file secure - introduction to dduc & irm8
TRANSCRIPT
![Page 1: File Secure - Introduction to DDUC & IRM8](https://reader034.vdocuments.mx/reader034/viewer/2022052305/577d39a41a28ab3a6b9a402c/html5/thumbnails/1.jpg)
8/14/2019 File Secure - Introduction to DDUC & IRM8
http://slidepdf.com/reader/full/file-secure-introduction-to-dduc-irm8 1/13
Some thoughts….
• Have you ever felt the need to "recall" information that you have sent
to other people?
• Do you know what happens to your documents after distribution?
• What happens if an employee with access to confidential information
leaves?
• Do you know who is accessing your confidential business criticalinformation ?
•
Is confidential policy and circular information leaving the departmentahead of time?
• How can you prevent mass leakage of information from centralized ITsystems?
For Restricted Circulation Only 1
![Page 2: File Secure - Introduction to DDUC & IRM8](https://reader034.vdocuments.mx/reader034/viewer/2022052305/577d39a41a28ab3a6b9a402c/html5/thumbnails/2.jpg)
8/14/2019 File Secure - Introduction to DDUC & IRM8
http://slidepdf.com/reader/full/file-secure-introduction-to-dduc-irm8 2/13
Kapil [email protected] | +91-98220-84264
![Page 3: File Secure - Introduction to DDUC & IRM8](https://reader034.vdocuments.mx/reader034/viewer/2022052305/577d39a41a28ab3a6b9a402c/html5/thumbnails/3.jpg)
8/14/2019 File Secure - Introduction to DDUC & IRM8
http://slidepdf.com/reader/full/file-secure-introduction-to-dduc-irm8 3/13
Today's IT Challenges
For Restricted Circulation Only 3
More AgileBusiness
More SecuredBusiness
More Compliant Business
Increasing regulatory demands Increasing privacy concerns Business viability concerns
![Page 4: File Secure - Introduction to DDUC & IRM8](https://reader034.vdocuments.mx/reader034/viewer/2022052305/577d39a41a28ab3a6b9a402c/html5/thumbnails/4.jpg)
8/14/2019 File Secure - Introduction to DDUC & IRM8
http://slidepdf.com/reader/full/file-secure-introduction-to-dduc-irm8 4/13
State of Security in the Enterprise
For Restricted Circulation Only 4
• Multiple point solutions from multiple vendors
• Disparate technologies that don't work together
Incomplete
• Repeated point to point integrations
Complex
• Difficult to enforce consistent set of policies
• Difficult to measure compliance with these policies
Non-compliant
• Solutions not user centric, but technology centric
• Process not end user friendly
Business "un-friendly"
![Page 5: File Secure - Introduction to DDUC & IRM8](https://reader034.vdocuments.mx/reader034/viewer/2022052305/577d39a41a28ab3a6b9a402c/html5/thumbnails/5.jpg)
8/14/2019 File Secure - Introduction to DDUC & IRM8
http://slidepdf.com/reader/full/file-secure-introduction-to-dduc-irm8 5/13
The underlying issues
• Share it = It becomes his (also)
Usage and Access Control separation is not possible
• Share it once = Shared forever
No dynamic rights management
• Out of the Firewall = Free for All
No method of controlling information usage after it leaves the
perimeter
For Restricted Circulation Only 5
![Page 6: File Secure - Introduction to DDUC & IRM8](https://reader034.vdocuments.mx/reader034/viewer/2022052305/577d39a41a28ab3a6b9a402c/html5/thumbnails/6.jpg)
8/14/2019 File Secure - Introduction to DDUC & IRM8
http://slidepdf.com/reader/full/file-secure-introduction-to-dduc-irm8 6/13
IT's role in building corporate trust
For Restricted Circulation Only 6
![Page 7: File Secure - Introduction to DDUC & IRM8](https://reader034.vdocuments.mx/reader034/viewer/2022052305/577d39a41a28ab3a6b9a402c/html5/thumbnails/7.jpg)
8/14/2019 File Secure - Introduction to DDUC & IRM8
http://slidepdf.com/reader/full/file-secure-introduction-to-dduc-irm8 7/13
Its a "risky" business still…
For Restricted Circulation Only 7
![Page 8: File Secure - Introduction to DDUC & IRM8](https://reader034.vdocuments.mx/reader034/viewer/2022052305/577d39a41a28ab3a6b9a402c/html5/thumbnails/8.jpg)
8/14/2019 File Secure - Introduction to DDUC & IRM8
http://slidepdf.com/reader/full/file-secure-introduction-to-dduc-irm8 8/13
“Information Rights Management” is
• Information Rights Management (IRM) is "Information Centric" security
• It protects the information wherever it is and through out its life cycle.
• Information is protected
–
when in use – when in motion or
– when at rest.
“Most other information or data security solutions address only some of these
aspects, but not all from a single point”
For Restricted Circulation Only 8
![Page 9: File Secure - Introduction to DDUC & IRM8](https://reader034.vdocuments.mx/reader034/viewer/2022052305/577d39a41a28ab3a6b9a402c/html5/thumbnails/9.jpg)
8/14/2019 File Secure - Introduction to DDUC & IRM8
http://slidepdf.com/reader/full/file-secure-introduction-to-dduc-irm8 9/13
Information Rights Management Values
For Restricted Circulation Only 9
Trusted andReliableSecurity
Lower
Administrative/ Operational
Costs forEnforcement
Enable theextendedenterprise
Better end-user
experience
Efficient &Cost Effective
SecurityCompliance
![Page 10: File Secure - Introduction to DDUC & IRM8](https://reader034.vdocuments.mx/reader034/viewer/2022052305/577d39a41a28ab3a6b9a402c/html5/thumbnails/10.jpg)
8/14/2019 File Secure - Introduction to DDUC & IRM8
http://slidepdf.com/reader/full/file-secure-introduction-to-dduc-irm8 10/13
Distributed Document Usage Control
For Restricted Circulation Only 10
![Page 11: File Secure - Introduction to DDUC & IRM8](https://reader034.vdocuments.mx/reader034/viewer/2022052305/577d39a41a28ab3a6b9a402c/html5/thumbnails/11.jpg)
8/14/2019 File Secure - Introduction to DDUC & IRM8
http://slidepdf.com/reader/full/file-secure-introduction-to-dduc-irm8 11/13
FileSecure
For Restricted Circulation Only 11
FileSecure is a leadingsolution in the area of
information usagecontrol, information
rights management &secure outsourcing.
Some of the largestcompanies in various
verticals use this
technology to securedata that is usedinternally or provided
to a vendor foroutsourced processes.
FileSecure allowscontrol of intellectual
property to be retained
even after theinformation has beenshared with anotherperson / company.
![Page 12: File Secure - Introduction to DDUC & IRM8](https://reader034.vdocuments.mx/reader034/viewer/2022052305/577d39a41a28ab3a6b9a402c/html5/thumbnails/12.jpg)
8/14/2019 File Secure - Introduction to DDUC & IRM8
http://slidepdf.com/reader/full/file-secure-introduction-to-dduc-irm8 12/13
Some features…
• Support for most dominant document formats
• Protect documents within and outside of the enterprise
• No restrictions on method of information distribution
• Prevention of screen capture
• Multiplicity of clients
• Dynamic usage policies
• Full audit of authorized activities & unauthorized attempts on the document
within and outside the enterprise
• Manual and automated protection of documents
• Web based administration
• Easy integration with enterprise systems
For Restricted Circulation Only 12
![Page 13: File Secure - Introduction to DDUC & IRM8](https://reader034.vdocuments.mx/reader034/viewer/2022052305/577d39a41a28ab3a6b9a402c/html5/thumbnails/13.jpg)
8/14/2019 File Secure - Introduction to DDUC & IRM8
http://slidepdf.com/reader/full/file-secure-introduction-to-dduc-irm8 13/13
THANK YOU
MANIKS Systems Pvt Ltd502, Sai Radhe. RBM Compound, Behind Hotel Le-Meridian.
Pune – 411 001.
+91-20-41006700
www.manikssys.com
For Restricted Circulation Only 13