Information Rights Management – Concepts and
Execution
Sudha Chandrasekhar
Vice President
Seclore Technology
Securing Information Wherever It Goes
Most of us can keep a secret.
It is the people we tell it to, who cannot.
- Anonymous
Structured
Databases
Digital
Information
Applications
ERP, CRM, DW
MIS / Reports / Data Extracts Content
Files, Folders, Emails
Unstructured
Information
Gartner 2013
Big Content: The Unstructured Side of Big Data
“Unstructured data represents as much as
80% of an organization’s total information
assets”
Enterprise Information Universe
Internal: Perimeter Definition Challenges
End Points Locations
People Applications
Bring Your Own
Device
iPads in Boardroom
Mobile Employees
External
Collaboration
Lawyers, Auditors,
Partners, Service
Providers, Joint Ventures
…
Cloud Applications:
SalesForce…
Cloud Services:
DropBox…
Very often, information needs to travel outside the enterprise
boundary to:
Every enterprise needs External Collaboration
External: Information Going Out
Legacy Handling of Information Loss #1
Non-Disclosure Agreement
Legacy Handling of Information
Loss #2
Legacy Handling of Information Loss #3
Information
sent
out(side)
is
IMPOSSIBLE
to control
The Problem…
INFORMATION
OWNER
What Controls Are Required on your
Information
Permanence
Protection will always persist with the file
Remote-Control
Change your protection policy,
sitting anywhere in the world
Audit Trail
All activities on file tracked:
Users, Activity type, Date/Time,
Location
What other features will be
required?
1. Ease of Protection - Automating Policy assignment
2. Easy for user
3. Senior Management involvement
Key requirements for successful
implementation of IRM
12 Seclore Company Confidential
API
Integration
ERP, CRM,
DW, etc.
Data Loss
Prevention
Content /
Document
Management
Mail &
Messaging
* Recipient
can use any
mail client
Ease of protection (Automatic
Protection)
Use in native application
• File extension in maintained
• File opens in native application
(e.g. MS-Office, Acrobat Reader, AutoCAD, OpenOffice)
User authentication
For internal users, integrate with AD and other IAM / SSO tools
Smart devices support
iOS and Android viewers, for smartphone and tabs
BYOD
Easy for Users
Access for external users
Senior Management
Involvement
1. Buy in from the senior leadership of the organization
2. High visibility
• Internal marketing of the project
• Awareness of security risk
3. Process changes to handle regulatory and compliance data
Thank You!
www.seclore.com | info@seclore.com | http://blog.seclore.com

Seclore: Information Rights Management

  • 1.
    Information Rights Management– Concepts and Execution Sudha Chandrasekhar Vice President Seclore Technology
  • 2.
    Securing Information WhereverIt Goes Most of us can keep a secret. It is the people we tell it to, who cannot. - Anonymous
  • 3.
    Structured Databases Digital Information Applications ERP, CRM, DW MIS/ Reports / Data Extracts Content Files, Folders, Emails Unstructured Information Gartner 2013 Big Content: The Unstructured Side of Big Data “Unstructured data represents as much as 80% of an organization’s total information assets” Enterprise Information Universe
  • 4.
    Internal: Perimeter DefinitionChallenges End Points Locations People Applications Bring Your Own Device iPads in Boardroom Mobile Employees External Collaboration Lawyers, Auditors, Partners, Service Providers, Joint Ventures … Cloud Applications: SalesForce… Cloud Services: DropBox…
  • 5.
    Very often, informationneeds to travel outside the enterprise boundary to: Every enterprise needs External Collaboration External: Information Going Out
  • 6.
    Legacy Handling ofInformation Loss #1 Non-Disclosure Agreement
  • 7.
    Legacy Handling ofInformation Loss #2
  • 8.
    Legacy Handling ofInformation Loss #3
  • 9.
  • 10.
    INFORMATION OWNER What Controls AreRequired on your Information
  • 11.
    Permanence Protection will alwayspersist with the file Remote-Control Change your protection policy, sitting anywhere in the world Audit Trail All activities on file tracked: Users, Activity type, Date/Time, Location What other features will be required?
  • 12.
    1. Ease ofProtection - Automating Policy assignment 2. Easy for user 3. Senior Management involvement Key requirements for successful implementation of IRM 12 Seclore Company Confidential
  • 13.
    API Integration ERP, CRM, DW, etc. DataLoss Prevention Content / Document Management Mail & Messaging * Recipient can use any mail client Ease of protection (Automatic Protection)
  • 14.
    Use in nativeapplication • File extension in maintained • File opens in native application (e.g. MS-Office, Acrobat Reader, AutoCAD, OpenOffice) User authentication For internal users, integrate with AD and other IAM / SSO tools Smart devices support iOS and Android viewers, for smartphone and tabs BYOD Easy for Users Access for external users
  • 15.
    Senior Management Involvement 1. Buyin from the senior leadership of the organization 2. High visibility • Internal marketing of the project • Awareness of security risk 3. Process changes to handle regulatory and compliance data
  • 16.
    Thank You! www.seclore.com |info@seclore.com | http://blog.seclore.com

Editor's Notes

  • #12 Can we please say the word “literally” somewhere? ;-)
  • #15 Can we please say the word “literally” somewhere? ;-)
  • #16 Can we please say the word “literally” somewhere? ;-)