SlideShare a Scribd company logo
Microsoft
Rights Management Services (RMS)
What’s New?
A presentation by SECUDE
WHAT IS
RMS ?
Rights Management Services (RMS) are
offerings from Microsoft that help keep an
organizations information…
SECURE
Rights Management Services (RMS) are
offerings from Microsoft that help keep an
organizations information
Data-centric protection
Protection is applied directly to the data and documents
Data-centric protection
Protection is applied directly to the data and documents
Data-centric protection
Protection is applied directly to the data and documents
Wherever the data is moved
Data-centric protection
Protection is applied directly to the data and documents
Wherever the data is moved
THE PROTECTION STAYS WITH IT
Documents are protected
Documents are protected
 At a single location
On premise
Documents are protected
 Inside and outside the
organization
 At a single location
Partner
On premise
Shared
Documents are protected
 Inside and outside the
organization
 At a single location
 And when moving amongst various locations
Partner
On premise
Shared
Collaboration
Fine-grained control
Content owners can define who can
Fine-grained control
Content owners can define who can
 Open the document
Fine-grained control
Content owners can define who can
 Open the document
 Edit the contents
Fine-grained control
Content owners can define who can
 Open the document
 Edit the contents
 Print the document
Fine-grained control
Content owners can define who can
 Open the document
 Edit the contents
 Print the document
 Forward to anyone, internal or external
Fine-grained control
Content owners can define who can
 Open the document
 Edit the contents
 Print the document
 Forward to anyone, internal or external
 Take other actions with the information
Fine-grained control
Content owners can define who can
 Open the document
 Edit the contents
 Print the document
 Forward to anyone, internal or external
 Take other actions with the information
Fine-grained control
Content owners can define who can
 Open the document
 Edit the contents
 Print the document
 Forward to anyone, internal or external
 Take other actions with the information
Windows Azure RMS provides
A secure collaboration platform
Windows Azure RMS provides
A secure collaboration platform
For sharing between
organizations
Your Employees
Partner
SO WHAT’S
NEW ?
Not limited to Microsoft Office
RMS protects more than just Microsoft
Office documents
Not limited to Microsoft Office
RMS protects more than just Microsoft
Office documents
It now protects PDF’s, images, and more
Not limited to Windows
Documents can now be accessed on
many devices, not just Windows PC’s
Not limited to Windows
Documents can now be accessed on
many devices, not just Windows PC’s
Tablets
Not limited to Windows
Documents can now be accessed on
many devices, not just Windows PC’s
Android
Tablets
Not limited to Windows
Documents can now be accessed on
many devices, not just Windows PC’s
Android
Tablets
iPhone
Not limited to Windows
Documents can now be accessed on
many devices, not just Windows PC’s
Android
iPad
Tablets
iPhone
Share with Partners
Documents can be safely shared with
other organizations
…not just
within your company
Summary
With the new Rights Management
Services, users can:
 Sign up for RMS for free if you don’t already
have it
 Protect any file type
 Consume protected files on any device
 Share files with anyone
DIG DEEPER
Data is not exposed
Azure RMS never actually sees customer
data
Data is not exposed
Azure RMS never actually sees customer
data
Documents are protected, viewed, and
shared by the user, without ever being
sent to the Azure service
IT Dept. has control
IT departments can:
 keep data on premise and not move anything
to the cloud (their choice)
 be aware of how protected data is being
treated, viewed, and used
 control RMS tenant key on-premise
User Confidence Established
 Users can now be
confident that their
files are protected
 When files are shared
outside of the
organization,
protected documents
will be accessible to
the recipient No more sharing inaccessible
locked documents
Storage Options
Data and information has the flexibility to be
stored
Storage Options
Data and information has the flexibility to be
stored
on-premise
Storage Options
Data and information has the flexibility to be
stored
on-premise in the cloud
Storage Options
Data and information has the flexibility to be
stored
on-premise in the cloud
on any storage location
Storage Options
Data and information has the flexibility to be
stored
on-premise in the cloud
on any storage location
…and remain protected.
RMS & CLOUD READY
ORGANIZATIONS
Simply Enabled
 Within the combined and
integrated environment
of Office 365, RMS is
very simple to enable
 Just click one button and
deep RMS integration
can be enabled with
Exchange, SharePoint,
and the complete Office
2013 suite.
Collaboration
 This is the simplest way to get started with RMS.
 Office 365 users benefit
from generic protection
of any file type through
the RMS applications.
 They also have the
ability to collaborate
with non-Office 365
organizations and
individuals
BREAKDOWN OF FEATURES
Azure RMS
Microsoft Rights Management Services is
hosted in Azure and handles all service
duties.
The Azure RMS service relies on
Windows Azure Active Directory and
associated services (Directory Sync and
Federation).
High Value Tenant Keys
 Azure RMS requires storage for the high
value tenant keys at the core of RMS.
 The key management service (KMS) stores
RMS tenant keys securely
 The KMS also offers the Bring-Your-Own-
Key capability where CISO’s can generate a
key on premise, using tools of their choice, in
compliance with their own policies.
Rights Management Connector
The ‘connector’ pretends to be an AD
RMS server for the on-premise Exchange
and SharePoint workloads.
All requests are then relayed to the Azure-
hosted RMS service.
On Premise Email – within your
company
Most users have an Outlook Exchange
deployment with no form of information
protection.
Adding the Microsoft Rights Management
connector to Exchange deployments will
leave the Exchange fully RMS-capable.
The data never leaves the cloud but can
be protected.
Further Protection
For SAP Users
Protecting information as it
leaves SAP
 Information regularly
leaves ERP
applications like SAP
Protecting information as it
leaves SAP
 Information regularly
leaves ERP
applications like SAP
 Protection protocols
no longer exist on the
data once it leaves
SAP
Protecting information as it
leaves SAP
 Information regularly
leaves ERP
applications like SAP
 Protection protocols
no longer exist on the
data once it leaves
SAP
Microsoft speaks on the importance of protecting
data stored in ERP (Enterprise Resource
Planning) applications
FOR MORE INFORMATION
Read Now Microsoft RMS is now limiting SAP
data leakage with the help of SECUDE
Audit Data Movement
Monitor the activities surrounding the
information
 Track, record and classify data movement
 Identify who accesses it
 From where they access it (IP address &
terminal)
 Where they send it to
 Extract data for analysis
DOWNLOAD FREE AUDIT
NOW
Click HERE
PRESENTATION BY
Tweet us @secude
Contact us info@secude.com

More Related Content

What's hot

NIC 2017 Did you like Azure RMS? You will like Azure Information Protection e...
NIC 2017 Did you like Azure RMS? You will like Azure Information Protection e...NIC 2017 Did you like Azure RMS? You will like Azure Information Protection e...
NIC 2017 Did you like Azure RMS? You will like Azure Information Protection e...
Morgan Simonsen
 
Microsoft 365 Security and Compliance
Microsoft 365 Security and ComplianceMicrosoft 365 Security and Compliance
Microsoft 365 Security and Compliance
David J Rosenthal
 
Get Ahead of Cyber Attacks with Microsoft Enterprise Mobility + Security
Get Ahead of Cyber Attacks with Microsoft Enterprise Mobility + SecurityGet Ahead of Cyber Attacks with Microsoft Enterprise Mobility + Security
Get Ahead of Cyber Attacks with Microsoft Enterprise Mobility + Security
David J Rosenthal
 
Digital Asset Management with ES4
Digital Asset Management with ES4Digital Asset Management with ES4
Digital Asset Management with ES4
Activo Consulting
 
SaaS Platform Securing
SaaS Platform SecuringSaaS Platform Securing
SaaS Platform Securing
Leo TechnoSoft
 
Microsoft Cloud App Security CASB
Microsoft Cloud App Security CASBMicrosoft Cloud App Security CASB
Microsoft Cloud App Security CASB
Ammar Hasayen
 
EMS Diagram Click Through Web
EMS Diagram Click Through WebEMS Diagram Click Through Web
EMS Diagram Click Through WebEric Inch
 
MMS 2015: What is ems and how to configure it
MMS 2015: What is ems and how to configure itMMS 2015: What is ems and how to configure it
MMS 2015: What is ems and how to configure it
Peter Daalmans
 
Secure Productive Enterprise from Microsoft and Atidan
Secure Productive Enterprise from Microsoft and AtidanSecure Productive Enterprise from Microsoft and Atidan
Secure Productive Enterprise from Microsoft and Atidan
David J Rosenthal
 
DALIM SOFTWARE GmbH Keynote TechLab DAM NY 2017
DALIM SOFTWARE GmbH Keynote TechLab DAM NY 2017DALIM SOFTWARE GmbH Keynote TechLab DAM NY 2017
DALIM SOFTWARE GmbH Keynote TechLab DAM NY 2017
Activo Consulting
 
IAM Cloud
IAM CloudIAM Cloud
IAM Cloud
Aidy Tificate
 
[IGNITE2018] [BRK2495] What’s new in Microsoft Information Protection solutio...
[IGNITE2018] [BRK2495] What’s new in Microsoft Information Protection solutio...[IGNITE2018] [BRK2495] What’s new in Microsoft Information Protection solutio...
[IGNITE2018] [BRK2495] What’s new in Microsoft Information Protection solutio...
☁️ Gustavo Magella
 
Intro to Office 365 Security & Compliance Center
Intro to Office 365 Security & Compliance CenterIntro to Office 365 Security & Compliance Center
Intro to Office 365 Security & Compliance Center
Craig Jahnke
 
Cloud App Security
Cloud App SecurityCloud App Security
Cloud App Security
Alvaro Rezende
 
Implementing zero trust architecture in azure hybrid cloud
Implementing zero trust architecture in azure hybrid cloudImplementing zero trust architecture in azure hybrid cloud
Implementing zero trust architecture in azure hybrid cloud
Ajit Bhingarkar
 
Empower Enterprise Mobility- Maximize Mobile Control- Presented by Atidan
Empower Enterprise Mobility- Maximize Mobile Control- Presented by AtidanEmpower Enterprise Mobility- Maximize Mobile Control- Presented by Atidan
Empower Enterprise Mobility- Maximize Mobile Control- Presented by Atidan
David J Rosenthal
 
Protect customer's personal information eng 191018
Protect customer's personal information eng 191018Protect customer's personal information eng 191018
Protect customer's personal information eng 191018
sang yoo
 
Office 365 security concerns, EU General Data Protection Regulation (GDPR)
Office 365 security concerns, EU General Data Protection Regulation (GDPR) Office 365 security concerns, EU General Data Protection Regulation (GDPR)
Office 365 security concerns, EU General Data Protection Regulation (GDPR)
Sonja Madsen
 
Microsoft Azure Information Protection
Microsoft Azure Information Protection Microsoft Azure Information Protection
Microsoft Azure Information Protection
Syed Sabhi Haider
 
Agile IT EMS webinar series, session 1
Agile IT EMS webinar series, session 1Agile IT EMS webinar series, session 1
Agile IT EMS webinar series, session 1
AgileIT
 

What's hot (20)

NIC 2017 Did you like Azure RMS? You will like Azure Information Protection e...
NIC 2017 Did you like Azure RMS? You will like Azure Information Protection e...NIC 2017 Did you like Azure RMS? You will like Azure Information Protection e...
NIC 2017 Did you like Azure RMS? You will like Azure Information Protection e...
 
Microsoft 365 Security and Compliance
Microsoft 365 Security and ComplianceMicrosoft 365 Security and Compliance
Microsoft 365 Security and Compliance
 
Get Ahead of Cyber Attacks with Microsoft Enterprise Mobility + Security
Get Ahead of Cyber Attacks with Microsoft Enterprise Mobility + SecurityGet Ahead of Cyber Attacks with Microsoft Enterprise Mobility + Security
Get Ahead of Cyber Attacks with Microsoft Enterprise Mobility + Security
 
Digital Asset Management with ES4
Digital Asset Management with ES4Digital Asset Management with ES4
Digital Asset Management with ES4
 
SaaS Platform Securing
SaaS Platform SecuringSaaS Platform Securing
SaaS Platform Securing
 
Microsoft Cloud App Security CASB
Microsoft Cloud App Security CASBMicrosoft Cloud App Security CASB
Microsoft Cloud App Security CASB
 
EMS Diagram Click Through Web
EMS Diagram Click Through WebEMS Diagram Click Through Web
EMS Diagram Click Through Web
 
MMS 2015: What is ems and how to configure it
MMS 2015: What is ems and how to configure itMMS 2015: What is ems and how to configure it
MMS 2015: What is ems and how to configure it
 
Secure Productive Enterprise from Microsoft and Atidan
Secure Productive Enterprise from Microsoft and AtidanSecure Productive Enterprise from Microsoft and Atidan
Secure Productive Enterprise from Microsoft and Atidan
 
DALIM SOFTWARE GmbH Keynote TechLab DAM NY 2017
DALIM SOFTWARE GmbH Keynote TechLab DAM NY 2017DALIM SOFTWARE GmbH Keynote TechLab DAM NY 2017
DALIM SOFTWARE GmbH Keynote TechLab DAM NY 2017
 
IAM Cloud
IAM CloudIAM Cloud
IAM Cloud
 
[IGNITE2018] [BRK2495] What’s new in Microsoft Information Protection solutio...
[IGNITE2018] [BRK2495] What’s new in Microsoft Information Protection solutio...[IGNITE2018] [BRK2495] What’s new in Microsoft Information Protection solutio...
[IGNITE2018] [BRK2495] What’s new in Microsoft Information Protection solutio...
 
Intro to Office 365 Security & Compliance Center
Intro to Office 365 Security & Compliance CenterIntro to Office 365 Security & Compliance Center
Intro to Office 365 Security & Compliance Center
 
Cloud App Security
Cloud App SecurityCloud App Security
Cloud App Security
 
Implementing zero trust architecture in azure hybrid cloud
Implementing zero trust architecture in azure hybrid cloudImplementing zero trust architecture in azure hybrid cloud
Implementing zero trust architecture in azure hybrid cloud
 
Empower Enterprise Mobility- Maximize Mobile Control- Presented by Atidan
Empower Enterprise Mobility- Maximize Mobile Control- Presented by AtidanEmpower Enterprise Mobility- Maximize Mobile Control- Presented by Atidan
Empower Enterprise Mobility- Maximize Mobile Control- Presented by Atidan
 
Protect customer's personal information eng 191018
Protect customer's personal information eng 191018Protect customer's personal information eng 191018
Protect customer's personal information eng 191018
 
Office 365 security concerns, EU General Data Protection Regulation (GDPR)
Office 365 security concerns, EU General Data Protection Regulation (GDPR) Office 365 security concerns, EU General Data Protection Regulation (GDPR)
Office 365 security concerns, EU General Data Protection Regulation (GDPR)
 
Microsoft Azure Information Protection
Microsoft Azure Information Protection Microsoft Azure Information Protection
Microsoft Azure Information Protection
 
Agile IT EMS webinar series, session 1
Agile IT EMS webinar series, session 1Agile IT EMS webinar series, session 1
Agile IT EMS webinar series, session 1
 

Viewers also liked

What is Microsoft Active Directory RMS (Rights Management Services)?
What is Microsoft Active Directory RMS (Rights Management Services)?What is Microsoft Active Directory RMS (Rights Management Services)?
What is Microsoft Active Directory RMS (Rights Management Services)?
irminsider
 
Windows Server 2012 Active Directory Rights Management Services
Windows Server 2012 Active Directory Rights Management ServicesWindows Server 2012 Active Directory Rights Management Services
Windows Server 2012 Active Directory Rights Management Services
Serhad MAKBULOĞLU, MBA
 
Active directory rights management services
Active directory rights management servicesActive directory rights management services
Active directory rights management services
laonap166
 
Active directory
Active directory Active directory
Active directory deshvikas
 
Information Rights Management (IRM)
Information Rights Management (IRM)Information Rights Management (IRM)
Information Rights Management (IRM)
Network Intelligence India
 
Securing Intellectual Property using Azure Rights Management Services
Securing Intellectual Property using Azure Rights Management ServicesSecuring Intellectual Property using Azure Rights Management Services
Securing Intellectual Property using Azure Rights Management Services
SPC Adriatics
 
Windows Server 2008 Active Directory
Windows Server 2008 Active DirectoryWindows Server 2008 Active Directory
Windows Server 2008 Active Directory
anilinvns
 
Active Directory
Active Directory Active Directory
Active Directory
Sandeep Kapadane
 
Active Directory Training
Active Directory TrainingActive Directory Training
Active Directory Training
Nishad Sukumaran
 

Viewers also liked (9)

What is Microsoft Active Directory RMS (Rights Management Services)?
What is Microsoft Active Directory RMS (Rights Management Services)?What is Microsoft Active Directory RMS (Rights Management Services)?
What is Microsoft Active Directory RMS (Rights Management Services)?
 
Windows Server 2012 Active Directory Rights Management Services
Windows Server 2012 Active Directory Rights Management ServicesWindows Server 2012 Active Directory Rights Management Services
Windows Server 2012 Active Directory Rights Management Services
 
Active directory rights management services
Active directory rights management servicesActive directory rights management services
Active directory rights management services
 
Active directory
Active directory Active directory
Active directory
 
Information Rights Management (IRM)
Information Rights Management (IRM)Information Rights Management (IRM)
Information Rights Management (IRM)
 
Securing Intellectual Property using Azure Rights Management Services
Securing Intellectual Property using Azure Rights Management ServicesSecuring Intellectual Property using Azure Rights Management Services
Securing Intellectual Property using Azure Rights Management Services
 
Windows Server 2008 Active Directory
Windows Server 2008 Active DirectoryWindows Server 2008 Active Directory
Windows Server 2008 Active Directory
 
Active Directory
Active Directory Active Directory
Active Directory
 
Active Directory Training
Active Directory TrainingActive Directory Training
Active Directory Training
 

Similar to What's New in Microsoft Rights Management Services

Microsoft_Enterprise_Mobility_plus_Security_datasheet_EN_US
Microsoft_Enterprise_Mobility_plus_Security_datasheet_EN_USMicrosoft_Enterprise_Mobility_plus_Security_datasheet_EN_US
Microsoft_Enterprise_Mobility_plus_Security_datasheet_EN_US☁ ☁ Gautam T ☁☁
 
Securely Harden Microsoft 365 with Secure Score
Securely Harden Microsoft 365 with Secure ScoreSecurely Harden Microsoft 365 with Secure Score
Securely Harden Microsoft 365 with Secure Score
Joel Oleson
 
Understanding Microsoft Teams Security & Compliance features and plan for Gov...
Understanding Microsoft Teams Security & Compliance features and plan for Gov...Understanding Microsoft Teams Security & Compliance features and plan for Gov...
Understanding Microsoft Teams Security & Compliance features and plan for Gov...
Ravikumar Sathyamurthy
 
M365 reinventing digital environment for modern workplace
M365 reinventing digital environment for modern workplaceM365 reinventing digital environment for modern workplace
M365 reinventing digital environment for modern workplace
Ahmad Almarzouk
 
Better Together Cx O V1 0
Better Together Cx O V1 0Better Together Cx O V1 0
Better Together Cx O V1 0Elizabeth Caley
 
Better Together Cx O V1 0
Better Together Cx O V1 0Better Together Cx O V1 0
Better Together Cx O V1 0Elizabeth Caley
 
Primend praktiline pilveseminar - Dokumendihalduse ja kommunikatsiooni viimin...
Primend praktiline pilveseminar - Dokumendihalduse ja kommunikatsiooni viimin...Primend praktiline pilveseminar - Dokumendihalduse ja kommunikatsiooni viimin...
Primend praktiline pilveseminar - Dokumendihalduse ja kommunikatsiooni viimin...
Primend
 
What is Microsoft Enterprise Mobility Suite and how to deploy it
What is Microsoft Enterprise Mobility Suite and how to deploy itWhat is Microsoft Enterprise Mobility Suite and how to deploy it
What is Microsoft Enterprise Mobility Suite and how to deploy it
Peter De Tender
 
05-Empowering-Enterprise-Mobility-FR.pptx
05-Empowering-Enterprise-Mobility-FR.pptx05-Empowering-Enterprise-Mobility-FR.pptx
05-Empowering-Enterprise-Mobility-FR.pptx
Ashvin Dixit
 
Security and Compliance with SharePoint and Office 365
Security and Compliance with SharePoint and Office 365Security and Compliance with SharePoint and Office 365
Security and Compliance with SharePoint and Office 365
Richard Harbridge
 
Teamwork.com Security Overvew
Teamwork.com Security OvervewTeamwork.com Security Overvew
Teamwork.com Security Overvew
Ivotefan
 
Enterprise Mobility Poster from Microsoft and Atidan
Enterprise Mobility Poster from Microsoft and AtidanEnterprise Mobility Poster from Microsoft and Atidan
Enterprise Mobility Poster from Microsoft and Atidan
David J Rosenthal
 
Microsoft 365 | Modern workplace
Microsoft 365 | Modern workplaceMicrosoft 365 | Modern workplace
Microsoft 365 | Modern workplace
Siddick Elaheebocus
 
Maintaining Trust & Control of your Data in the Cloud
Maintaining Trust & Control of your Data in the CloudMaintaining Trust & Control of your Data in the Cloud
Maintaining Trust & Control of your Data in the Cloud
Amazon Web Services
 
Microsoft Enterprise Mobility Suite Poster
Microsoft Enterprise Mobility Suite PosterMicrosoft Enterprise Mobility Suite Poster
Microsoft Enterprise Mobility Suite Poster
David J Rosenthal
 
10 server security hacks to secure your web servers
10 server security hacks to secure your web servers10 server security hacks to secure your web servers
10 server security hacks to secure your web servers
Temok IT Services
 
5 Ways How Microsoft 365 Is Helping Remote Workers
5 Ways How Microsoft 365 Is Helping Remote Workers5 Ways How Microsoft 365 Is Helping Remote Workers
5 Ways How Microsoft 365 Is Helping Remote Workers
Ace Cloud Hosting
 
Modern Workplace with Microsoft 365
Modern Workplace with Microsoft 365Modern Workplace with Microsoft 365
Modern Workplace with Microsoft 365
Ravikumar Sathyamurthy
 
Protecting Your Key Asset – Data Protection Best Practices V2.0 Final
Protecting Your Key Asset – Data Protection Best Practices V2.0   FinalProtecting Your Key Asset – Data Protection Best Practices V2.0   Final
Protecting Your Key Asset – Data Protection Best Practices V2.0 Final
Vinod Kumar
 
Securing Sensitive Data in Your Hybrid Cloud
Securing Sensitive Data in Your Hybrid CloudSecuring Sensitive Data in Your Hybrid Cloud
Securing Sensitive Data in Your Hybrid Cloud
RightScale
 

Similar to What's New in Microsoft Rights Management Services (20)

Microsoft_Enterprise_Mobility_plus_Security_datasheet_EN_US
Microsoft_Enterprise_Mobility_plus_Security_datasheet_EN_USMicrosoft_Enterprise_Mobility_plus_Security_datasheet_EN_US
Microsoft_Enterprise_Mobility_plus_Security_datasheet_EN_US
 
Securely Harden Microsoft 365 with Secure Score
Securely Harden Microsoft 365 with Secure ScoreSecurely Harden Microsoft 365 with Secure Score
Securely Harden Microsoft 365 with Secure Score
 
Understanding Microsoft Teams Security & Compliance features and plan for Gov...
Understanding Microsoft Teams Security & Compliance features and plan for Gov...Understanding Microsoft Teams Security & Compliance features and plan for Gov...
Understanding Microsoft Teams Security & Compliance features and plan for Gov...
 
M365 reinventing digital environment for modern workplace
M365 reinventing digital environment for modern workplaceM365 reinventing digital environment for modern workplace
M365 reinventing digital environment for modern workplace
 
Better Together Cx O V1 0
Better Together Cx O V1 0Better Together Cx O V1 0
Better Together Cx O V1 0
 
Better Together Cx O V1 0
Better Together Cx O V1 0Better Together Cx O V1 0
Better Together Cx O V1 0
 
Primend praktiline pilveseminar - Dokumendihalduse ja kommunikatsiooni viimin...
Primend praktiline pilveseminar - Dokumendihalduse ja kommunikatsiooni viimin...Primend praktiline pilveseminar - Dokumendihalduse ja kommunikatsiooni viimin...
Primend praktiline pilveseminar - Dokumendihalduse ja kommunikatsiooni viimin...
 
What is Microsoft Enterprise Mobility Suite and how to deploy it
What is Microsoft Enterprise Mobility Suite and how to deploy itWhat is Microsoft Enterprise Mobility Suite and how to deploy it
What is Microsoft Enterprise Mobility Suite and how to deploy it
 
05-Empowering-Enterprise-Mobility-FR.pptx
05-Empowering-Enterprise-Mobility-FR.pptx05-Empowering-Enterprise-Mobility-FR.pptx
05-Empowering-Enterprise-Mobility-FR.pptx
 
Security and Compliance with SharePoint and Office 365
Security and Compliance with SharePoint and Office 365Security and Compliance with SharePoint and Office 365
Security and Compliance with SharePoint and Office 365
 
Teamwork.com Security Overvew
Teamwork.com Security OvervewTeamwork.com Security Overvew
Teamwork.com Security Overvew
 
Enterprise Mobility Poster from Microsoft and Atidan
Enterprise Mobility Poster from Microsoft and AtidanEnterprise Mobility Poster from Microsoft and Atidan
Enterprise Mobility Poster from Microsoft and Atidan
 
Microsoft 365 | Modern workplace
Microsoft 365 | Modern workplaceMicrosoft 365 | Modern workplace
Microsoft 365 | Modern workplace
 
Maintaining Trust & Control of your Data in the Cloud
Maintaining Trust & Control of your Data in the CloudMaintaining Trust & Control of your Data in the Cloud
Maintaining Trust & Control of your Data in the Cloud
 
Microsoft Enterprise Mobility Suite Poster
Microsoft Enterprise Mobility Suite PosterMicrosoft Enterprise Mobility Suite Poster
Microsoft Enterprise Mobility Suite Poster
 
10 server security hacks to secure your web servers
10 server security hacks to secure your web servers10 server security hacks to secure your web servers
10 server security hacks to secure your web servers
 
5 Ways How Microsoft 365 Is Helping Remote Workers
5 Ways How Microsoft 365 Is Helping Remote Workers5 Ways How Microsoft 365 Is Helping Remote Workers
5 Ways How Microsoft 365 Is Helping Remote Workers
 
Modern Workplace with Microsoft 365
Modern Workplace with Microsoft 365Modern Workplace with Microsoft 365
Modern Workplace with Microsoft 365
 
Protecting Your Key Asset – Data Protection Best Practices V2.0 Final
Protecting Your Key Asset – Data Protection Best Practices V2.0   FinalProtecting Your Key Asset – Data Protection Best Practices V2.0   Final
Protecting Your Key Asset – Data Protection Best Practices V2.0 Final
 
Securing Sensitive Data in Your Hybrid Cloud
Securing Sensitive Data in Your Hybrid CloudSecuring Sensitive Data in Your Hybrid Cloud
Securing Sensitive Data in Your Hybrid Cloud
 

More from UL Transaction Security

Webinar: Data Classification - Closing the Gap between Enterprise and SAP Data
Webinar: Data Classification - Closing the Gap between Enterprise and SAP DataWebinar: Data Classification - Closing the Gap between Enterprise and SAP Data
Webinar: Data Classification - Closing the Gap between Enterprise and SAP Data
UL Transaction Security
 
Webinar: Eliminating Negative Impact on User Experience from Security Solutions
Webinar: Eliminating Negative Impact on User Experience from Security SolutionsWebinar: Eliminating Negative Impact on User Experience from Security Solutions
Webinar: Eliminating Negative Impact on User Experience from Security Solutions
UL Transaction Security
 
Perimeter Security is Failing
Perimeter Security is FailingPerimeter Security is Failing
Perimeter Security is Failing
UL Transaction Security
 
Solving Security, Collaboration, and Mobility Challenges in SAP With Microsof...
Solving Security, Collaboration, and Mobility Challenges in SAP With Microsof...Solving Security, Collaboration, and Mobility Challenges in SAP With Microsof...
Solving Security, Collaboration, and Mobility Challenges in SAP With Microsof...
UL Transaction Security
 
BYOD Webinar for SAP: Securing Data in a Mobile World
BYOD Webinar for SAP: Securing Data in a Mobile WorldBYOD Webinar for SAP: Securing Data in a Mobile World
BYOD Webinar for SAP: Securing Data in a Mobile World
UL Transaction Security
 
HR Security in SAP: Securing Data Beyond HCM Authorizations
HR Security in SAP: Securing Data Beyond HCM AuthorizationsHR Security in SAP: Securing Data Beyond HCM Authorizations
HR Security in SAP: Securing Data Beyond HCM Authorizations
UL Transaction Security
 
Mobility & BYOD: Leveraging Best Practices and Latest Technologies for Compre...
Mobility & BYOD: Leveraging Best Practices and Latest Technologies for Compre...Mobility & BYOD: Leveraging Best Practices and Latest Technologies for Compre...
Mobility & BYOD: Leveraging Best Practices and Latest Technologies for Compre...
UL Transaction Security
 
WEBINAR - A New Era in HR Security for SAP
WEBINAR - A New Era in HR Security for SAPWEBINAR - A New Era in HR Security for SAP
WEBINAR - A New Era in HR Security for SAP
UL Transaction Security
 

More from UL Transaction Security (9)

Webinar: Data Classification - Closing the Gap between Enterprise and SAP Data
Webinar: Data Classification - Closing the Gap between Enterprise and SAP DataWebinar: Data Classification - Closing the Gap between Enterprise and SAP Data
Webinar: Data Classification - Closing the Gap between Enterprise and SAP Data
 
Webinar: Eliminating Negative Impact on User Experience from Security Solutions
Webinar: Eliminating Negative Impact on User Experience from Security SolutionsWebinar: Eliminating Negative Impact on User Experience from Security Solutions
Webinar: Eliminating Negative Impact on User Experience from Security Solutions
 
BREACHED: Data Centric Security for SAP
BREACHED: Data Centric Security for SAPBREACHED: Data Centric Security for SAP
BREACHED: Data Centric Security for SAP
 
Perimeter Security is Failing
Perimeter Security is FailingPerimeter Security is Failing
Perimeter Security is Failing
 
Solving Security, Collaboration, and Mobility Challenges in SAP With Microsof...
Solving Security, Collaboration, and Mobility Challenges in SAP With Microsof...Solving Security, Collaboration, and Mobility Challenges in SAP With Microsof...
Solving Security, Collaboration, and Mobility Challenges in SAP With Microsof...
 
BYOD Webinar for SAP: Securing Data in a Mobile World
BYOD Webinar for SAP: Securing Data in a Mobile WorldBYOD Webinar for SAP: Securing Data in a Mobile World
BYOD Webinar for SAP: Securing Data in a Mobile World
 
HR Security in SAP: Securing Data Beyond HCM Authorizations
HR Security in SAP: Securing Data Beyond HCM AuthorizationsHR Security in SAP: Securing Data Beyond HCM Authorizations
HR Security in SAP: Securing Data Beyond HCM Authorizations
 
Mobility & BYOD: Leveraging Best Practices and Latest Technologies for Compre...
Mobility & BYOD: Leveraging Best Practices and Latest Technologies for Compre...Mobility & BYOD: Leveraging Best Practices and Latest Technologies for Compre...
Mobility & BYOD: Leveraging Best Practices and Latest Technologies for Compre...
 
WEBINAR - A New Era in HR Security for SAP
WEBINAR - A New Era in HR Security for SAPWEBINAR - A New Era in HR Security for SAP
WEBINAR - A New Era in HR Security for SAP
 

Recently uploaded

Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...
Shahin Sheidaei
 
Enhancing Research Orchestration Capabilities at ORNL.pdf
Enhancing Research Orchestration Capabilities at ORNL.pdfEnhancing Research Orchestration Capabilities at ORNL.pdf
Enhancing Research Orchestration Capabilities at ORNL.pdf
Globus
 
Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...
Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...
Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...
Anthony Dahanne
 
OpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoam
OpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoamOpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoam
OpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoam
takuyayamamoto1800
 
How to Position Your Globus Data Portal for Success Ten Good Practices
How to Position Your Globus Data Portal for Success Ten Good PracticesHow to Position Your Globus Data Portal for Success Ten Good Practices
How to Position Your Globus Data Portal for Success Ten Good Practices
Globus
 
RISE with SAP and Journey to the Intelligent Enterprise
RISE with SAP and Journey to the Intelligent EnterpriseRISE with SAP and Journey to the Intelligent Enterprise
RISE with SAP and Journey to the Intelligent Enterprise
Srikant77
 
top nidhi software solution freedownload
top nidhi software solution freedownloadtop nidhi software solution freedownload
top nidhi software solution freedownload
vrstrong314
 
A Comprehensive Look at Generative AI in Retail App Testing.pdf
A Comprehensive Look at Generative AI in Retail App Testing.pdfA Comprehensive Look at Generative AI in Retail App Testing.pdf
A Comprehensive Look at Generative AI in Retail App Testing.pdf
kalichargn70th171
 
Into the Box 2024 - Keynote Day 2 Slides.pdf
Into the Box 2024 - Keynote Day 2 Slides.pdfInto the Box 2024 - Keynote Day 2 Slides.pdf
Into the Box 2024 - Keynote Day 2 Slides.pdf
Ortus Solutions, Corp
 
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdfDominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
AMB-Review
 
May Marketo Masterclass, London MUG May 22 2024.pdf
May Marketo Masterclass, London MUG May 22 2024.pdfMay Marketo Masterclass, London MUG May 22 2024.pdf
May Marketo Masterclass, London MUG May 22 2024.pdf
Adele Miller
 
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERRORTROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
Tier1 app
 
Vitthal Shirke Microservices Resume Montevideo
Vitthal Shirke Microservices Resume MontevideoVitthal Shirke Microservices Resume Montevideo
Vitthal Shirke Microservices Resume Montevideo
Vitthal Shirke
 
2024 RoOUG Security model for the cloud.pptx
2024 RoOUG Security model for the cloud.pptx2024 RoOUG Security model for the cloud.pptx
2024 RoOUG Security model for the cloud.pptx
Georgi Kodinov
 
Enterprise Resource Planning System in Telangana
Enterprise Resource Planning System in TelanganaEnterprise Resource Planning System in Telangana
Enterprise Resource Planning System in Telangana
NYGGS Automation Suite
 
Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...
Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...
Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...
informapgpstrackings
 
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
Globus
 
Globus Compute wth IRI Workflows - GlobusWorld 2024
Globus Compute wth IRI Workflows - GlobusWorld 2024Globus Compute wth IRI Workflows - GlobusWorld 2024
Globus Compute wth IRI Workflows - GlobusWorld 2024
Globus
 
Lecture 1 Introduction to games development
Lecture 1 Introduction to games developmentLecture 1 Introduction to games development
Lecture 1 Introduction to games development
abdulrafaychaudhry
 
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...
Globus
 

Recently uploaded (20)

Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...
 
Enhancing Research Orchestration Capabilities at ORNL.pdf
Enhancing Research Orchestration Capabilities at ORNL.pdfEnhancing Research Orchestration Capabilities at ORNL.pdf
Enhancing Research Orchestration Capabilities at ORNL.pdf
 
Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...
Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...
Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...
 
OpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoam
OpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoamOpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoam
OpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoam
 
How to Position Your Globus Data Portal for Success Ten Good Practices
How to Position Your Globus Data Portal for Success Ten Good PracticesHow to Position Your Globus Data Portal for Success Ten Good Practices
How to Position Your Globus Data Portal for Success Ten Good Practices
 
RISE with SAP and Journey to the Intelligent Enterprise
RISE with SAP and Journey to the Intelligent EnterpriseRISE with SAP and Journey to the Intelligent Enterprise
RISE with SAP and Journey to the Intelligent Enterprise
 
top nidhi software solution freedownload
top nidhi software solution freedownloadtop nidhi software solution freedownload
top nidhi software solution freedownload
 
A Comprehensive Look at Generative AI in Retail App Testing.pdf
A Comprehensive Look at Generative AI in Retail App Testing.pdfA Comprehensive Look at Generative AI in Retail App Testing.pdf
A Comprehensive Look at Generative AI in Retail App Testing.pdf
 
Into the Box 2024 - Keynote Day 2 Slides.pdf
Into the Box 2024 - Keynote Day 2 Slides.pdfInto the Box 2024 - Keynote Day 2 Slides.pdf
Into the Box 2024 - Keynote Day 2 Slides.pdf
 
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdfDominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
 
May Marketo Masterclass, London MUG May 22 2024.pdf
May Marketo Masterclass, London MUG May 22 2024.pdfMay Marketo Masterclass, London MUG May 22 2024.pdf
May Marketo Masterclass, London MUG May 22 2024.pdf
 
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERRORTROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
 
Vitthal Shirke Microservices Resume Montevideo
Vitthal Shirke Microservices Resume MontevideoVitthal Shirke Microservices Resume Montevideo
Vitthal Shirke Microservices Resume Montevideo
 
2024 RoOUG Security model for the cloud.pptx
2024 RoOUG Security model for the cloud.pptx2024 RoOUG Security model for the cloud.pptx
2024 RoOUG Security model for the cloud.pptx
 
Enterprise Resource Planning System in Telangana
Enterprise Resource Planning System in TelanganaEnterprise Resource Planning System in Telangana
Enterprise Resource Planning System in Telangana
 
Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...
Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...
Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...
 
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
 
Globus Compute wth IRI Workflows - GlobusWorld 2024
Globus Compute wth IRI Workflows - GlobusWorld 2024Globus Compute wth IRI Workflows - GlobusWorld 2024
Globus Compute wth IRI Workflows - GlobusWorld 2024
 
Lecture 1 Introduction to games development
Lecture 1 Introduction to games developmentLecture 1 Introduction to games development
Lecture 1 Introduction to games development
 
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...
 

What's New in Microsoft Rights Management Services

  • 1. Microsoft Rights Management Services (RMS) What’s New? A presentation by SECUDE
  • 3. Rights Management Services (RMS) are offerings from Microsoft that help keep an organizations information…
  • 4. SECURE Rights Management Services (RMS) are offerings from Microsoft that help keep an organizations information
  • 5. Data-centric protection Protection is applied directly to the data and documents
  • 6. Data-centric protection Protection is applied directly to the data and documents
  • 7. Data-centric protection Protection is applied directly to the data and documents Wherever the data is moved
  • 8. Data-centric protection Protection is applied directly to the data and documents Wherever the data is moved THE PROTECTION STAYS WITH IT
  • 10. Documents are protected  At a single location On premise
  • 11. Documents are protected  Inside and outside the organization  At a single location Partner On premise Shared
  • 12. Documents are protected  Inside and outside the organization  At a single location  And when moving amongst various locations Partner On premise Shared Collaboration
  • 14. Fine-grained control Content owners can define who can  Open the document
  • 15. Fine-grained control Content owners can define who can  Open the document  Edit the contents
  • 16. Fine-grained control Content owners can define who can  Open the document  Edit the contents  Print the document
  • 17. Fine-grained control Content owners can define who can  Open the document  Edit the contents  Print the document  Forward to anyone, internal or external
  • 18. Fine-grained control Content owners can define who can  Open the document  Edit the contents  Print the document  Forward to anyone, internal or external  Take other actions with the information
  • 19. Fine-grained control Content owners can define who can  Open the document  Edit the contents  Print the document  Forward to anyone, internal or external  Take other actions with the information
  • 20. Fine-grained control Content owners can define who can  Open the document  Edit the contents  Print the document  Forward to anyone, internal or external  Take other actions with the information
  • 21. Windows Azure RMS provides A secure collaboration platform
  • 22. Windows Azure RMS provides A secure collaboration platform For sharing between organizations Your Employees Partner
  • 24. Not limited to Microsoft Office RMS protects more than just Microsoft Office documents
  • 25. Not limited to Microsoft Office RMS protects more than just Microsoft Office documents It now protects PDF’s, images, and more
  • 26. Not limited to Windows Documents can now be accessed on many devices, not just Windows PC’s
  • 27. Not limited to Windows Documents can now be accessed on many devices, not just Windows PC’s Tablets
  • 28. Not limited to Windows Documents can now be accessed on many devices, not just Windows PC’s Android Tablets
  • 29. Not limited to Windows Documents can now be accessed on many devices, not just Windows PC’s Android Tablets iPhone
  • 30. Not limited to Windows Documents can now be accessed on many devices, not just Windows PC’s Android iPad Tablets iPhone
  • 31. Share with Partners Documents can be safely shared with other organizations …not just within your company
  • 32. Summary With the new Rights Management Services, users can:  Sign up for RMS for free if you don’t already have it  Protect any file type  Consume protected files on any device  Share files with anyone
  • 34. Data is not exposed Azure RMS never actually sees customer data
  • 35. Data is not exposed Azure RMS never actually sees customer data Documents are protected, viewed, and shared by the user, without ever being sent to the Azure service
  • 36. IT Dept. has control IT departments can:  keep data on premise and not move anything to the cloud (their choice)  be aware of how protected data is being treated, viewed, and used  control RMS tenant key on-premise
  • 37. User Confidence Established  Users can now be confident that their files are protected  When files are shared outside of the organization, protected documents will be accessible to the recipient No more sharing inaccessible locked documents
  • 38. Storage Options Data and information has the flexibility to be stored
  • 39. Storage Options Data and information has the flexibility to be stored on-premise
  • 40. Storage Options Data and information has the flexibility to be stored on-premise in the cloud
  • 41. Storage Options Data and information has the flexibility to be stored on-premise in the cloud on any storage location
  • 42. Storage Options Data and information has the flexibility to be stored on-premise in the cloud on any storage location …and remain protected.
  • 43. RMS & CLOUD READY ORGANIZATIONS
  • 44. Simply Enabled  Within the combined and integrated environment of Office 365, RMS is very simple to enable  Just click one button and deep RMS integration can be enabled with Exchange, SharePoint, and the complete Office 2013 suite.
  • 45. Collaboration  This is the simplest way to get started with RMS.  Office 365 users benefit from generic protection of any file type through the RMS applications.  They also have the ability to collaborate with non-Office 365 organizations and individuals
  • 47. Azure RMS Microsoft Rights Management Services is hosted in Azure and handles all service duties. The Azure RMS service relies on Windows Azure Active Directory and associated services (Directory Sync and Federation).
  • 48. High Value Tenant Keys  Azure RMS requires storage for the high value tenant keys at the core of RMS.  The key management service (KMS) stores RMS tenant keys securely  The KMS also offers the Bring-Your-Own- Key capability where CISO’s can generate a key on premise, using tools of their choice, in compliance with their own policies.
  • 49. Rights Management Connector The ‘connector’ pretends to be an AD RMS server for the on-premise Exchange and SharePoint workloads. All requests are then relayed to the Azure- hosted RMS service.
  • 50. On Premise Email – within your company Most users have an Outlook Exchange deployment with no form of information protection. Adding the Microsoft Rights Management connector to Exchange deployments will leave the Exchange fully RMS-capable. The data never leaves the cloud but can be protected.
  • 52. Protecting information as it leaves SAP  Information regularly leaves ERP applications like SAP
  • 53. Protecting information as it leaves SAP  Information regularly leaves ERP applications like SAP  Protection protocols no longer exist on the data once it leaves SAP
  • 54. Protecting information as it leaves SAP  Information regularly leaves ERP applications like SAP  Protection protocols no longer exist on the data once it leaves SAP Microsoft speaks on the importance of protecting data stored in ERP (Enterprise Resource Planning) applications
  • 55. FOR MORE INFORMATION Read Now Microsoft RMS is now limiting SAP data leakage with the help of SECUDE
  • 56. Audit Data Movement Monitor the activities surrounding the information  Track, record and classify data movement  Identify who accesses it  From where they access it (IP address & terminal)  Where they send it to  Extract data for analysis
  • 58. PRESENTATION BY Tweet us @secude Contact us info@secude.com