mobile content governance
DESCRIPTION
With mobile apps becoming more ubiquitous, see how the new EMC Documentum Information Rights Management (IRM) mobile client can help enterprises access IRM-protected sensitive content on the go!TRANSCRIPT
1 © Copyright 2012 EMC Corporation. All rights reserved.
MOBILE CONTENT GOVERNANCE
Raul Gabriel Product Marketing Manager
2 © Copyright 2012 EMC Corporation. All rights reserved.
The New User
Social Computing Usage Surpasses Email
Users Self Provision
Users Want Choice
3 © Copyright 2012 EMC Corporation. All rights reserved.
Mobile Media is Mainstream
93% of US Smartphone owners used connected media
60% growth, YoY
Source: ComScore
4 © Copyright 2012 EMC Corporation. All rights reserved.
Mobile content is any type of media which is viewed or used on mobile
phones, like ringtones, graphics, discount
offers, games, movies, and GPS navigation
What is mobile content?
"Mobile content." Wikipedia. Wikimedia Foundation, Inc., 25 Apr. 2012. Web. 3 May 2012. <http://en.wikipedia.org/wiki/Mobile_content>
5 © Copyright 2012 EMC Corporation. All rights reserved.
Growth of Mobile
Content is becoming richer, denser, and more popular
0
500
1000
1500
2000
2500
3000
2010 2011 2012 2013 2014 2014
Massive Wireless Data Growth
MB/User/Month
0
500
1000
1500
2000
2500
3000
3500
Usage by phone type
MB/User/month
6 © Copyright 2012 EMC Corporation. All rights reserved.
Mobile is BIG Business
1998
First ringtones go on sale by Radiolinja in
Finland
"mobisodes," video content
that has been produced exclusively for mobile
phones
today
Progression of media types, from news, video games,
jokes, horoscopes, TV content and advertising
Source: Informa & ComScore
7 © Copyright 2012 EMC Corporation. All rights reserved.
Mobile is BIG Business
$31B
(2006)
MOBILE-PHONE-PAID MEDIA CONTENT
$9.3B MUSIC
$5B GAMING
2007
Source: Informa & ComScore
8 © Copyright 2012 EMC Corporation. All rights reserved.
What is the Threat/Concern?
How many of you have two phones (1 for work, 1 for personal)
– How many “share” phones, tablets?
– How many people use personal tablet at work?
– How many people have work provided tablet? ▪ Can you use for personal things (like
Angry Birds?)
9 © Copyright 2012 EMC Corporation. All rights reserved.
Information governance is a strategic issue for many organizations… the risks and costs of e-discovery and compliance have put litigation readiness and information retention management in the spotlight.
Source: 451 Group, 2009
10 © Copyright 2012 EMC Corporation. All rights reserved.
Personal
Digital Footprint
Corporate
Control
Government
Behavior
Areas of Concern
11 © Copyright 2012 EMC Corporation. All rights reserved. © Copyright 2012 EMC Corporation. All rights reserved. 11
PERVASIVE GOVERNANCE The First Step In Action
12 © Copyright 2012 EMC Corporation. All rights reserved. © Copyright 2011 EMC Corporation. All rights reserved. 12
ENTERPRISE EXTENDED PERVASIVE
Understand
Automate Policy
Protect
Audit
Track
Control
Centralize
Embed
Federate
THE FIRST STEP
13 © Copyright 2012 EMC Corporation. All rights reserved.
Pervasive Governance – The Cycle
Intelligent, High Performing, Transparent
Understand
Your Content (Value & Risk)
Protect
& Control (On & Off Premise)
Discover
& Produce (Early Case Assessment)
Automate
& Enforce Policies (Prove Compliance)
14 © Copyright 2012 EMC Corporation. All rights reserved.
TCS • Secure connections within the Documentum platform
• Encryption of underlying file stores
• FIPS and other government standards
Trusted Content
Services
RM • 5015.2 Compliant Records Management
• Adherence to corporate file plans and policies
• Integrations with common business apps
Records
Management
• Retention policies applied at container level
• Multiple policy reconciliation and disposition
• Seamless to the end user
Retention Policy
Services
IRM • Secure the integrity of content outside the repository
• Integration with common business authoring applications
• Works stand-alone or integrated with Documentum repository security
Information Rights
Management
• Search on external content
• Determine what resides externally and what can be moved within
• Link with CIS and RPS once content is moved within
File
Intelligence
eDiscovery • Conduct Early Assessment to quickly gain insight into case merit
• Protect against fines and sanctions with a defensible in-house process
• Eliminate risk of spoliation with an automated legal hold process
Pervasive Governance Components
15 © Copyright 2012 EMC Corporation. All rights reserved.
IRM is a suite of products that encrypts the most popular file formats and allows decryption within the business application subject to policy verification (real-time or cached)
What is EMC Documentum IRM?
16 © Copyright 2012 EMC Corporation. All rights reserved.
Open protected/unprotected document
Open, scroll, page, or print document
Log onto IRM Server (e.g. change IRM password)
© Copyright 2012 EMC Corporation. All rights reserved.
Access Help from IRM Client
View/Respond to Messages from IRM Server/Client
Open protected attachments from an email
Use IRM Client with or without protected documents
EMC Documentum IRM Mobile Client
17 © Copyright 2012 EMC Corporation. All rights reserved.
• Who can view • From where it can be viewed
(which IP address or domain) • What pages can be viewed (PDF
only) • When it can be viewed • If copy or edit is allowed
Rights Enforcement By Policy
18 © Copyright 2012 EMC Corporation. All rights reserved.
• If printing is allowed • If guest access is allowed • If offline viewing is allowed • Automatic expiration • Dynamic watermarks
Rights Enforcement By Policy
19 © Copyright 2012 EMC Corporation. All rights reserved.
Name J.Doe
Age 27
Cust. No
Document Generation
Data values drive business rules to generate document from template
Transaction Data
• CRM • Policy origination system • Loan management system
Document Assembly Engine
Unified Rights and Retention
20 © Copyright 2012 EMC Corporation. All rights reserved.
Portal Email
CD-ROM
Storage
Generated documents managed and archived with rights policy automatically assigned
Policy Server
Store rights management policies and encryption keys
Review/Edit (with integrated workflow)
Multi-Channel Delivery
Document delivered via selected channel
At that time of disposition the original is deleted and so is the key to the copies
Unified Rights and Retention
21 © Copyright 2012 EMC Corporation. All rights reserved.
In April, a price list protected with IRM is downloaded by a sales person
The sales person e-mails the price list to multiple customers
On May 1, prices change and a new pricelist is issued
At that time, rights on the old price list are revoked, affecting all copies, regardless of location
Dynamic policy control allows recipient entitlements changed on-the-fly when individual roles or business needs change, regardless of where the content resides
APRIL APRIL APRIL MAY
Version Control Is Critical
22 © Copyright 2012 EMC Corporation. All rights reserved. © Copyright 2012 EMC Corporation. All rights reserved.
EMC DOCUMENTUM INFORMATION RIGHTS MANAGEMENT
OVERVIEW
OFFLINE ACCESS
AUTOMATIC EXPIRATION CONTROL
IRM SOFTWARE DEVELOPMENT KIT
LEVERAGING EXISTING AUTHENTICATION INFRASTRUCTURE
PROTECT NATIVE BUSINESS INFORMATION
RIGHTS ENFORCEMENT BY POLICY
AUDITING, REPORTING, & NOTIFICATION
DYNAMIC WATERMARKING
23 © Copyright 2012 EMC Corporation. All rights reserved.
So What Can We Expect Going Forward?
BIG DATA-ENABLED
PROCESS
SOCIAL
PROCESS
CLOUD
CHOICE
COMPUTING
Organizations leveraging Big Data will leapfrog competition by allowing processes to enable better, faster, real-time insight and action
Work patterns get more inherently social, collaborative, insightful, personalized, etc., in-context of the business process
Cloud computing simplifies provisioning resulting in further information disaggregation.
A mandate for both IT and software providers looking to support user choice
PERVASIVE
GOVERNANCE
Federated, policy-based governance will be integrated transparently into the new information fabric