Secure Engineering Collaboration with Integrated Rights Management



Similar documents
EMC Documentum Information Rights Management

Leveraging Teamcenter security capabilities to protect your intellectual property and enable secure collaboration

NextLabs Rights Management Platform

Enabling compliance with PLM audit management

With Great Power comes Great Responsibility: Managing Privileged Users

Addressing ITAR compliance with Teamcenter

Agenda SAP AG or an SAP affiliate company. All rights reserved. 2

IBM Data Security Services for endpoint data protection endpoint data loss prevention solution

Teradata and Protegrity High-Value Protection for High-Value Data

DIGITAL GUARDIAN 6. The Foundation of Enterprise Information Protection

White Paper. Managing Risk to Sensitive Data with SecureSphere

Enterprise Rights Management

Teamcenter electronic work instruction

Aras Innovator Solutions for Complex Materials. Copyright 2012 Ceradyne

IBM Data Security Services for endpoint data protection endpoint data loss prevention solution

Enforce Governance, Risk, and Compliance Programs for Database Data

Product Data Security and Access Management. Dilip Agrawal Security PLM Lead Ford Motor Company

Fasoo Data Security Framework

A Buyer's Guide to Data Loss Protection Solutions

CAD.TIMKEN.COM QUICK START GUIDE. Stronger. Value. Stronger. By Design.

CAD. Office to enterprise Product Data Management. Product Overview

ENOVIA Aerospace and Defense Accelerator for Program Management

RSA Solution Brief RSA. Data Loss. Uncover your risk, establish control. RSA. Key Manager. RSA Solution Brief

Siemens PLM Software. Energy and utilities. PLM solutions for tough industry challenges and sustained business growth. siemens.

Integrating Adobe LiveCycle ES and Microsoft Office SharePoint

Siemens PLM Software. Overview. 28 th of May 2008 Bulgaria. Colin Johnson

Get More from Microsoft SharePoint with Oracle Fusion Middleware. An Oracle White Paper January 2008

Master Diploma in Product Design and Analysis Course Code Software Used Duration MCADD MD100 AutoCAD 2D + Creo + SolidWorks + ANSYS + PPM Concepts +

Agenda , Palo Alto Networks. Confidential and Proprietary.

Ten Critical Questions to Ask a Manufacturing ERP Vendor

WHITE PAPER. Locuz.com. Data Sheet. locuz.com

Privilege Gone Wild: The State of Privileged Account Management in 2015

DISCOVER, MONITOR AND PROTECT YOUR SENSITIVE INFORMATION Symantec Data Loss Prevention. symantec.com

Solid Edge Insight. Siemens PLM Software. Seamlessly integrate design management, CAD and web-based collaboration in a single tool

Protecting Business Information With A SharePoint Data Governance Model. TITUS White Paper

Analyzing Security for Retailers An analysis of what retailers can do to improve their network security

How do we seamlessly integrate design management, CAD and web-based collaboration in a single tool?

How-To Guide: Cyber Security. Content Provided by

BEDIFFERENT A C E I N T E R N A T I O N A L

Automotive Engineering Change: The Key to Cost Reduction for Competitive Advantage

Compliance and Security Solutions

User Driven Security. 5 Critical Reasons Why It's Needed for DLP. TITUS White Paper

Solid Edge Diagramming

Compliance Guide ISO Compliance Guide. September Contents. Introduction 1. Detailed Controls Mapping 2.

Product Lifecycle Sourcing enabled by Teamcenter s SRM solutions

Stay ahead of insiderthreats with predictive,intelligent security

10 Smart Ideas for. Keeping Data Safe. From Hackers

Information Risk Management. Alvin Ow Director, Technology Consulting Asia Pacific & Japan RSA, The Security Division of EMC

Taking PLM to production with Shop Floor Connect for Teamcenter

Veritas ediscovery Platform

5 Lines of Defense You Need to Secure Your SharePoint Environment SharePoint Security Resource Kit

Simplify SSL Certificate Management Across the Enterprise

Hybrid 2D/3D design The right tool for the right job at the right time

ERP Integration Strategies Approaches for Integrating ERP and PLM

Ten Critical Questions to Ask a Manufacturing ERP Vendor

Symantec ediscovery Platform, powered by Clearwell

A mobility strategy for PLM users

Security Practices for Online Collaboration and Social Media

PLM Software. Answers for industry. Siemens PLM Software. e x e c u t i v e w h i t e p a p e r

SECURE FILE SHARING AND COLLABORATION: THE PATH TO INCREASED PRODUCTIVITY AND REDUCED RISK

ORANGE REGIONAL MEDICAL CENTER Hospital Wide Policy/Procedure

BEDIFFERENT ACE G E R M A N Y. aras.com. Copyright 2012 Aras. All Rights Reserved.

Implementation of a Collaborative Engineering Data Management System. Tony Metz Fermilab 04 May 2015

Cisco on Cisco Best Practice Security Practices for Online Collaboration and Social Media

Best Practices for a BYOD World

Medical equipment development solutions. Siemens PLM Software

How To Secure Your Store Data With Fortinet

Siemens PLM Software. Electronics Manufacturing Services. Using PLM to accelerate and optimize the production process. siemens.

Tecnomatix quality management solutions. Siemens PLM Software

Avoiding the Top 5 Vulnerability Management Mistakes

Asset and Lifecycle Management

ForeScout MDM Enterprise

THE 2014 THREAT DETECTION CHECKLIST. Six ways to tell a criminal from a customer.

Globalization Drives Market Need for Supply Chain Segmentation: Research & Key Strategies

Pace of Change Broadcast Media. Channel 1 Channel 2 Channel 3

Streamlining the drug development lifecycle with Adobe LiveCycle enterprise solutions

The ForeScout Difference

Leverage the asset of big data

Why it s time to move to online accounting software

APPROPRIATE USE OF INFORMATION POLICY 3511 TECHNOLOGY RESOURCES ADOPTED: 06/17/08 PAGE 1 of 5

Software License Asset Management (SLAM) Part III

ITAR Compliant Data Exchange

Dynamic Enterprise Performance Management

Encryption Buyers Guide

Reduce Engineering Project Complexity

Integrating Teamcenter Simulation Process Management with ANSA

Transcription:

Secure Engineering Collaboration with Integrated Rights Management Chris Schrand, Siemens PLM Andy Han, NextLabs GPDIS_2014.ppt 1

Agenda PLM Data Protection Challenges Siemens/NextLabs Enterprise Digital Rights Management (EDRM) EDRM Use Cases Solution Demonstration GPDIS_2014.ppt 2

Protecting the Value of IP An estimated 70 per cent of US corporate assets are tied up in "intangible assets" such as intellectual property, and around 6 per cent of this is being lost in IP theft every year www.theregister.co.uk In 2012, a former employee of a North American automotive company and the employee s spouse were found guilty of stealing trade secrets related to hybrid vehicle technology worth $40 million. The couple intended to sell the information to a Chinese competitor. GPDIS_2014.ppt 3

Challenges Protecting IP while enabling collaboration Maintaining a centralized security strategy Understanding and controlling who, what, when, and where your data is being accessed Making sure people access the right document at the right time GPDIS_2014.ppt 4

About NextLabs and Siemens PLM Leader in Information Risk Management Software and Solutions Customers are Leaders in Aerospace & Defense, High-Tech, Chemical, and Manufacturing Award Winning Products in Rights Management, Entitlement Management, and Compliance Automation 21 Awarded Patents in Information Control Policy and Data Protection Siemens PLM Foundation Partner Siemens PLM Software is a business unit of the Siemens Industry Automation Division. World-leading provider of product lifecycle management (PLM) software, systems and services with nine million licensed seats and 77,000 customers worldwide. Headquartered in Plano, Texas. Siemens PLM Software helps thousands of companies make great products by optimizing their lifecycle processes, from planning and development through manufacturing and support. GPDIS_2014.ppt 5

Data on the Move Challenges Partners Employees Supply Chain Field Sales & Service Supplier Collaboration My PLM Field Operations Engineering Partner/Joint Venture Partner Collaboration Global Collaboration Global Engineering Collaboration GPDIS_2014.ppt 6

What is EDRM? Without EDRM Access Control only controls access to data while managed in User - Creator Access Control 1 Unprotected Data Easily Shared or Lost? No control over downstream access? PLM User - Consumer Unknown GPDIS_2014.ppt 7

What is EDRM? With EDRM Documents are Encrypted and security can be extended to unmanaged data. User - Creator PLM Access Control 1 NXL User - Consumer Rights Enforcement Based on Security 2 Rights Enforcement Based on Security 3 Unknown GPDIS_2014.ppt 8

Integrated EDRM 1. Security and Classification Defined in 2. Documents Rights Protected and Tagged 3. Rights determined by applying policy based on security Intellectual Property Proprietary Export Control ITAR Program Destiny Intellectual Property Export Control Program Rights Open Print Copy Convert GPDIS_2014.ppt 9

EDRM Global Engineering Collaboration Use Case Global PLM systems enable streamlined collaboration and global processes across divisions and geographies but make it challenging to control data for need-to-know projects, new product introduction (NPI), and global regulatory export requirements. Companies much achieve a delicate balance between sharing and securing data. Information Risks NPI engineering data shared outside team members with need to know. Violation of global regulatory export requirements for controlled technical data. Challenges Control access to data based on classification, user project assignments and location. Access controls easily workedaround by sharing via unauthorized channels (e.g. email, file server) Project X NXL GPDIS_2014.ppt 10

EDRM for Field Service Use Case Field Service representatives need access to technical product manuals and service instructions on laptops and mobile devices. After market service business has become a critical business more many manufacturing companies. The risk of IP theft by insiders and competitors is a direct threat to the service revenue. Information Risks Company IP and customer confidential data loss due to lost or stolen devices. Insider threat of remote employees stealing know-how and service customers. NextLabs Challenges Large amounts of technical manuals and service instructions need to be available to a remote/mobile workforce. Technical data in multiple formats including drawings, 3D, and service databases NXL Disconnected Laptops Encrypted Local Data HTML 5 Mobile Devices Secure Viewing GPDIS_2014.ppt 11

EDRM for Supply Chain Collaboration Use Case Product data needs to be shared with suppliers so that they may design, manufacture and test components. Suppliers may additionally need to modify your information to fit into their processes and share your information with their partners/suppliers. Loss or theft of IP is common, while timely and accurate access to the correct product data is critical to control cost and project timelines. Information Risks Intellectual Property loss through suppliers and their partners Disruption caused by Suppliers using old or outdated specifications NextLabs Challenges Visibility and control over product data after it is shared with suppliers. Ensuring that suppliers can no longer access outdated product data. Suppliers will need to share your information with their partners/suppliers Supplier Views, Edits Drawings NXL HTML 5 Access Shared with 2nd Level Supplier GPDIS_2014.ppt 12

EDRM for Partner Product Collaboration Use Case Multiple companies collaborating on product development within partnerships or joint ventures. Both companies must share and jointly develop intellectual property (IP) while protecting the IP of their engineering partners. Protection of IP is a contractual obligation for all parties, but companies lack adequate controls to enforce these. Information Risks Breach of IP licenses or contracts due to mis-handling of partner IP. Loss of company IP through partners. A PLM B Challenges Unclear designation of IP ownership and controls to enforce IP handing requirements.. Ability to share and modify engineering drawings securely. No knowledge of the specific engineers who will need access to data within the other organization. NextLabs NXL Company A Engineers NXL Company B Contact NXL Company B Engineer GPDIS_2014.ppt 13

NextLabs Rights Management Persistent Protection for Intellectual Property CAD, Code, Drawings, 3D Models Also supports Office and PDF Integrated into PLM, ERP, ECM and Cloud applications Securely view documents on any device Read and Write protected data with native engineering applications, even offline Dynamically apply multiple policies to a single document (e.g. Export & IP) Fewer policies to manage Fewer document copies GPDIS_2014.ppt 14

Protect IP Across File Types and Devices Rights Management Client Read, Edit, Copy/Paste, Print, Watermarks, Screen Capture File Type and Application Independent Support for engineering file formats including NX and JT formats Rights Management Server Read Only (Trusted Browsing) HTML 5 Browser-Based, no install Works across device platform Supports hundreds of file types (common and engineering) GPDIS_2014.ppt 15

Rights Management Client Support File Type View Edit Print Copy Expire Markings Business Documents Office (Word, Excel, PPT) PDF Visio Text, CSV HTML Engineering Documents NX JT AutoCAD SolidWorks ProE Catia Creo Source code XML Images (TIF, JPEG,,,) GPDIS_2014.ppt 16

Rights Management Server Support File Type View Edit Print Copy Expire Markings Business Documents Office (Word, Excel, PPT) PDF Visio Text, CSV HTML Engineering Documents NX * * * * * JT * * * * * AutoCAD SolidWorks ProE Catia Creo Source code XML Images (TIF, JPEG,,,) * Future Release GPDIS_2014.ppt 17

Audit and Reporting End-user customizable reporting Custom Dashboards Policy Tagging & Tag Analytics Monitors and Alerts GPDIS_2014.ppt 18

EDRM Summary Extends PLM security model to unmanaged files Works for engineering data types in engineering applications including NX and JT Supports offline access for field-service use cases Supports sharing (read-only) and collaboration (edit) use cases GPDIS_2014.ppt 19