What is IRM
Security and Compliance for unstructured information
Vishal Gupta
CEO
Seclore
www.seclore.com
TELEMARKETER
Information exchange in the collaborative world
Information is exchanged between Employees of the organisation
Enterprise
CUSTOMERS
VENDORS
Information is exchanged between employees & vendors & employees & customers
Competitors
VPN
SSL
UTM
Firewall
…
Firewalls
TELEMARKETER
Information exchange in the collaborative world
Enterprise
CUSTOMERS
VENDORS
Competitors
What happens if an employee with privileged access leaves to join a competitor ?
What happens if information shared with a vendor is lost by the vendor ?
VPN
SSL
UTM
Firewall
…
Firewalls
Underlying Issues
Share it = It becomes his (also)
Ownership and usage cannot be separated
Shared once = Shared forever
Impossible to “recall” information
Out of the enterprise = Free for all
Technology & processes are only applicable within
The Result
Information lands up in public websites !
Create Store Transmit & collaborate Use Archive & Backup Delete
DLP Anti-virus Anti-…
Hard disk encryption
SSL UTM
Application security
IDM DLP Vaults Digital shredders
Desktops
Laptops
Heterogeneous policies … Heterogeneous infrastructure
Mobile
devices
Removable
media
Email
Content
Management
Online
workspaces
Remote
desktops
Information lifecycle …
Shared
folders Removable
media
Instant
Messaging
Desktops
Laptops
Mobile
devices
Archive
Backup
Document
retention
Security
Options for securing unstructured
information
Option 1 : Control Distribution
. . .
Security Collaboration
Options for securing unstructured
information
Option 2 : Control Usage
. . .
Security Collaboration
Right
Location
Right
Time
Right
Action
Right
Person
• WHO can use the information
People & groups within and outside of the organization
can be defined as rightful users of the information
• WHAT can each person do
Individual actions like reading, editing, printing,
distributing, copy-pasting, screen grabbing etc.
can be controlled
• WHEN can he use it
Information usage can be time based e.g. can only be
used by Mr. A till 28th Sept OR only for the 2
days
• WHERE can he use it from
Information can be linked to locations e.g. only 3rd
floor office by private/public IP addresses
IRM allow enterprises to define, implement & track information usage
“policies”. A “policy” defines :
Information Rights Management
Policy Admin
Computer
Policy definition …
… Policy definition
Policy Admin
Computer
Owners’s
Computer
Policy application by end users …
Owners’s
Computer
Information Classification
Protected document
Owners’s
Computer
Receiver’s
Computer
Disclaimer on document access
Unauthorized attempt to print
Receiver’s
Computer
Unauthorized attempt to print
Receiver’s
Computer
Unauthorized attempt to copy
Receiver’s
Computer
Unauthorized attempt to copy
Receiver’s
Computer
“Screen Print”
of a protected
document
Unauthorized attempt to print screen
Receiver’s
Computer
Audit trails capture
authorized activities
AND
unauthorized attempts
Audit trail for compliance
Owners’s
Computer
Audit trail for compliance
Owners’s
Computer
About …About …
Seclore is a high growth information security product company focussed on
providing Security without compromising collaboration
Seclore’s flagship product Seclore FileSecure is used by More than 1
million users & some of the largest enterprises
. . .
Thank You
Vishal Gupta
info [at] seclore dot com
+91-22-4015-5252
www.seclore.com
Scenario: Research reports & drawings
WHO WHAT WHEN WHERE
Read Edit Print
Distri
bute
Sanjiv Yes Yes No No Till the time of
employment
Within office
network
Rahul Yes No No No 30th
November 2009 Within office
network
organization
Rahul
Sanjiv

What is IRM? bright talk

  • 1.
    What is IRM Securityand Compliance for unstructured information Vishal Gupta CEO Seclore www.seclore.com
  • 2.
    TELEMARKETER Information exchange inthe collaborative world Information is exchanged between Employees of the organisation Enterprise CUSTOMERS VENDORS Information is exchanged between employees & vendors & employees & customers Competitors VPN SSL UTM Firewall … Firewalls
  • 3.
    TELEMARKETER Information exchange inthe collaborative world Enterprise CUSTOMERS VENDORS Competitors What happens if an employee with privileged access leaves to join a competitor ? What happens if information shared with a vendor is lost by the vendor ? VPN SSL UTM Firewall … Firewalls
  • 4.
    Underlying Issues Share it= It becomes his (also) Ownership and usage cannot be separated Shared once = Shared forever Impossible to “recall” information Out of the enterprise = Free for all Technology & processes are only applicable within
  • 5.
    The Result Information landsup in public websites !
  • 6.
    Create Store Transmit& collaborate Use Archive & Backup Delete DLP Anti-virus Anti-… Hard disk encryption SSL UTM Application security IDM DLP Vaults Digital shredders Desktops Laptops Heterogeneous policies … Heterogeneous infrastructure Mobile devices Removable media Email Content Management Online workspaces Remote desktops Information lifecycle … Shared folders Removable media Instant Messaging Desktops Laptops Mobile devices Archive Backup Document retention Security
  • 7.
    Options for securingunstructured information Option 1 : Control Distribution . . . Security Collaboration
  • 8.
    Options for securingunstructured information Option 2 : Control Usage . . . Security Collaboration Right Location Right Time Right Action Right Person
  • 9.
    • WHO canuse the information People & groups within and outside of the organization can be defined as rightful users of the information • WHAT can each person do Individual actions like reading, editing, printing, distributing, copy-pasting, screen grabbing etc. can be controlled • WHEN can he use it Information usage can be time based e.g. can only be used by Mr. A till 28th Sept OR only for the 2 days • WHERE can he use it from Information can be linked to locations e.g. only 3rd floor office by private/public IP addresses IRM allow enterprises to define, implement & track information usage “policies”. A “policy” defines : Information Rights Management
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
    Unauthorized attempt toprint Receiver’s Computer
  • 17.
    Unauthorized attempt toprint Receiver’s Computer
  • 18.
    Unauthorized attempt tocopy Receiver’s Computer
  • 19.
    Unauthorized attempt tocopy Receiver’s Computer
  • 20.
    “Screen Print” of aprotected document Unauthorized attempt to print screen Receiver’s Computer
  • 21.
    Audit trails capture authorizedactivities AND unauthorized attempts Audit trail for compliance Owners’s Computer
  • 22.
    Audit trail forcompliance Owners’s Computer
  • 23.
    About …About … Secloreis a high growth information security product company focussed on providing Security without compromising collaboration Seclore’s flagship product Seclore FileSecure is used by More than 1 million users & some of the largest enterprises . . .
  • 24.
    Thank You Vishal Gupta info[at] seclore dot com +91-22-4015-5252 www.seclore.com
  • 25.
    Scenario: Research reports& drawings WHO WHAT WHEN WHERE Read Edit Print Distri bute Sanjiv Yes Yes No No Till the time of employment Within office network Rahul Yes No No No 30th November 2009 Within office network organization Rahul Sanjiv