SlideShare a Scribd company logo
Protect your business data with
secured Apps and content
October 18th, 2018
Stéphane Dayras,
Pre Sales Director.
stephane.dayras@rakuten.com
2
Agenda
How to secure your enterprise data with secured Apps and digital contents.
• Apps deployment method (public or private/enterprise)
• Restricted access through authentication
• Content encryption
• Confidential content dissemination through Voucher codes
• Hidden and contextual Storefronts
3
• Deployment methods
• Apple
• / > B > LA GM A MFB M> B >FLB B>
• - / > B > , BEMDL:F>GM DP ) :P DBEBL > :DB :LBGF
L> LA GM A , D> BF (A ML : >D> :L> LA> BF:D :DB :LBGF L> G LA> , M EB BGF
• - - MFDBEBL> > MB > :DB :LBGF GE , D>
• GDME> M A: > G :E G > M :LBGF D: > >FL> B > LG > G E:F: >
B L B MLBGF LA GM A 4/4 LGGD
• / - - - - E:F: > > DGPE>FL LA GM A 4/4 4,4 GDMLBGF
• Google
• D:P LG > > > L .ABF: 9B:GEB -:B M 4>B M
• ,DL> F:LB > LG > 1 / GB , LGB > , 4: C>L 2 E: L G D ,E: GF , LG >
• - - 044 4:F: > D:P LG >
4
Restricted Access
Available options:
• Block the whole App access through the « Force Login » option
• Restricted access to some documents via authentication (Profile/Log in)
combined with the “Require authentication” metadata on the related
documents
Unified authentication with the enterprise directory through our SAML connection
(brings SSO in the App).
5
Content encryption
3 output formats can be encrypted (iOS, Android and Web) :
• AVE-pdf (Cloud Authoring and DRM option)
• AVE-mag (Adobe InDesign plugin and DRM option in ZAVE Utility)
• Web Reader: can be encrypted only through the Web Kiosk which manages
the encrypted key transmission. More complex (requires code integration by the
customer) and performance slow-down.
All contents are encrypted except the enrichments.
6
Confidential contents
How to restrict access to some App parts (storefronts) and contents, without
authentication required.
Available options:
• Hide and release specific documents for specific users through Vouchers &
Deeplinks
• Hidden storefronts released through Deeplinks
Webinar Rakuten Aquafadas - Protect your business data with secured apps and content

More Related Content

Similar to Webinar Rakuten Aquafadas - Protect your business data with secured apps and content

Microsoft Ignite Recap: Microsoft 365 Security & Compliance with Vlad & Drew
Microsoft Ignite Recap: Microsoft 365 Security & Compliance with Vlad & DrewMicrosoft Ignite Recap: Microsoft 365 Security & Compliance with Vlad & Drew
Microsoft Ignite Recap: Microsoft 365 Security & Compliance with Vlad & Drew
Drew Madelung
 
Six Strategies for Protecting Mobile Games Against Hackers, Crackers, and Cop...
Six Strategies for Protecting Mobile Games Against Hackers, Crackers, and Cop...Six Strategies for Protecting Mobile Games Against Hackers, Crackers, and Cop...
Six Strategies for Protecting Mobile Games Against Hackers, Crackers, and Cop...
AppSolid by SEWORKS
 
CollabDaysBE - Microsoft Purview Information Protection demystified
CollabDaysBE - Microsoft Purview Information Protection demystifiedCollabDaysBE - Microsoft Purview Information Protection demystified
CollabDaysBE - Microsoft Purview Information Protection demystified
Albert Hoitingh
 
#GDPR Compliance - Data Minimization via ArchivePod
#GDPR Compliance - Data Minimization via ArchivePod#GDPR Compliance - Data Minimization via ArchivePod
#GDPR Compliance - Data Minimization via ArchivePod
Garet Keller
 
The Whys and Hows of Deploying a Secure RPA Solution
The Whys and Hows of Deploying a Secure RPA SolutionThe Whys and Hows of Deploying a Secure RPA Solution
The Whys and Hows of Deploying a Secure RPA Solution
Option3
 
Hybrid Cloud Approach for Secure Authorized Deduplication
Hybrid Cloud Approach for Secure Authorized DeduplicationHybrid Cloud Approach for Secure Authorized Deduplication
Hybrid Cloud Approach for Secure Authorized DeduplicationPrem Rao
 
Asug84339 how to secure privacy data in a hybrid s4 hana landscape
Asug84339   how to secure privacy data in a hybrid s4 hana landscapeAsug84339   how to secure privacy data in a hybrid s4 hana landscape
Asug84339 how to secure privacy data in a hybrid s4 hana landscape
Dharma Atluri
 
Mobile code mining for discovery and exploits nullcongoa2013
Mobile code mining for discovery and exploits nullcongoa2013Mobile code mining for discovery and exploits nullcongoa2013
Mobile code mining for discovery and exploits nullcongoa2013
Blueinfy Solutions
 
F5 Networks: миграция c Microsoft TMG
F5 Networks: миграция c Microsoft TMGF5 Networks: миграция c Microsoft TMG
F5 Networks: миграция c Microsoft TMG
Dmitry Tikhovich
 
Google Drive Integration
Google Drive IntegrationGoogle Drive Integration
Google Drive Integration
Connecting Software
 
Meer doen met Office 365 - Cloud seminar
Meer doen met Office 365 - Cloud seminarMeer doen met Office 365 - Cloud seminar
Meer doen met Office 365 - Cloud seminar
Delta-N
 
Emma Aubert | Information Protection
Emma Aubert | Information ProtectionEmma Aubert | Information Protection
Emma Aubert | Information Protection
Microsoft Österreich
 
How to use Bluetooth® Smart to control your embedded device with a mobile device
How to use Bluetooth® Smart to control your embedded device with a mobile deviceHow to use Bluetooth® Smart to control your embedded device with a mobile device
How to use Bluetooth® Smart to control your embedded device with a mobile device
Anaren, Inc.
 
Follow the Yellow Brick Road to Google Apps Setup & Security Success
Follow the Yellow Brick Road to Google Apps Setup & Security SuccessFollow the Yellow Brick Road to Google Apps Setup & Security Success
Follow the Yellow Brick Road to Google Apps Setup & Security Success
Datto
 
Informatica big data relational topics and presentation
Informatica big data relational topics and presentationInformatica big data relational topics and presentation
Informatica big data relational topics and presentation
Janardhan Reddy
 
ArchivePod a legacy data solution when migrating to the #CLOUD
ArchivePod a legacy data solution when migrating to the #CLOUDArchivePod a legacy data solution when migrating to the #CLOUD
ArchivePod a legacy data solution when migrating to the #CLOUD
Garet Keller
 
Building cross platfrom solutions for enterprise - the mobileshow- may 2014
Building cross platfrom solutions for enterprise - the mobileshow- may 2014Building cross platfrom solutions for enterprise - the mobileshow- may 2014
Building cross platfrom solutions for enterprise - the mobileshow- may 2014
Kareem ElSayyed
 
SkypeShield - Securing Skype for Business
SkypeShield - Securing Skype for BusinessSkypeShield - Securing Skype for Business
SkypeShield - Securing Skype for Business
Yoav Crombie
 
How to Test Security and Vulnerability of Your Android and iOS Apps
How to Test Security and Vulnerability of Your Android and iOS AppsHow to Test Security and Vulnerability of Your Android and iOS Apps
How to Test Security and Vulnerability of Your Android and iOS Apps
Bitbar
 
Implementing a Data Mesh with Apache Kafka with Adam Bellemare | Kafka Summit...
Implementing a Data Mesh with Apache Kafka with Adam Bellemare | Kafka Summit...Implementing a Data Mesh with Apache Kafka with Adam Bellemare | Kafka Summit...
Implementing a Data Mesh with Apache Kafka with Adam Bellemare | Kafka Summit...
HostedbyConfluent
 

Similar to Webinar Rakuten Aquafadas - Protect your business data with secured apps and content (20)

Microsoft Ignite Recap: Microsoft 365 Security & Compliance with Vlad & Drew
Microsoft Ignite Recap: Microsoft 365 Security & Compliance with Vlad & DrewMicrosoft Ignite Recap: Microsoft 365 Security & Compliance with Vlad & Drew
Microsoft Ignite Recap: Microsoft 365 Security & Compliance with Vlad & Drew
 
Six Strategies for Protecting Mobile Games Against Hackers, Crackers, and Cop...
Six Strategies for Protecting Mobile Games Against Hackers, Crackers, and Cop...Six Strategies for Protecting Mobile Games Against Hackers, Crackers, and Cop...
Six Strategies for Protecting Mobile Games Against Hackers, Crackers, and Cop...
 
CollabDaysBE - Microsoft Purview Information Protection demystified
CollabDaysBE - Microsoft Purview Information Protection demystifiedCollabDaysBE - Microsoft Purview Information Protection demystified
CollabDaysBE - Microsoft Purview Information Protection demystified
 
#GDPR Compliance - Data Minimization via ArchivePod
#GDPR Compliance - Data Minimization via ArchivePod#GDPR Compliance - Data Minimization via ArchivePod
#GDPR Compliance - Data Minimization via ArchivePod
 
The Whys and Hows of Deploying a Secure RPA Solution
The Whys and Hows of Deploying a Secure RPA SolutionThe Whys and Hows of Deploying a Secure RPA Solution
The Whys and Hows of Deploying a Secure RPA Solution
 
Hybrid Cloud Approach for Secure Authorized Deduplication
Hybrid Cloud Approach for Secure Authorized DeduplicationHybrid Cloud Approach for Secure Authorized Deduplication
Hybrid Cloud Approach for Secure Authorized Deduplication
 
Asug84339 how to secure privacy data in a hybrid s4 hana landscape
Asug84339   how to secure privacy data in a hybrid s4 hana landscapeAsug84339   how to secure privacy data in a hybrid s4 hana landscape
Asug84339 how to secure privacy data in a hybrid s4 hana landscape
 
Mobile code mining for discovery and exploits nullcongoa2013
Mobile code mining for discovery and exploits nullcongoa2013Mobile code mining for discovery and exploits nullcongoa2013
Mobile code mining for discovery and exploits nullcongoa2013
 
F5 Networks: миграция c Microsoft TMG
F5 Networks: миграция c Microsoft TMGF5 Networks: миграция c Microsoft TMG
F5 Networks: миграция c Microsoft TMG
 
Google Drive Integration
Google Drive IntegrationGoogle Drive Integration
Google Drive Integration
 
Meer doen met Office 365 - Cloud seminar
Meer doen met Office 365 - Cloud seminarMeer doen met Office 365 - Cloud seminar
Meer doen met Office 365 - Cloud seminar
 
Emma Aubert | Information Protection
Emma Aubert | Information ProtectionEmma Aubert | Information Protection
Emma Aubert | Information Protection
 
How to use Bluetooth® Smart to control your embedded device with a mobile device
How to use Bluetooth® Smart to control your embedded device with a mobile deviceHow to use Bluetooth® Smart to control your embedded device with a mobile device
How to use Bluetooth® Smart to control your embedded device with a mobile device
 
Follow the Yellow Brick Road to Google Apps Setup & Security Success
Follow the Yellow Brick Road to Google Apps Setup & Security SuccessFollow the Yellow Brick Road to Google Apps Setup & Security Success
Follow the Yellow Brick Road to Google Apps Setup & Security Success
 
Informatica big data relational topics and presentation
Informatica big data relational topics and presentationInformatica big data relational topics and presentation
Informatica big data relational topics and presentation
 
ArchivePod a legacy data solution when migrating to the #CLOUD
ArchivePod a legacy data solution when migrating to the #CLOUDArchivePod a legacy data solution when migrating to the #CLOUD
ArchivePod a legacy data solution when migrating to the #CLOUD
 
Building cross platfrom solutions for enterprise - the mobileshow- may 2014
Building cross platfrom solutions for enterprise - the mobileshow- may 2014Building cross platfrom solutions for enterprise - the mobileshow- may 2014
Building cross platfrom solutions for enterprise - the mobileshow- may 2014
 
SkypeShield - Securing Skype for Business
SkypeShield - Securing Skype for BusinessSkypeShield - Securing Skype for Business
SkypeShield - Securing Skype for Business
 
How to Test Security and Vulnerability of Your Android and iOS Apps
How to Test Security and Vulnerability of Your Android and iOS AppsHow to Test Security and Vulnerability of Your Android and iOS Apps
How to Test Security and Vulnerability of Your Android and iOS Apps
 
Implementing a Data Mesh with Apache Kafka with Adam Bellemare | Kafka Summit...
Implementing a Data Mesh with Apache Kafka with Adam Bellemare | Kafka Summit...Implementing a Data Mesh with Apache Kafka with Adam Bellemare | Kafka Summit...
Implementing a Data Mesh with Apache Kafka with Adam Bellemare | Kafka Summit...
 

More from Rakuten Aquafadas

Adobe DPS, what's next? How to migrate from an existing digital publishing pl...
Adobe DPS, what's next? How to migrate from an existing digital publishing pl...Adobe DPS, what's next? How to migrate from an existing digital publishing pl...
Adobe DPS, what's next? How to migrate from an existing digital publishing pl...
Rakuten Aquafadas
 
Pianifica e Costruisci App di successo
Pianifica e Costruisci App di successoPianifica e Costruisci App di successo
Pianifica e Costruisci App di successo
Rakuten Aquafadas
 
Erstellen einer erfolgreichen App in sechs Schritten
Erstellen einer erfolgreichen App in sechs SchrittenErstellen einer erfolgreichen App in sechs Schritten
Erstellen einer erfolgreichen App in sechs Schritten
Rakuten Aquafadas
 
Créez votre application mobile gratuitement et sans connaissances techniques
Créez votre application mobile gratuitement et sans connaissances techniquesCréez votre application mobile gratuitement et sans connaissances techniques
Créez votre application mobile gratuitement et sans connaissances techniques
Rakuten Aquafadas
 
Planifique, construya, y alcance el éxito con aplicaciones – Webinar
Planifique, construya, y alcance el éxito con aplicaciones – WebinarPlanifique, construya, y alcance el éxito con aplicaciones – Webinar
Planifique, construya, y alcance el éxito con aplicaciones – Webinar
Rakuten Aquafadas
 
Webinar Rakuten Aquafadas - Sécurisez vos données d'entreprise avec des appli...
Webinar Rakuten Aquafadas - Sécurisez vos données d'entreprise avec des appli...Webinar Rakuten Aquafadas - Sécurisez vos données d'entreprise avec des appli...
Webinar Rakuten Aquafadas - Sécurisez vos données d'entreprise avec des appli...
Rakuten Aquafadas
 
Adecco app case study: from a pilot app project to an indispensable internal ...
Adecco app case study: from a pilot app project to an indispensable internal ...Adecco app case study: from a pilot app project to an indispensable internal ...
Adecco app case study: from a pilot app project to an indispensable internal ...
Rakuten Aquafadas
 
Webinar : Planifier, créer et réussir avec les applications
Webinar : Planifier, créer et réussir avec les applicationsWebinar : Planifier, créer et réussir avec les applications
Webinar : Planifier, créer et réussir avec les applications
Rakuten Aquafadas
 
Webinar : Plan, build and succeed with apps
Webinar : Plan, build and succeed with appsWebinar : Plan, build and succeed with apps
Webinar : Plan, build and succeed with apps
Rakuten Aquafadas
 
Cree experiencias móviles elegantes con nuestro nuevo PlugIn para InDesign – ...
Cree experiencias móviles elegantes con nuestro nuevo PlugIn para InDesign – ...Cree experiencias móviles elegantes con nuestro nuevo PlugIn para InDesign – ...
Cree experiencias móviles elegantes con nuestro nuevo PlugIn para InDesign – ...
Rakuten Aquafadas
 
Webinar- How to integrate interactive and engaging contents to your Apps?
Webinar- How to integrate interactive and engaging contents to your Apps?Webinar- How to integrate interactive and engaging contents to your Apps?
Webinar- How to integrate interactive and engaging contents to your Apps?
Rakuten Aquafadas
 
Webinar - Comment intégrer des contenus riches et attractifs dans vos Apps
Webinar - Comment intégrer des contenus riches et attractifs dans vos AppsWebinar - Comment intégrer des contenus riches et attractifs dans vos Apps
Webinar - Comment intégrer des contenus riches et attractifs dans vos Apps
Rakuten Aquafadas
 
Webinar - Créer des expériences mobiles bluffantes : nouveau plugin pour Adob...
Webinar - Créer des expériences mobiles bluffantes : nouveau plugin pour Adob...Webinar - Créer des expériences mobiles bluffantes : nouveau plugin pour Adob...
Webinar - Créer des expériences mobiles bluffantes : nouveau plugin pour Adob...
Rakuten Aquafadas
 
Webinar - Create elegant mobile experiences thanks to the new plugin for Adob...
Webinar - Create elegant mobile experiences thanks to the new plugin for Adob...Webinar - Create elegant mobile experiences thanks to the new plugin for Adob...
Webinar - Create elegant mobile experiences thanks to the new plugin for Adob...
Rakuten Aquafadas
 
Apps & ePub3: Digital Publishing 101 for Magazine & Book Publishers
Apps & ePub3: Digital Publishing 101 for Magazine & Book PublishersApps & ePub3: Digital Publishing 101 for Magazine & Book Publishers
Apps & ePub3: Digital Publishing 101 for Magazine & Book Publishers
Rakuten Aquafadas
 
Aquafadas la cantine_janv_2012
Aquafadas la cantine_janv_2012Aquafadas la cantine_janv_2012
Aquafadas la cantine_janv_2012
Rakuten Aquafadas
 

More from Rakuten Aquafadas (18)

Adobe DPS, what's next? How to migrate from an existing digital publishing pl...
Adobe DPS, what's next? How to migrate from an existing digital publishing pl...Adobe DPS, what's next? How to migrate from an existing digital publishing pl...
Adobe DPS, what's next? How to migrate from an existing digital publishing pl...
 
Pianifica e Costruisci App di successo
Pianifica e Costruisci App di successoPianifica e Costruisci App di successo
Pianifica e Costruisci App di successo
 
Erstellen einer erfolgreichen App in sechs Schritten
Erstellen einer erfolgreichen App in sechs SchrittenErstellen einer erfolgreichen App in sechs Schritten
Erstellen einer erfolgreichen App in sechs Schritten
 
Créez votre application mobile gratuitement et sans connaissances techniques
Créez votre application mobile gratuitement et sans connaissances techniquesCréez votre application mobile gratuitement et sans connaissances techniques
Créez votre application mobile gratuitement et sans connaissances techniques
 
Planifique, construya, y alcance el éxito con aplicaciones – Webinar
Planifique, construya, y alcance el éxito con aplicaciones – WebinarPlanifique, construya, y alcance el éxito con aplicaciones – Webinar
Planifique, construya, y alcance el éxito con aplicaciones – Webinar
 
Webinar Rakuten Aquafadas - Sécurisez vos données d'entreprise avec des appli...
Webinar Rakuten Aquafadas - Sécurisez vos données d'entreprise avec des appli...Webinar Rakuten Aquafadas - Sécurisez vos données d'entreprise avec des appli...
Webinar Rakuten Aquafadas - Sécurisez vos données d'entreprise avec des appli...
 
Adecco app case study: from a pilot app project to an indispensable internal ...
Adecco app case study: from a pilot app project to an indispensable internal ...Adecco app case study: from a pilot app project to an indispensable internal ...
Adecco app case study: from a pilot app project to an indispensable internal ...
 
Webinar : Planifier, créer et réussir avec les applications
Webinar : Planifier, créer et réussir avec les applicationsWebinar : Planifier, créer et réussir avec les applications
Webinar : Planifier, créer et réussir avec les applications
 
Webinar : Plan, build and succeed with apps
Webinar : Plan, build and succeed with appsWebinar : Plan, build and succeed with apps
Webinar : Plan, build and succeed with apps
 
Cree experiencias móviles elegantes con nuestro nuevo PlugIn para InDesign – ...
Cree experiencias móviles elegantes con nuestro nuevo PlugIn para InDesign – ...Cree experiencias móviles elegantes con nuestro nuevo PlugIn para InDesign – ...
Cree experiencias móviles elegantes con nuestro nuevo PlugIn para InDesign – ...
 
Webinar- How to integrate interactive and engaging contents to your Apps?
Webinar- How to integrate interactive and engaging contents to your Apps?Webinar- How to integrate interactive and engaging contents to your Apps?
Webinar- How to integrate interactive and engaging contents to your Apps?
 
Webinar - Comment intégrer des contenus riches et attractifs dans vos Apps
Webinar - Comment intégrer des contenus riches et attractifs dans vos AppsWebinar - Comment intégrer des contenus riches et attractifs dans vos Apps
Webinar - Comment intégrer des contenus riches et attractifs dans vos Apps
 
Webinar - Créer des expériences mobiles bluffantes : nouveau plugin pour Adob...
Webinar - Créer des expériences mobiles bluffantes : nouveau plugin pour Adob...Webinar - Créer des expériences mobiles bluffantes : nouveau plugin pour Adob...
Webinar - Créer des expériences mobiles bluffantes : nouveau plugin pour Adob...
 
Webinar - Create elegant mobile experiences thanks to the new plugin for Adob...
Webinar - Create elegant mobile experiences thanks to the new plugin for Adob...Webinar - Create elegant mobile experiences thanks to the new plugin for Adob...
Webinar - Create elegant mobile experiences thanks to the new plugin for Adob...
 
Apps & ePub3: Digital Publishing 101 for Magazine & Book Publishers
Apps & ePub3: Digital Publishing 101 for Magazine & Book PublishersApps & ePub3: Digital Publishing 101 for Magazine & Book Publishers
Apps & ePub3: Digital Publishing 101 for Magazine & Book Publishers
 
Aquafadas's brochure
Aquafadas's brochureAquafadas's brochure
Aquafadas's brochure
 
Brochure Aquafadas
Brochure AquafadasBrochure Aquafadas
Brochure Aquafadas
 
Aquafadas la cantine_janv_2012
Aquafadas la cantine_janv_2012Aquafadas la cantine_janv_2012
Aquafadas la cantine_janv_2012
 

Recently uploaded

GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
Alex Pruden
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
SOFTTECHHUB
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 

Recently uploaded (20)

GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 

Webinar Rakuten Aquafadas - Protect your business data with secured apps and content

  • 1. Protect your business data with secured Apps and content October 18th, 2018 Stéphane Dayras, Pre Sales Director. stephane.dayras@rakuten.com
  • 2. 2 Agenda How to secure your enterprise data with secured Apps and digital contents. • Apps deployment method (public or private/enterprise) • Restricted access through authentication • Content encryption • Confidential content dissemination through Voucher codes • Hidden and contextual Storefronts
  • 3. 3 • Deployment methods • Apple • / > B > LA GM A MFB M> B >FLB B> • - / > B > , BEMDL:F>GM DP ) :P DBEBL > :DB :LBGF L> LA GM A , D> BF (A ML : >D> :L> LA> BF:D :DB :LBGF L> G LA> , M EB BGF • - - MFDBEBL> > MB > :DB :LBGF GE , D> • GDME> M A: > G :E G > M :LBGF D: > >FL> B > LG > G E:F: > B L B MLBGF LA GM A 4/4 LGGD • / - - - - E:F: > > DGPE>FL LA GM A 4/4 4,4 GDMLBGF • Google • D:P LG > > > L .ABF: 9B:GEB -:B M 4>B M • ,DL> F:LB > LG > 1 / GB , LGB > , 4: C>L 2 E: L G D ,E: GF , LG > • - - 044 4:F: > D:P LG >
  • 4. 4 Restricted Access Available options: • Block the whole App access through the « Force Login » option • Restricted access to some documents via authentication (Profile/Log in) combined with the “Require authentication” metadata on the related documents Unified authentication with the enterprise directory through our SAML connection (brings SSO in the App).
  • 5. 5 Content encryption 3 output formats can be encrypted (iOS, Android and Web) : • AVE-pdf (Cloud Authoring and DRM option) • AVE-mag (Adobe InDesign plugin and DRM option in ZAVE Utility) • Web Reader: can be encrypted only through the Web Kiosk which manages the encrypted key transmission. More complex (requires code integration by the customer) and performance slow-down. All contents are encrypted except the enrichments.
  • 6. 6 Confidential contents How to restrict access to some App parts (storefronts) and contents, without authentication required. Available options: • Hide and release specific documents for specific users through Vouchers & Deeplinks • Hidden storefronts released through Deeplinks