irm and e-discovery

16
Information Rights Management Redefining Information Security

Upload: carl-frappaolo

Post on 18-Nov-2014

2.672 views

Category:

Business


0 download

DESCRIPTION

Introduction into Content Security, how it is different from traditional IT approaches to security, with a delve into the component technology of IRM. Some examples of how the technology works in a legal setting, including e-discovery.

TRANSCRIPT

Page 1: IRM and E-discovery

Information Rights Management

Redefining Information

Security

Page 2: IRM and E-discovery

The Traditional View to

Information Security• Perimeter:

"Traditional" Network Security

• Core: Desktops, Servers, Machines, OSes, Applications

• Content: Content in all forms, whether at rest or in motion

Perimeter

Core

Content

Page 3: IRM and E-discovery

Perimeter Thinking• Traditional Security is

about securing the edge, primarily from outsiders

• Standard policy is:OUTSIDE = UNTRUSTEDINSIDE = (COMPLETELY) TRUSTED

• Traditional Security is generic and does lowest common denominator levels of protection to secure the network, apps, desktops, but not content specifically

Trusted

Page 4: IRM and E-discovery

“Modern-Traditional”

Security• Due to VPNs, WiFi, HTTP

(web) traffic freely passing corporate firewalls

• Perimeter shrinks down to the device/person, regardless of where you are, how you're connected, what you’re doing

• This provides a new level of CONTEXT to security, only allowing trust to exist in very specific instances, although still typically a generic defense - securing the machine itself, but not the content on it, or sending to/from it.

Semi-Trusted

Page 5: IRM and E-discovery

Application-Level Security• Document/Content

Management provides access into repositories with document/user level controls - a mini perimeter

• Records Management provides lifecycle management for Archive and Destruction

• Content is free to go where it will once it is out of those systems

Page 6: IRM and E-discovery

Information Rights Management

• Policy-based• Imposed at the

document/user/application level (context)

• Omni-present • Auto-auditing• Content

Authentication• User Authentication• Encryption

POLICY

Page 7: IRM and E-discovery

“Traditional” Security Strategy

Which of the following definitions of Digital Information Access Control most closely aligns with your definition?

Control & Secure Collaborate & Innovate

Page 8: IRM and E-discovery

IRM Security Strategy

Which of the following definitions of Digital Information Access Control most closely aligns with your definition?

Control& Secure

Collaborate& Innovate

Risk vs.Benefit

Page 9: IRM and E-discovery

Why IRM?•Conflict of interest•Self-regulating secure access

•M&A•Bi-directional sharing files in a

controlled space•No extended sharing•Project timeline

Page 10: IRM and E-discovery

Why IRM?•E-Discovery•The “Ultimate” Secure Collaboration

Platform•No extended sharing - In Context•Automated Clawbacks•Dynamic enabling/disabling•Automated & Complete End of Trial

Expiration•Policy-based / repeatable

Page 11: IRM and E-discovery

Market RealityWithin the past 2 years, has content been accesses by an unauthorized individual either deliberately or accidentally?

Is Your Organization’s Content Security Strategy Driven More by a Desire to Lock Down Content or to Enable Secure Collaboration?

Page 12: IRM and E-discovery

Market RealityWithin the past 2 years, has content been accesses by an unauthorized individual either deliberately or accidentally?

How Well is Content Security Understood in Your Organization?

0% 7.5% 15.0% 22.5% 30.0%

Well Aware and areExpressly Addressing It

Vaguely Familiar and Understandits Relationship to the BroaderTopic of Security

Not Sure How This is DifferentForm Security in General

No Clear How Understanding

Page 13: IRM and E-discovery

Market RealityWithin the past 2 years, has content been accesses by an unauthorized individual either deliberately or accidentally?

What is Your Organization’s Current Involvement With Content Security?

Page 14: IRM and E-discovery

Developing a Strategy

Assuming budget is available, identify the primary obstacles to implementing Digital Information Access Control?

Control& Secure

Collaborate& Innovate

Page 15: IRM and E-discovery

Why Care?•Security is a major issue for CxOs•Future-proofing your business

requires addressing this as competitive advantage

•IRM is critical but requires positioning and education

•Strategic deployment and alignment with business provides competitive advantage, holistic benefit

Page 16: IRM and E-discovery

•Carl Frappaolo•[email protected]•617 933 2584

Q & A