Presented By: Peter Ward June 26th, 2008  Information  Theft Document  Encryption Workflow Templates IRM Electronic Signature RMS Encryption
Thank you for attending this web X The conference call dial in will be put on  mute for the presentation Q&A – We will have time at the end of the presentation for questions A copy of the presentation is on my blog:  www.wardpeter.com
Information theft – How much of it really goes on Document Encryption- Rights Information Management  Reduce risks of spoliation, theft, and advanced security controls  Work with client installation and activation Protection and consumption of data.  IRM vs RMS Session Review
U.S. companies lost $133 billion as a result of proprietary information theft in 2005, up from $59 billion in 2002.  CSI/FBI 2005 Computer Crime and Security Survey None of the legacy security technologies solves the specific problem posed by unstructured data.  CIO/Insight Enterprise rights management will become the default approach used by organizations to managing access control policies and security for data at rest and in transit.  Gartner Group How much is this  data really worth to the company?
Microsoft Rights Management Server Part of Windows Server 2003 Works with Active Directory Encrypts documents End Users Office Professional 2003, or Professional Plus 2007, not standard, or anything else. RMS client installed Only Office documents, not PDF docs
Read/Edit Stop deletion of documents Copying of content Print screen Log all activity
IRM – Information Rights Management; term that refers to the abstract management of digital assets that are rights-protected (managerial term). RMS – Rights Management Services; term that refers to Microsoft’s technical implementation of IRM (technical term).
RMS is not a  ‘have a go’  technology  You have to deploy it right the first time Should consider the following: Recovery procedures  End user training Templates and right management Know what you want in terms of security. This is  only part of the security solution Ask yourself  ‘How valuable is your data  when it’s in the wrong hands?’
Peter Ward Business Collaboration Manager E:  [email_address] P:  212-502-3937 W:  www.InterDynAKA.com B:  www.wardpeter.com

Microsoft Rights Management

  • 1.
    Presented By: PeterWard June 26th, 2008 Information Theft Document Encryption Workflow Templates IRM Electronic Signature RMS Encryption
  • 2.
    Thank you forattending this web X The conference call dial in will be put on mute for the presentation Q&A – We will have time at the end of the presentation for questions A copy of the presentation is on my blog: www.wardpeter.com
  • 3.
    Information theft –How much of it really goes on Document Encryption- Rights Information Management Reduce risks of spoliation, theft, and advanced security controls Work with client installation and activation Protection and consumption of data. IRM vs RMS Session Review
  • 4.
    U.S. companies lost$133 billion as a result of proprietary information theft in 2005, up from $59 billion in 2002. CSI/FBI 2005 Computer Crime and Security Survey None of the legacy security technologies solves the specific problem posed by unstructured data. CIO/Insight Enterprise rights management will become the default approach used by organizations to managing access control policies and security for data at rest and in transit. Gartner Group How much is this data really worth to the company?
  • 5.
    Microsoft Rights ManagementServer Part of Windows Server 2003 Works with Active Directory Encrypts documents End Users Office Professional 2003, or Professional Plus 2007, not standard, or anything else. RMS client installed Only Office documents, not PDF docs
  • 6.
    Read/Edit Stop deletionof documents Copying of content Print screen Log all activity
  • 7.
    IRM – InformationRights Management; term that refers to the abstract management of digital assets that are rights-protected (managerial term). RMS – Rights Management Services; term that refers to Microsoft’s technical implementation of IRM (technical term).
  • 8.
    RMS is nota ‘have a go’ technology You have to deploy it right the first time Should consider the following: Recovery procedures End user training Templates and right management Know what you want in terms of security. This is only part of the security solution Ask yourself ‘How valuable is your data when it’s in the wrong hands?’
  • 9.
    Peter Ward BusinessCollaboration Manager E: [email_address] P: 212-502-3937 W: www.InterDynAKA.com B: www.wardpeter.com