IRM will address information security needs for all types of enterprises.IRM is a set of policies and technologies that help enterprises control the usage of information contained in shared documents.
How to Remove Document Management Hurdles with X-Docs?
What is IRM? bright talk
1. What is IRM
Security and Compliance for unstructured information
Vishal Gupta
CEO
Seclore
www.seclore.com
2. TELEMARKETER
Information exchange in the collaborative world
Information is exchanged between Employees of the organisation
Enterprise
CUSTOMERS
VENDORS
Information is exchanged between employees & vendors & employees & customers
Competitors
VPN
SSL
UTM
Firewall
…
Firewalls
3. TELEMARKETER
Information exchange in the collaborative world
Enterprise
CUSTOMERS
VENDORS
Competitors
What happens if an employee with privileged access leaves to join a competitor ?
What happens if information shared with a vendor is lost by the vendor ?
VPN
SSL
UTM
Firewall
…
Firewalls
4. Underlying Issues
Share it = It becomes his (also)
Ownership and usage cannot be separated
Shared once = Shared forever
Impossible to “recall” information
Out of the enterprise = Free for all
Technology & processes are only applicable within
6. Create Store Transmit & collaborate Use Archive & Backup Delete
DLP Anti-virus Anti-…
Hard disk encryption
SSL UTM
Application security
IDM DLP Vaults Digital shredders
Desktops
Laptops
Heterogeneous policies … Heterogeneous infrastructure
Mobile
devices
Removable
media
Email
Content
Management
Online
workspaces
Remote
desktops
Information lifecycle …
Shared
folders Removable
media
Instant
Messaging
Desktops
Laptops
Mobile
devices
Archive
Backup
Document
retention
Security
7. Options for securing unstructured
information
Option 1 : Control Distribution
. . .
Security Collaboration
8. Options for securing unstructured
information
Option 2 : Control Usage
. . .
Security Collaboration
Right
Location
Right
Time
Right
Action
Right
Person
9. • WHO can use the information
People & groups within and outside of the organization
can be defined as rightful users of the information
• WHAT can each person do
Individual actions like reading, editing, printing,
distributing, copy-pasting, screen grabbing etc.
can be controlled
• WHEN can he use it
Information usage can be time based e.g. can only be
used by Mr. A till 28th Sept OR only for the 2
days
• WHERE can he use it from
Information can be linked to locations e.g. only 3rd
floor office by private/public IP addresses
IRM allow enterprises to define, implement & track information usage
“policies”. A “policy” defines :
Information Rights Management
23. About …About …
Seclore is a high growth information security product company focussed on
providing Security without compromising collaboration
Seclore’s flagship product Seclore FileSecure is used by More than 1
million users & some of the largest enterprises
. . .
25. Scenario: Research reports & drawings
WHO WHAT WHEN WHERE
Read Edit Print
Distri
bute
Sanjiv Yes Yes No No Till the time of
employment
Within office
network
Rahul Yes No No No 30th
November 2009 Within office
network
organization
Rahul
Sanjiv