![Page 1: Vishal Gupta - Information Rights Management - Interop Mumbai 2009](https://reader031.vdocuments.us/reader031/viewer/2022020207/54b384004a7959d8128b4599/html5/thumbnails/1.jpg)
Information Rights Management
Coming of age
Presentation at InterOp 2009, Mumbai
Vishal Gupta
CEO, Seclore
![Page 2: Vishal Gupta - Information Rights Management - Interop Mumbai 2009](https://reader031.vdocuments.us/reader031/viewer/2022020207/54b384004a7959d8128b4599/html5/thumbnails/2.jpg)
TELEMARKETER
Information exchange in the collaborative world
Information is exchanged between Employees of the organisation
Enterprise
CUSTOMERS
VENDORS
Information is exchanged between employees & vendors & employees & customers
Competitors
What happens if an employee with privileged access leaves to join a competitor ?What happens if information shared with a vendor is lost by the vendor ?
VPN
SSL
UTM
…
Firewalls
![Page 3: Vishal Gupta - Information Rights Management - Interop Mumbai 2009](https://reader031.vdocuments.us/reader031/viewer/2022020207/54b384004a7959d8128b4599/html5/thumbnails/3.jpg)
Underlying Issues
Share it = It becomes his (also)Ownership and usage cannot be separated
Shared once = Shared foreverImpossible to “recall” information
Out of the enterprise = Free for allTechnology & processes are only applicable within
![Page 4: Vishal Gupta - Information Rights Management - Interop Mumbai 2009](https://reader031.vdocuments.us/reader031/viewer/2022020207/54b384004a7959d8128b4599/html5/thumbnails/4.jpg)
The Result
Information lands up in public websites !
![Page 5: Vishal Gupta - Information Rights Management - Interop Mumbai 2009](https://reader031.vdocuments.us/reader031/viewer/2022020207/54b384004a7959d8128b4599/html5/thumbnails/5.jpg)
Create Store Transmit & collaborate Use Archive & Backup Delete
DLP Anti-virus Anti-…
Hard disk encryption
SSL UTM
Application security
IDM DLP Vaults Digital shredders
Desktops
Laptops
Heterogeneous policies … Heterogeneous infrastructure
Mobile devices
Removable media
Content Management
Online workspaces
Remote desktops
Information lifecycle …
Shared folders Removable
media
Instant Messaging
Desktops
Laptops
Mobile devices
Archive
Backup
Document retention
Security
![Page 6: Vishal Gupta - Information Rights Management - Interop Mumbai 2009](https://reader031.vdocuments.us/reader031/viewer/2022020207/54b384004a7959d8128b4599/html5/thumbnails/6.jpg)
Options for securing unstructured information
Option 1 : Control Distribution
. . .
Security Collaboration
![Page 7: Vishal Gupta - Information Rights Management - Interop Mumbai 2009](https://reader031.vdocuments.us/reader031/viewer/2022020207/54b384004a7959d8128b4599/html5/thumbnails/7.jpg)
Options for securing unstructured information
Option 2 : Control Usage
. . .
Security Collaboration
![Page 8: Vishal Gupta - Information Rights Management - Interop Mumbai 2009](https://reader031.vdocuments.us/reader031/viewer/2022020207/54b384004a7959d8128b4599/html5/thumbnails/8.jpg)
• WHO can use the informationPeople & groups within and outside of the
organization can be defined as rightful users of the information
• WHAT can each person doIndividual actions like reading, editing, printing,
distributing, copy-pasting, screen grabbing etc. can be controlled
• WHEN can he use itInformation usage can be time based e.g. can
only be used by Mr. A till 28th Sept OR only for the 2 days
• WHERE can he use it fromInformation can be linked to locations e.g. only 3rd floor office by private/public IP addresses
Rights management technologies allow enterprises to define and implement information usage “policies”. A “policy” defines :
Information Rights Management
![Page 9: Vishal Gupta - Information Rights Management - Interop Mumbai 2009](https://reader031.vdocuments.us/reader031/viewer/2022020207/54b384004a7959d8128b4599/html5/thumbnails/9.jpg)
Information Rights Management
Policies are
• Persistent : Policies are implemented on information and all itscopies wherever they are transmitted or stored
• Dynamic : Policies can be changed without having access to or redistributing the information
• Monitored : Policy changes can be monitored
User actions are
• Monitored : Individual actions ( authorized AND unauthorized ) like
viewing, editing, printing etc. are monitored and centrally available in a reporting tool
![Page 10: Vishal Gupta - Information Rights Management - Interop Mumbai 2009](https://reader031.vdocuments.us/reader031/viewer/2022020207/54b384004a7959d8128b4599/html5/thumbnails/10.jpg)
Scenario: Research reports & drawings
Within office network
Till the time of employment
NoNoYesYesSanjiv
Within office network
30th November 2009
NoNoNoYesRahul
DistributePrintEditRead
WHEREWHENWHATWHO
organization
Rahul
Sanjiv
![Page 11: Vishal Gupta - Information Rights Management - Interop Mumbai 2009](https://reader031.vdocuments.us/reader031/viewer/2022020207/54b384004a7959d8128b4599/html5/thumbnails/11.jpg)
About
Seclore is a high growth information security product company focussed on providing Security without compromising collaboration
Seclore’s flagship product Seclore FileSecure is used by More than 1 million users & some of the largest enterprises