting Your Organization With Its Information
Iman Ruth Ali, CL, ACB
 
SqlSat Victoria governance for PowerBI
SqlSat Victoria governance for PowerBISqlSat Victoria governance for PowerBI
SqlSat Victoria governance for PowerBI
Berkovich Consulting
 
Office 365 Vancouver. A Team Approach to Azure Information Protection
Office 365 Vancouver. A Team Approach to Azure Information ProtectionOffice 365 Vancouver. A Team Approach to Azure Information Protection
Office 365 Vancouver. A Team Approach to Azure Information Protection
Joanne Klein
 
SPTechCon Boston 2013 - Introduction to Security in Microsoft Sharepoint 2013...
SPTechCon Boston 2013 - Introduction to Security in Microsoft Sharepoint 2013...SPTechCon Boston 2013 - Introduction to Security in Microsoft Sharepoint 2013...
SPTechCon Boston 2013 - Introduction to Security in Microsoft Sharepoint 2013...
AntonioMaio2
 
File Security in Microsoft SharePoint and OneDrive
File Security in Microsoft SharePoint and OneDriveFile Security in Microsoft SharePoint and OneDrive
File Security in Microsoft SharePoint and OneDrive
David J Rosenthal
 
RSA SecurBook for Microsoft SharePoint
RSA SecurBook for Microsoft SharePointRSA SecurBook for Microsoft SharePoint
RSA SecurBook for Microsoft SharePoint
Susam Pal
 
B2 - The History of Content Security: Part 2 - Adam Levithan
B2 - The History of Content Security: Part 2 - Adam LevithanB2 - The History of Content Security: Part 2 - Adam Levithan
B2 - The History of Content Security: Part 2 - Adam Levithan
SPS Paris
 
What the #$* is a Business Catalog and why you need it
What the #$* is a Business Catalog and why you need it What the #$* is a Business Catalog and why you need it
What the #$* is a Business Catalog and why you need it
DataWorks Summit/Hadoop Summit
 
Apache Atlas: Why Big Data Management Requires Hierarchical Taxonomies
Apache Atlas: Why Big Data Management Requires Hierarchical Taxonomies Apache Atlas: Why Big Data Management Requires Hierarchical Taxonomies
Apache Atlas: Why Big Data Management Requires Hierarchical Taxonomies
DataWorks Summit/Hadoop Summit
 
Digital asset management using SharePoint 2013
Digital asset management using SharePoint 2013Digital asset management using SharePoint 2013
Digital asset management using SharePoint 2013
Karthick S
 
Ferraz Itp368 Optmizing Information Security
Ferraz Itp368 Optmizing Information SecurityFerraz Itp368 Optmizing Information Security
Ferraz Itp368 Optmizing Information Security
mferraz
 
Extend Governance in Hadoop with Atlas Ecosystem: Waterline, Attivo & Trifacta
Extend Governance in Hadoop with Atlas Ecosystem: Waterline, Attivo & TrifactaExtend Governance in Hadoop with Atlas Ecosystem: Waterline, Attivo & Trifacta
Extend Governance in Hadoop with Atlas Ecosystem: Waterline, Attivo & Trifacta
DataWorks Summit/Hadoop Summit
 
Case Studies: Enterprise BI vs Self-Service Analytics Tools: Real Life Consid...
Case Studies: Enterprise BI vs Self-Service Analytics Tools: Real Life Consid...Case Studies: Enterprise BI vs Self-Service Analytics Tools: Real Life Consid...
Case Studies: Enterprise BI vs Self-Service Analytics Tools: Real Life Consid...
Senturus
 
The Enterprise File Fabric for Service Providers | Solution Brief
The Enterprise File Fabric for Service Providers | Solution BriefThe Enterprise File Fabric for Service Providers | Solution Brief
The Enterprise File Fabric for Service Providers | Solution Brief
Hybrid Cloud
 
Create a Compliance Strategy for Office 365
Create a Compliance Strategy for Office 365Create a Compliance Strategy for Office 365
Create a Compliance Strategy for Office 365
Erica Toelle
 

Similar to Bringing policy based classification to Sharepoint (20)

How classification changes the way you look into corporate data
How classification changes the way you look into corporate dataHow classification changes the way you look into corporate data
How classification changes the way you look into corporate data
 
Strategies for policy driven information classification
Strategies for policy driven information classificationStrategies for policy driven information classification
Strategies for policy driven information classification
 
Share point server 2016 as a document management solution
Share point server 2016 as a document management solutionShare point server 2016 as a document management solution
Share point server 2016 as a document management solution
 
Security and Compliance with SharePoint and Office 365
Security and Compliance with SharePoint and Office 365Security and Compliance with SharePoint and Office 365
Security and Compliance with SharePoint and Office 365
 
Make a case for Data Classification in your organization
Make a case for Data Classification in your organizationMake a case for Data Classification in your organization
Make a case for Data Classification in your organization
 
Flare - Connecting Your Organization With Its Information
Flare - Connecting Your Organization With Its InformationFlare - Connecting Your Organization With Its Information
Flare - Connecting Your Organization With Its Information
 
SqlSat Victoria governance for PowerBI
SqlSat Victoria governance for PowerBISqlSat Victoria governance for PowerBI
SqlSat Victoria governance for PowerBI
 
Office 365 Vancouver. A Team Approach to Azure Information Protection
Office 365 Vancouver. A Team Approach to Azure Information ProtectionOffice 365 Vancouver. A Team Approach to Azure Information Protection
Office 365 Vancouver. A Team Approach to Azure Information Protection
 
SPTechCon Boston 2013 - Introduction to Security in Microsoft Sharepoint 2013...
SPTechCon Boston 2013 - Introduction to Security in Microsoft Sharepoint 2013...SPTechCon Boston 2013 - Introduction to Security in Microsoft Sharepoint 2013...
SPTechCon Boston 2013 - Introduction to Security in Microsoft Sharepoint 2013...
 
File Security in Microsoft SharePoint and OneDrive
File Security in Microsoft SharePoint and OneDriveFile Security in Microsoft SharePoint and OneDrive
File Security in Microsoft SharePoint and OneDrive
 
RSA SecurBook for Microsoft SharePoint
RSA SecurBook for Microsoft SharePointRSA SecurBook for Microsoft SharePoint
RSA SecurBook for Microsoft SharePoint
 
B2 - The History of Content Security: Part 2 - Adam Levithan
B2 - The History of Content Security: Part 2 - Adam LevithanB2 - The History of Content Security: Part 2 - Adam Levithan
B2 - The History of Content Security: Part 2 - Adam Levithan
 
What the #$* is a Business Catalog and why you need it
What the #$* is a Business Catalog and why you need it What the #$* is a Business Catalog and why you need it
What the #$* is a Business Catalog and why you need it
 
Apache Atlas: Why Big Data Management Requires Hierarchical Taxonomies
Apache Atlas: Why Big Data Management Requires Hierarchical Taxonomies Apache Atlas: Why Big Data Management Requires Hierarchical Taxonomies
Apache Atlas: Why Big Data Management Requires Hierarchical Taxonomies
 
Digital asset management using SharePoint 2013
Digital asset management using SharePoint 2013Digital asset management using SharePoint 2013
Digital asset management using SharePoint 2013
 
Ferraz Itp368 Optmizing Information Security
Ferraz Itp368 Optmizing Information SecurityFerraz Itp368 Optmizing Information Security
Ferraz Itp368 Optmizing Information Security
 
Extend Governance in Hadoop with Atlas Ecosystem: Waterline, Attivo & Trifacta
Extend Governance in Hadoop with Atlas Ecosystem: Waterline, Attivo & TrifactaExtend Governance in Hadoop with Atlas Ecosystem: Waterline, Attivo & Trifacta
Extend Governance in Hadoop with Atlas Ecosystem: Waterline, Attivo & Trifacta
 
Case Studies: Enterprise BI vs Self-Service Analytics Tools: Real Life Consid...
Case Studies: Enterprise BI vs Self-Service Analytics Tools: Real Life Consid...Case Studies: Enterprise BI vs Self-Service Analytics Tools: Real Life Consid...
Case Studies: Enterprise BI vs Self-Service Analytics Tools: Real Life Consid...
 
The Enterprise File Fabric for Service Providers | Solution Brief
The Enterprise File Fabric for Service Providers | Solution BriefThe Enterprise File Fabric for Service Providers | Solution Brief
The Enterprise File Fabric for Service Providers | Solution Brief
 
Create a Compliance Strategy for Office 365
Create a Compliance Strategy for Office 365Create a Compliance Strategy for Office 365
Create a Compliance Strategy for Office 365
 

More from Watchful Software

Behavior biometrics - The silent revolution in digital fingerprinting
Behavior biometrics - The silent revolution in digital fingerprintingBehavior biometrics - The silent revolution in digital fingerprinting
Behavior biometrics - The silent revolution in digital fingerprinting
Watchful Software
 
Jump start EU Data Privacy Compliance with Data Classification
Jump start EU Data Privacy Compliance with Data ClassificationJump start EU Data Privacy Compliance with Data Classification
Jump start EU Data Privacy Compliance with Data Classification
Watchful Software
 
Leverage your Siem Tool with RightsWATCH
Leverage your Siem Tool with RightsWATCHLeverage your Siem Tool with RightsWATCH
Leverage your Siem Tool with RightsWATCH
Watchful Software
 
Global Thought Leadership Webcast Presentation
Global Thought Leadership Webcast PresentationGlobal Thought Leadership Webcast Presentation
Global Thought Leadership Webcast Presentation
Watchful Software
 
Top 10 Best Practices for Implementing Data Classification
Top 10 Best Practices for Implementing Data ClassificationTop 10 Best Practices for Implementing Data Classification
Top 10 Best Practices for Implementing Data Classification
Watchful Software
 
You can't teach an old dog new tricks
You can't teach an old dog new tricksYou can't teach an old dog new tricks
You can't teach an old dog new tricks
Watchful Software
 
The BYOD Security Battleground
The BYOD Security BattlegroundThe BYOD Security Battleground
The BYOD Security Battleground
Watchful Software
 
The X Factor in Data Centric Security
The X Factor in Data Centric SecurityThe X Factor in Data Centric Security
The X Factor in Data Centric Security
Watchful Software
 
The 5 Key Trends for Insider Threat
The 5 Key Trends for Insider ThreatThe 5 Key Trends for Insider Threat
The 5 Key Trends for Insider Threat
Watchful Software
 

More from Watchful Software (9)

Behavior biometrics - The silent revolution in digital fingerprinting
Behavior biometrics - The silent revolution in digital fingerprintingBehavior biometrics - The silent revolution in digital fingerprinting
Behavior biometrics - The silent revolution in digital fingerprinting
 
Jump start EU Data Privacy Compliance with Data Classification
Jump start EU Data Privacy Compliance with Data ClassificationJump start EU Data Privacy Compliance with Data Classification
Jump start EU Data Privacy Compliance with Data Classification
 
Leverage your Siem Tool with RightsWATCH
Leverage your Siem Tool with RightsWATCHLeverage your Siem Tool with RightsWATCH
Leverage your Siem Tool with RightsWATCH
 
Global Thought Leadership Webcast Presentation
Global Thought Leadership Webcast PresentationGlobal Thought Leadership Webcast Presentation
Global Thought Leadership Webcast Presentation
 
Top 10 Best Practices for Implementing Data Classification
Top 10 Best Practices for Implementing Data ClassificationTop 10 Best Practices for Implementing Data Classification
Top 10 Best Practices for Implementing Data Classification
 
You can't teach an old dog new tricks
You can't teach an old dog new tricksYou can't teach an old dog new tricks
You can't teach an old dog new tricks
 
The BYOD Security Battleground
The BYOD Security BattlegroundThe BYOD Security Battleground
The BYOD Security Battleground
 
The X Factor in Data Centric Security
The X Factor in Data Centric SecurityThe X Factor in Data Centric Security
The X Factor in Data Centric Security
 
The 5 Key Trends for Insider Threat
The 5 Key Trends for Insider ThreatThe 5 Key Trends for Insider Threat
The 5 Key Trends for Insider Threat
 

Recently uploaded

KuberTENes Birthday Bash Guadalajara - Introducción a Argo CD
KuberTENes Birthday Bash Guadalajara - Introducción a Argo CDKuberTENes Birthday Bash Guadalajara - Introducción a Argo CD
KuberTENes Birthday Bash Guadalajara - Introducción a Argo CD
rodomar2
 
Utilocate provides Smarter, Better, Faster, Safer Locate Ticket Management
Utilocate provides Smarter, Better, Faster, Safer Locate Ticket ManagementUtilocate provides Smarter, Better, Faster, Safer Locate Ticket Management
Utilocate provides Smarter, Better, Faster, Safer Locate Ticket Management
Utilocate
 
Webinar On-Demand: Using Flutter for Embedded
Webinar On-Demand: Using Flutter for EmbeddedWebinar On-Demand: Using Flutter for Embedded
Webinar On-Demand: Using Flutter for Embedded
ICS
 
E-commerce Development Services- Hornet Dynamics
E-commerce Development Services- Hornet DynamicsE-commerce Development Services- Hornet Dynamics
E-commerce Development Services- Hornet Dynamics
Hornet Dynamics
 
Microservice Teams - How the cloud changes the way we work
Microservice Teams - How the cloud changes the way we workMicroservice Teams - How the cloud changes the way we work
Microservice Teams - How the cloud changes the way we work
Sven Peters
 
A Study of Variable-Role-based Feature Enrichment in Neural Models of Code
A Study of Variable-Role-based Feature Enrichment in Neural Models of CodeA Study of Variable-Role-based Feature Enrichment in Neural Models of Code
A Study of Variable-Role-based Feature Enrichment in Neural Models of Code
Aftab Hussain
 
AI Fusion Buddy Review: Brand New, Groundbreaking Gemini-Powered AI App
AI Fusion Buddy Review: Brand New, Groundbreaking Gemini-Powered AI AppAI Fusion Buddy Review: Brand New, Groundbreaking Gemini-Powered AI App
AI Fusion Buddy Review: Brand New, Groundbreaking Gemini-Powered AI App
Google
 
Energy consumption of Database Management - Florina Jonuzi
Energy consumption of Database Management - Florina JonuziEnergy consumption of Database Management - Florina Jonuzi
Energy consumption of Database Management - Florina Jonuzi
Green Software Development
 
How to write a program in any programming language
How to write a program in any programming languageHow to write a program in any programming language
How to write a program in any programming language
Rakesh Kumar R
 
What is Augmented Reality Image Tracking
What is Augmented Reality Image TrackingWhat is Augmented Reality Image Tracking
What is Augmented Reality Image Tracking
pavan998932
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
APIs for Browser Automation (MoT Meetup 2024)
APIs for Browser Automation (MoT Meetup 2024)APIs for Browser Automation (MoT Meetup 2024)
APIs for Browser Automation (MoT Meetup 2024)
Boni García
 
Oracle Database 19c New Features for DBAs and Developers.pptx
Oracle Database 19c New Features for DBAs and Developers.pptxOracle Database 19c New Features for DBAs and Developers.pptx
Oracle Database 19c New Features for DBAs and Developers.pptx
Remote DBA Services
 
Enterprise Resource Planning System in Telangana
Enterprise Resource Planning System in TelanganaEnterprise Resource Planning System in Telangana
Enterprise Resource Planning System in Telangana
NYGGS Automation Suite
 
openEuler Case Study - The Journey to Supply Chain Security
openEuler Case Study - The Journey to Supply Chain SecurityopenEuler Case Study - The Journey to Supply Chain Security
openEuler Case Study - The Journey to Supply Chain Security
Shane Coughlan
 
原版定制美国纽约州立大学奥尔巴尼分校毕业证学位证书原版一模一样
原版定制美国纽约州立大学奥尔巴尼分校毕业证学位证书原版一模一样原版定制美国纽约州立大学奥尔巴尼分校毕业证学位证书原版一模一样
原版定制美国纽约州立大学奥尔巴尼分校毕业证学位证书原版一模一样
mz5nrf0n
 
Why Mobile App Regression Testing is Critical for Sustained Success_ A Detail...
Why Mobile App Regression Testing is Critical for Sustained Success_ A Detail...Why Mobile App Regression Testing is Critical for Sustained Success_ A Detail...
Why Mobile App Regression Testing is Critical for Sustained Success_ A Detail...
kalichargn70th171
 
E-commerce Application Development Company.pdf
E-commerce Application Development Company.pdfE-commerce Application Development Company.pdf
E-commerce Application Development Company.pdf
Hornet Dynamics
 
ALGIT - Assembly Line for Green IT - Numbers, Data, Facts
ALGIT - Assembly Line for Green IT - Numbers, Data, FactsALGIT - Assembly Line for Green IT - Numbers, Data, Facts
ALGIT - Assembly Line for Green IT - Numbers, Data, Facts
Green Software Development
 
Graspan: A Big Data System for Big Code Analysis
Graspan: A Big Data System for Big Code AnalysisGraspan: A Big Data System for Big Code Analysis
Graspan: A Big Data System for Big Code Analysis
Aftab Hussain
 

Recently uploaded (20)

KuberTENes Birthday Bash Guadalajara - Introducción a Argo CD
KuberTENes Birthday Bash Guadalajara - Introducción a Argo CDKuberTENes Birthday Bash Guadalajara - Introducción a Argo CD
KuberTENes Birthday Bash Guadalajara - Introducción a Argo CD
 
Utilocate provides Smarter, Better, Faster, Safer Locate Ticket Management
Utilocate provides Smarter, Better, Faster, Safer Locate Ticket ManagementUtilocate provides Smarter, Better, Faster, Safer Locate Ticket Management
Utilocate provides Smarter, Better, Faster, Safer Locate Ticket Management
 
Webinar On-Demand: Using Flutter for Embedded
Webinar On-Demand: Using Flutter for EmbeddedWebinar On-Demand: Using Flutter for Embedded
Webinar On-Demand: Using Flutter for Embedded
 
E-commerce Development Services- Hornet Dynamics
E-commerce Development Services- Hornet DynamicsE-commerce Development Services- Hornet Dynamics
E-commerce Development Services- Hornet Dynamics
 
Microservice Teams - How the cloud changes the way we work
Microservice Teams - How the cloud changes the way we workMicroservice Teams - How the cloud changes the way we work
Microservice Teams - How the cloud changes the way we work
 
A Study of Variable-Role-based Feature Enrichment in Neural Models of Code
A Study of Variable-Role-based Feature Enrichment in Neural Models of CodeA Study of Variable-Role-based Feature Enrichment in Neural Models of Code
A Study of Variable-Role-based Feature Enrichment in Neural Models of Code
 
AI Fusion Buddy Review: Brand New, Groundbreaking Gemini-Powered AI App
AI Fusion Buddy Review: Brand New, Groundbreaking Gemini-Powered AI AppAI Fusion Buddy Review: Brand New, Groundbreaking Gemini-Powered AI App
AI Fusion Buddy Review: Brand New, Groundbreaking Gemini-Powered AI App
 
Energy consumption of Database Management - Florina Jonuzi
Energy consumption of Database Management - Florina JonuziEnergy consumption of Database Management - Florina Jonuzi
Energy consumption of Database Management - Florina Jonuzi
 
How to write a program in any programming language
How to write a program in any programming languageHow to write a program in any programming language
How to write a program in any programming language
 
What is Augmented Reality Image Tracking
What is Augmented Reality Image TrackingWhat is Augmented Reality Image Tracking
What is Augmented Reality Image Tracking
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
APIs for Browser Automation (MoT Meetup 2024)
APIs for Browser Automation (MoT Meetup 2024)APIs for Browser Automation (MoT Meetup 2024)
APIs for Browser Automation (MoT Meetup 2024)
 
Oracle Database 19c New Features for DBAs and Developers.pptx
Oracle Database 19c New Features for DBAs and Developers.pptxOracle Database 19c New Features for DBAs and Developers.pptx
Oracle Database 19c New Features for DBAs and Developers.pptx
 
Enterprise Resource Planning System in Telangana
Enterprise Resource Planning System in TelanganaEnterprise Resource Planning System in Telangana
Enterprise Resource Planning System in Telangana
 
openEuler Case Study - The Journey to Supply Chain Security
openEuler Case Study - The Journey to Supply Chain SecurityopenEuler Case Study - The Journey to Supply Chain Security
openEuler Case Study - The Journey to Supply Chain Security
 
原版定制美国纽约州立大学奥尔巴尼分校毕业证学位证书原版一模一样
原版定制美国纽约州立大学奥尔巴尼分校毕业证学位证书原版一模一样原版定制美国纽约州立大学奥尔巴尼分校毕业证学位证书原版一模一样
原版定制美国纽约州立大学奥尔巴尼分校毕业证学位证书原版一模一样
 
Why Mobile App Regression Testing is Critical for Sustained Success_ A Detail...
Why Mobile App Regression Testing is Critical for Sustained Success_ A Detail...Why Mobile App Regression Testing is Critical for Sustained Success_ A Detail...
Why Mobile App Regression Testing is Critical for Sustained Success_ A Detail...
 
E-commerce Application Development Company.pdf
E-commerce Application Development Company.pdfE-commerce Application Development Company.pdf
E-commerce Application Development Company.pdf
 
ALGIT - Assembly Line for Green IT - Numbers, Data, Facts
ALGIT - Assembly Line for Green IT - Numbers, Data, FactsALGIT - Assembly Line for Green IT - Numbers, Data, Facts
ALGIT - Assembly Line for Green IT - Numbers, Data, Facts
 
Graspan: A Big Data System for Big Code Analysis
Graspan: A Big Data System for Big Code AnalysisGraspan: A Big Data System for Big Code Analysis
Graspan: A Big Data System for Big Code Analysis
 

Bringing policy based classification to Sharepoint

  • 1. Bringing Policy- Based Classification to SharePoint www.watchfulsoftware.com February, 17th 2016
  • 2. Friday, February 26, 2016 © Copyright www.watchfulsoftware.com. 2016 All Rights Reserved. 2 Agenda 1 Introductions & “House Rules” 2 Business Context 3 Demo 4 What does RightsWATCH add to native IRM support in SharePoint? 5 Q&A andWrap-up
  • 3. Introductions House Rules  You are muted centrally.You don’t need to mute/unmute yourself  This webinar is being recorded.You’ll have access to it On-demand at www.watchfulsoftware.com/en/resources  The Q&A session will be at the end.You are welcomed to enter questions anytime, using the Questions feature in the GoToWebinar control panel © Copyright www.watchfulsoftware.com. 2016 All Rights Reserved. 3 Cátia Franco Cátia serves as Product Marketing Manager for Watchful Software, and is responsible for product strategy, positioning and messaging. Friday, February 26, 2016
  • 4. 1 SharePoint is a powerful and widely used collaboration tool 2 SharePoint is used by companies that need to control access to files 3 Security is not in the average user job description 4 RightsWATCH is able to enforce it’s policy-driven classification engine to SharePoint Business Context © Copyright www.watchfulsoftware.com. 2016 All Rights Reserved. 4Friday, February 26, 2016
  • 5. Enhancing SharePoint’s secure collaboration experience © Copyright www.watchfulsoftware.com. 2016 All Rights Reserved. 5 SharePoint admin defines the policy: Every Microsoft Office or PDF file that is added to specified libraries on SharePoint need to be classified as “Confidential” or above SharePoint running RightsWATCH SharePoint user uploads an unclassified Microsoft Word, Excel, PowerPoint and/or PDF file to one of the SharePoint libraries that has RightsWATCH policy rules SharePoint user logs into SharePoint on his/her desktop, smartphone, laptop or tablet. He/she downloads (or checks out) one (or more) classified files. RightsWATCH tags and marks, RMS encryption and RBAC is enforced The RightsWATCH SharePoint add-on automatically classifies every Microsoft Office and PDF file that is added to the specified libraries as “Confidential”.  If the files are previously classified with a classification level below ”Confidential”, RightsWATCH upgrades the file classification  If the files are previously classified with a classification level higher than “Confidential”, RightsWATCH leaves the file unchanged. Friday, February 26, 2016
  • 6. RightsWATCH & SharePoint Demo © Copyright www.watchfulsoftware.com. 2016 All Rights Reserved. 6Friday, February 26, 2016
  • 7. What does RightsWATCH add to native IRM support in SharePoint? © Copyright www.watchfulsoftware.com. 2016 All Rights Reserved. 7 SharePoint with native IRM protection SharePoint with RightsWATCH Data Classification Role-based Access Control Friday, February 26, 2016
  • 8. What does RightsWATCH add to native IRM support in SharePoint? © Copyright www.watchfulsoftware.com. 2016 All Rights Reserved. 8 SharePoint with native IRM protection SharePoint with RightsWATCH Only MS Office files are supported MS Office and PDF files Does not integrate with Microsoft RMS templates Integrates with Microsoft RMS templates SharePoint manages what library can be accessed RMS templates manage what can be done to/with the document itself Specific actions and who can take them are based upon the LIBRARY Specific actions and who can take them are based upon the USER Users are assigned to levels and groups and thus inherit access controls through that membership Role-based access control is enforced over the files (without any user intervention or security/control actions) Documents are stored in the SharePoint database unencrypted and unprotected Every MS Office or PDF file that is added/uploaded becomes automatically classified and/or RMS protected according to corporate policy Ad-hoc IRM permissions are applied - IRM rights being applied are the same for every user (aka "One size fits all") Corporate policy templates can be applied, ensuring that the appropriate classification, marking, and protections are applied Users are able to search the content of the files and have access to the content The content of the RMS protected files are not indexable nor searchable by users while inside SP (except for file metadata) Friday, February 26, 2016
  • 9. Q&A andWrap-up Check out the “Resources” area on www.watchfulsoftware.com and watch short product walkthrough demonstrations of how RightsWATCH address a comprehensive set of use cases E-mail info@watchfulsoftware.com to request a demo of RightsWATCH This webinar is being recorded.You’ll have access to it On-demand at www.watchfulsoftware.com Friday, February 26, 2016 © Copyright www.watchfulsoftware.com. 2016 All Rights Reserved. 9
  • 10. Bringing Policy- Based Classification to SharePoint www.watchfulsoftware.com February, 17th 2016

Editor's Notes

  1. In terms of collaboration, RightsWATCH comes with the ability to enhance SharePoint On-prem security. Organizations can now automatically classify and RMS protect Microsoft Office and PDF files added to a specific SharePoint library. i.e. files can be automatically classified and RMS protected when being uploaded to SharePoint libraries. The user does not need to have RightsWATCH installed on his/her laptop or desktop, nor is the user asked to do anything besides the usual workflow of uploading the files into SharePoint.
  2. SharePoint includes access controls policies when it comes to who can access a specific library and who has Read, Write, etc… privileges inside those libraries SharePoint comes with Information Rights Management (IRM) integration, leveraging Rights Management Services (RMS) to: Apply Rights Management to MS Office files that are downloaded from a specific library in SP The SP admin sets it up, so that every MS Office file that is downloaded from that library, gets RMS automatically applied Every user that downloads or checks out the file, can only see and do with the file, what is enforced by RMS