EMC Documentum Information Rights Management

Similar documents
EMC Documentum ApplicationXtender Add-on Modules

Adobe Developer Workshop Series

EMC Documentum Information Rights Management

Permeo Technologies WHITE PAPER. HIPAA Compliancy and Secure Remote Access: Challenges and Solutions

A Websense Research Brief Prevent Data Loss and Comply with Payment Card Industry Data Security Standards

IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:

Secure Engineering Collaboration with Integrated Rights Management

Kelvin Wee CISA, CISM, CISSP Principal Consultant (DLP Specialist) Asia Pacific and Japan

Ensuring Security and Compliance of Your EMC Documentum Enterprise Content Management System: A Collaborative Effort of EMC Documentum and RSA

Integrating Paper into EMC Documentum ApplicationXtender with ecopy

Vs Encryption Suites

Don't Be The Next Data Loss Story

How To Manage A Corporate Device Ownership (Byod) On A Corporate Network (For Employees) On An Iphone Or Ipad Or Ipa (For Non-Usenet) On Your Personal Device

Length of time to deploy, difficult to use and costly to implement. Just provided basic functionality which added little business value.

Integrating Adobe LiveCycle ES and Microsoft Office SharePoint

Extending Microsoft Office and SharePoint with EMC Documentum

RECORDS MANAGEMENT RECORDS MANAGEMENT SERVICES. Cost-Effective, Legally Defensible Records Management

COMPLIANCE BENEFITS OF SAP ARCHIVING

THE EXECUTIVE GUIDE TO DATA LOSS PREVENTION. Technology Overview, Business Justification, and Resource Requirements

Seclore FileSecure. Securing Information Wherever it Goes. Extending Information Security Beyond Your Border

Getting Started with the iscan Online Data Breach Risk Intelligence Platform

RSA Data Loss Prevention (DLP) Understand business risk and mitigate it effectively

Magic Quadrant for Enterprise Content Management 18 October 2012

Entrust Secure Web Portal Solution. Livio Merlo Security Consultant September 25th, 2003

<Insert Picture Here> Oracle and Stellent Acquisition Announcement

<Insert Picture Here>

Network Security Administrator

TECHNOLOGY PARTNER CERTIFICATION BENEFITS AND PROCESS

ProtectV. Securing Sensitive Data in Virtual and Cloud Environments. Executive Summary

The biggest challenges of Life Sciences companies today. Comply or Perish: Maintaining 21 CFR Part 11 Compliance

AirWatch Solution Overview

Symantec Mobile Management 7.2

Information Rights Management for Banking Seclore FileSecure Provides Intelligent Document & Data Protection that Extends Beyond Enterprise Borders

Introduction to Digital Workflow Ticketing

Privileged. Account Management. Accounts Discovery, Password Protection & Management. Overview. Privileged. Accounts Discovery

May 14 th, 2015 INTRODUCING WATCHDOX. And The ABC s Of Secure File Sharing. Jeff Holleran VP Corporate Strategy BlackBerry

Veritas Enterprise Vault for Microsoft Exchange Server

Symantec Enterprise Vault for Microsoft Exchange Server

How To Secure A Database From A Leaky, Unsecured, And Unpatched Server

Pentaho Enterprise and Community Editions Feature Comparison

RSA Solution Brief RSA. Data Loss. Uncover your risk, establish control. RSA. Key Manager. RSA Solution Brief

What We Do: Simplify Enterprise Mobility

RECORDS MANAGEMENT SERVICES. Cost-Effective, Legally Defensible Records Management

Data Security and Healthcare

Advanced Configuration Steps

Realizing the ROI of Information Governance. Gregory P. Kosinski Director, Product Marketing EMC

Microsoft SharePoint and EMC Documentum: A perfect combination

<Insert Picture Here> Oracle Database Security Overview

On-Site Computer Solutions values these technologies as part of an overall security plan:

Top. Reasons Legal Firms Select kiteworks by Accellion

How to Execute Your Next Generation of Mobile Initiatives. Ian Evans Vice President and Managing Director- EMEA, AirWatch by VMware

Security Architecture Whitepaper

SharePoint a User s s Perspective Jefferson County s s PVA Implementation of Microsoft Office SharePoint Server 2007

Simplify SSL Certificate Management Across the Enterprise

IBM Data Security Services for endpoint data protection endpoint data loss prevention solution

Compliance in the Corporate World

Fasoo Data Security Framework

SeCUritY. Safeguarding information Within Documents and Devices. imagerunner ADVANCE Solutions. ADVANCE to Canon MFP security solutions.

Symantec Mobile Management 7.2

Total Enterprise Mobility

ForeScout MDM Enterprise

1 Product. Open Text is the leading fax server vendor in the world. *

MAXIMUM DATA SECURITY with ideals TM Virtual Data Room

A. SYSTEM DESCRIPTION

White Paper. Anywhere, Any Device File Access with IT in Control. Enterprise File Serving 2.0

The ForeScout Difference

Oracle Content Management 11g

Symantec Mobile Management for Configuration Manager 7.2

The Impact of HIPAA and HITECH

AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE

Mobile Access Software Blade

Get More from Microsoft SharePoint with Oracle Fusion Middleware. An Oracle White Paper January 2008

How To Manage Security On A Networked Computer System

Analyzing Security for Retailers An analysis of what retailers can do to improve their network security

Always Worry About Cyber Security. Always. Track 4 Session 8

DOCUMATION S DOCUMENT MANAGEMENT

Course: Information Security Management in e-governance

How To Secure Shareware Kiteworks By Accellion

Sean Horne CTO EMC UKI. The leakage of Intellectual Property.. .and the risk of Privacy, Trustworthiness, Governance and Data Breaches

SecureGRC TM - Cloud based SaaS

Axway SecureTransport Ad-hoc File Transfer Service

FISMA / NIST REVISION 3 COMPLIANCE

A secure and auditable Federated Identity and Access Management Infrastructure. Serge Bertini Director, Security Canada

HIPAA: MANAGING ACCESS TO SYSTEMS STORING ephi WITH SECRET SERVER

Teleran PCI Customer Case Study

Securely Architecting the Internal Cloud. Rob Randell, CISSP Senior Security and Compliance Specialist VMware, Inc.

INFORMATION SECURITY GOVERNANCE ASSESSMENT TOOL FOR HIGHER EDUCATION

Athena Mobile Device Management from Symantec

SOOKASA WHITEPAPER CASB SECURITY OVERVIEW.

Information Rights Management

RSA Solution Brief. RSA SecurID Authentication in Action: Securing Privileged User Access. RSA Solution Brief

MOVING TO THE NEXT-GENERATION MEDICAL INFORMATION CALL CENTER

White Paper. Simplify SSL Certificate Management Across the Enterprise

Powered by. FSS Buyer s Guide Why a File Sync & Sharing Solution is Critical for Your Business

Active Directory Rights Management Services integration (AD RMS)

Remote Access Platform. Architecture and Security Overview

Automate PCI Compliance Monitoring, Investigation & Reporting

True Enterprise Content Management (ECM) & BPM SUITED FOR HEALTHCARE, TELECOM, BANKING, INSURANCE & HIGH SECURITY INDUSTRIES

Information Security Program Management Standard

Transcription:

EMC Documentum Information Rights Management David Mendel Sr. Product Marketing Manager EMC Corporation June 2008 1

Securing Content Across the Enterprise Documentum Security Overview Confirm System is Secure Auditing Leaving the Repository Information Rights Management (IRM) Securing the People Authentication Identity Management Access Control & Authorization Inside the Repository Securing the Content Encryption (TCS) Digital Shredding (TCS) Retention Management Ensure System is Secure Hardening and Validation 2

Persistent Protection of Content You secure your content at rest You ensure only certain people can access the content This is where IRM is needed But once an authorized user opens the content, they are free to do whatever they want with it! 3

IRM Is Equivalent To Having a Remote Control IRM is equivalent to having a remote control over your information IRM allows instant response to events and changing security conditions: Employee changes Changing partner relationships and roles New document versions Loss of laptops and storage media Instant expiration control 4

Business Drivers for Content Security Protect intellectual property Trade secrets Competitive information IP theft Secured collaboration Compliance Regulations Classified Information Audits Risk mitigation Legal exposure Data loss Privacy breaches 5 5

How does IRM work? Content is always encrypted with the encryption keys & policy rights stored on a Policy Server. Policies are dynamic rights can be changed or revoked at any time regardless of where the document resides. Desktop Integration Workflow IntegraBons + Policy + Policy Content Owner IRM Policy Server Content Mgmt, eroom 6

New Account Opening Use Case Incorporating IRM with Content Management Transaction Data From LOB systems or eform Document Generation Data values drive business rules to generate document from template Multi-Channel Delivery Document delivered via selected channel Name J.Doe Age 27 Cust. No Portal CRM Policy Origination System Loan Management System Document Assembly Engine Email Wireless CD-Rom Review / Edit Documentum workflow used as routing engine Documentum repository Generated documents managed and archived and rights policy automatically assigned Policy Server Store rights management policies and encryption keys 7

Features Rights Enforcement by Policy A document policy defines: Who can view What PDF pages can be viewed When it can be viewed If copy or edit is allowed If printing is allowed If guest access is allowed If offline viewing is allowed Automatic expiration Dynamic watermarks 8

Additional Functionality Use of native business application Uses plug-in within native business application, no 3 rd party client. Dynamic policies controls Change or revoke privileges at any time, regardless of where document physically resides Continuous, granular audit trails All policy controlled actions (and attempted actions) tracked, even off-line mode Leverage existing authentication infrastructure Speeds deployment and minimizes impact to administration Software Development Kit (SDK) Extend IRM functionality to custom applications or new content types 9

Customer Case Study VHA Novation Alliance VHA - Company Background Health care alliance formed in 1977 Nation-wide network of over 2,200 leading community-owned health care organizations and their physicians VHA network includes 27% of the nation's community hospitals Novation Company Background Established in 1998 through consolidation of supply chain programs of VHA and University HealthSystem Consortium (UHC) Leading contracting services company in health care Serves purchasing needs of over 2,500 members and affiliates of VHA and UHC and over 12,000 Provista customers Offers the most extensive range of advanced contracting services, such as contract development & management, custom contracting and enhanced savings programs VHA, UHC and Provista members and used Novation and alliance contracts to purchase $33.1 billion in supplies and services in 2007. 10

Business Challenges Driving Need for IRM Novation publishes marketing and contract information to member-facing, secure, web sites using Documentum WCM. Actual signed contracts were confidential and not available on web sites. Members could request to view a copy of an actual contract. Audience was usually CEO, CFO, Director, Materials Management or Director, Pharmacy. Process prior to IRM: Member makes request to view contract. Novation sends hard-copy of contract to account executive via overnight delivery. Account executive walks in copy of contract to meeting with member. Contract is reviewed in presence of account executive. Account executive leaves taking copy of contract with him. Copy of contract is shredded by account executive. THE BOTTOM-LINE: Keeping contracts confidential was a labor intensive, costly process 11

What s the Solution? needed a more efficient and highly secure way to share contract information with alliance members. wanted to leverage existing Documentum WCM to publish contracts to the web. wanted the contracts in a standard read-only format. needed security only authorized users could access contracts. was concerned that contracts downloaded by authorized users might find their way to unauthorized users, non-members, suppliers or competitors. 12

The Solution Documentum IRM Contracts scanned into PDF format Members fill out online form to request access to documents. Customer service grants/denies access after verification. Members use same username/password to access website and documents. Approved members have 24x7 access to contracts. 13

Initial Implementation Details 3,000 system-wide users Policies automated through use of Policy Templates Integrated with Active Directory for authentication/authorization Set up user groups View only privileges for authorized members View only privileges for employees Authoring privileges for contract administration Printing privileges for legal 14

IRM Use Expanded after Initial Implementation Securing confidential, internal documents View only access to all employees Published to corporate intranet User must access document through corporate network or VPN. Enhanced savings programs rebate documents secured for members Uses same template as contract documents Published to web site using Documentum WCM Secured VHA Annual Financial Report Access restricted to VHA CEOs and CFOs only. New user group and AD group created to control access. Secured Novation Management Dashboard Access restricted to select employees. New user group and AD group created to control access. 15

Key Benefits to using Documentum IRM Flexible - Ability to have separate rights policies Dynamic - Policies can be changed on the fly. Ability to use multiple Active Directory forests to control access. Instant expiration of outdated documents Instant removal of former employees, members, etc. Screen-prints, copy & paste are disabled Auditing - Ability to track usage of documents and run reports And SECURE! SECURE! SECURE! 16

? 17