securing content with...

30
Copyright © 2012 Autonomy Inc., an HP Company. All rights reserved. Other trademarks are registered trademarks and the properties of their respective owners. Securing Content with WorkSite Harvey Jang, Esq., Director, Privacy and Information Management, Hewlett Packard Corporation Liza Madden, Director of Marketing, Autonomy, an HP Company Shawn Misquitta, Senior Director of Technology , Autonomy, an HP Company Autonomy an HP Company

Upload: others

Post on 21-May-2020

2 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Securing Content with WorkSiteilta.personifycloud.com/webfiles/productfiles/1503820/SecuringCont… · Securing Content with WorkSite Harvey Jang, Esq., Director, ... ScaleXtreme

Copyright © 2012 Autonomy Inc., an HP Company. All rights reserved. Other trademarks are registered trademarks and the properties of their respective owners.

Securing Content with WorkSiteHarvey Jang, Esq., Director, Privacy and Information Management, Hewlett Packard Corporation

Liza Madden, Director of Marketing, Autonomy, an HP Company

Shawn Misquitta, Senior Director of Technology , Autonomy, an HP Company

Autonomy an HP Company

Page 2: Securing Content with WorkSiteilta.personifycloud.com/webfiles/productfiles/1503820/SecuringCont… · Securing Content with WorkSite Harvey Jang, Esq., Director, ... ScaleXtreme

Copyright © 2012 Autonomy Inc., an HP Company. All rights reserved. Other trademarks are registered trademarks and the properties of their respective owners.2

Agenda

Security challenges in Fortune 10 corporationExpectations for Outside Counsel – from inside counsel perspectiveSecuring Content in WorkSiteLinkSite for WorkSiteWorkSite Mobility SecurityInformation GovernanceSecurity Dashboards – have not talked to Neil about this yetQ&A

Page 3: Securing Content with WorkSiteilta.personifycloud.com/webfiles/productfiles/1503820/SecuringCont… · Securing Content with WorkSite Harvey Jang, Esq., Director, ... ScaleXtreme

Copyright © 2012 Autonomy Inc., an HP Company. All rights reserved. Other trademarks are registered trademarks and the properties of their respective owners.3

Guest Speaker

Harvey serves as HP’s Director of Privacy & Information Management and leads strategic initiatives related to information governance, including “Privacy by Design”, Binding Corporate Rules, APEC Cross Border Privacy Rules, unstructured data and records management, and other such programs. He was previously HP’s lead attorney for privacy and cyber security related issues and escalations. Prior to joining HP, Harvey was litigation counsel with O’Melveny & Myers LLP and has extensive experience in international electronic discovery.

Harvey Jang

Director

Privacy & Information Management

Hewlett Packard Company

Page 4: Securing Content with WorkSiteilta.personifycloud.com/webfiles/productfiles/1503820/SecuringCont… · Securing Content with WorkSite Harvey Jang, Esq., Director, ... ScaleXtreme

Copyright © 2012 Autonomy Inc., an HP Company. All rights reserved. Other trademarks are registered trademarks and the properties of their respective owners.4

Duty of Confidentiality

ABA Model Rules of Professional ConductRule 1.6 (c): A lawyer shall make reasonable efforts to prevent the inadvertent or unauthorized disclosure of, or unauthorized access to, information relating to the representation of a client.

What are “reasonable efforts”? What Physical, Technical, and Administrative Controls Are Required?• Regulatory requirements (eg, HIPAA, Massachusetts and other jurisdictions)

• Industry standards and best practices (eg, PCI Data Security Standards, ISO)

• Client / contract requirements (eg, security schedules)

• Brand and reputation

Page 5: Securing Content with WorkSiteilta.personifycloud.com/webfiles/productfiles/1503820/SecuringCont… · Securing Content with WorkSite Harvey Jang, Esq., Director, ... ScaleXtreme

Copyright © 2012 Autonomy Inc., an HP Company. All rights reserved. Other trademarks are registered trademarks and the properties of their respective owners.5

Law Firms Are A Target / Backdoor To Client Data

On November 1, 2009, the FBI issued an advisory warning to law firms that they were specifically being targeted by hackers.

Mary Galligan, Head of the FBI Cyber Division (New York)“As financial institutions in New York City and the world become stronger, a hacker can hit a law firm and it’s a much, much easier quarry.”

- “China-Based Hackers Target Law Firms to Get Secret Deal Data”Bloomberg, January 31, 2012

Page 6: Securing Content with WorkSiteilta.personifycloud.com/webfiles/productfiles/1503820/SecuringCont… · Securing Content with WorkSite Harvey Jang, Esq., Director, ... ScaleXtreme

Copyright © 2012 Autonomy Inc., an HP Company. All rights reserved. Other trademarks are registered trademarks and the properties of their respective owners.6

Controlling The Perimeter Is Not Enough

New technology access methods

• Technology has changed how information is created and accessed

• There is no real perimeter anymore

• The content itself must be protected

The InternetClient/serverMobile, social,

big data & the cloud

CRM

SCM

HCM

MRM

Amazon Web Services

IBM

GoGrid

Joyent

Hosting.comTata Communications

DatapipeAlterian

Hyland

LimeLight NetDocumentsNetReach

OpenText

Google

HP

EMCQvidian

Sage

salesforce.com

Xactly

Zoho

Ariba

CCC

DCC

Cost Management

Order Entry

Product Configurator

Bills of Material Engineering

Inventory

Manufacturing Projects

Quality Control

Education

Lifestyle

Music

Reference

Sport

Travel

Every 60 seconds

400,710 ad requests

2000 lyrics playedon Tunewiki

1500 pingssent on PingMe

34,597 peopleusing Zinio

208,333 minutes ofAngry Birds played

23,148 apps downloaded

Unisys

BurroughsHitachi

NEC

Taleo

Workscape

Cornerstone onDemand

OpSource

PPM

PaperHost

XeroxMicrosoft

SLI Systems

IntraLinks

SugarCRM

Volusion

Adobe

Avid

Corel

Microsoft

Serif

YahooCyberShift

Saba

Softscape

Sonar6

Yahoo!

Quadrem

Elemica

Kinaxis

SCMADP VirtualEdge

CyberShift

KenexaSaba

Softscape

Sonar6

Exact Online

FinancialForce.com

Intacct NetSuite

SAP

NetSuite

Plex Systems

Database

ERP HCM

PLM

Claim Processing

Bull

Fijitsu

Cash Management

Accounts Receivable

Fixed AssetsCosting

Billing

Time and Expense

Activity Management

Payroll

Training

Time & Attendance

RosteringSales tracking &

Marketing

Commissions Service

Data Warehousing

98,000 tweets

Finance

box.net

Facebook

LinkedIn

Pinterest

Atlassian

SmugMugAmazoniHandy

PingMe

Snapfish Urban

Scribd.

Pandora

AppFog

Bromium

Splunk

kaggle

Parse

ScaleXtreme

SolidFire

Quickbooks

Foursquare

buzzd

Dragon DictioneBay

SuperCam

UPS Mobile

Scanner Pro

Rackspace

Jive Software

Paint.NET

Business

Entertainment

Games

Navigation

News

Photo & Video

Productivity

Social Networking

Utilities

Workbrain

SuccessFactors

Workday

TripIt

Zynga

Zynga

Baidu

Twitter

TwitterYammer

Atlassian

MobilieIronSmugMug

Atlassian

Amazon

PingMe

Associatedcontent

Flickr

YouTube

Answers.com

Tumblr.

MobileFrame.com

Mixi

CYworld

Qzone

Renren

Xing

Yandex

YandexHeroku

RightScale

New Relic

CloudSigma

cloudability

nebula

Zillabyte

dotCloud

BeyondCore

Mozy

Viber

Fring Toggl

MailChimp

Hootsuite

Fed Ex Mobile

DocuSign

HP ePrint

iSchedule

Khan Academy

BrainPOP

myHomework

Cookie Doodle

Ah! Fasion Girl

Mainframe

Page 7: Securing Content with WorkSiteilta.personifycloud.com/webfiles/productfiles/1503820/SecuringCont… · Securing Content with WorkSite Harvey Jang, Esq., Director, ... ScaleXtreme

Copyright © 2012 Autonomy Inc., an HP Company. All rights reserved. Other trademarks are registered trademarks and the properties of their respective owners.7

Page 8: Securing Content with WorkSiteilta.personifycloud.com/webfiles/productfiles/1503820/SecuringCont… · Securing Content with WorkSite Harvey Jang, Esq., Director, ... ScaleXtreme

Copyright © 2012 Autonomy Inc., an HP Company. All rights reserved. Other trademarks are registered trademarks and the properties of their respective owners.8

Securing Sensitive Content

Copyright © 2012 Autonomy Inc., an HP Company. All rights reserved. Other trademarks are registered trademarks and the properties of their respective owners.

Page 9: Securing Content with WorkSiteilta.personifycloud.com/webfiles/productfiles/1503820/SecuringCont… · Securing Content with WorkSite Harvey Jang, Esq., Director, ... ScaleXtreme

Copyright © 2012 Autonomy Inc., an HP Company. All rights reserved. Other trademarks are registered trademarks and the properties of their respective owners.9

Client or Matter Level

Copyright © 2012 Autonomy Inc., an HP Company. All rights reserved. Other trademarks are registered trademarks and the properties of their respective owners.

Page 10: Securing Content with WorkSiteilta.personifycloud.com/webfiles/productfiles/1503820/SecuringCont… · Securing Content with WorkSite Harvey Jang, Esq., Director, ... ScaleXtreme

Copyright © 2012 Autonomy Inc., an HP Company. All rights reserved. Other trademarks are registered trademarks and the properties of their respective owners.10

Access from Anywhere usingAny Device

Page 11: Securing Content with WorkSiteilta.personifycloud.com/webfiles/productfiles/1503820/SecuringCont… · Securing Content with WorkSite Harvey Jang, Esq., Director, ... ScaleXtreme

Copyright © 2012 Autonomy Inc., an HP Company. All rights reserved. Other trademarks are registered trademarks and the properties of their respective owners.11

Security Improvements – WorkSite 9.0

Optimistic

Jim View Access

GrantsBP Matter = ViewPartners = Read/Write

RevokesAlex = No Access

BP MatterJim

PartnersBenAlex

Ben has Read/Write Access

Alex has Read/Write Access

Page 12: Securing Content with WorkSiteilta.personifycloud.com/webfiles/productfiles/1503820/SecuringCont… · Securing Content with WorkSite Harvey Jang, Esq., Director, ... ScaleXtreme

Copyright © 2012 Autonomy Inc., an HP Company. All rights reserved. Other trademarks are registered trademarks and the properties of their respective owners.12

Security Improvements – WorkSite 9.0

Optimistic Pessimistic

BP MatterJim

PartnersBenAlex

Jim View Access Ben has View Access

Alex has No Access

GrantsBP Matter = ViewPartners = Read/Write

RevokesAlex = No Access

Page 13: Securing Content with WorkSiteilta.personifycloud.com/webfiles/productfiles/1503820/SecuringCont… · Securing Content with WorkSite Harvey Jang, Esq., Director, ... ScaleXtreme

Copyright © 2012 Autonomy Inc., an HP Company. All rights reserved. Other trademarks are registered trademarks and the properties of their respective owners.13

Security Improvements – WorkSite 9.0

Optimistic Hybrid Pessimistic

BP MatterJim

PartnersBenAlex

Jim View Access Ben has Read/Write Access

Alex has No Access

GrantsBP Matter = ViewPartners = Read/Write

RevokesAlex = No Access

Page 14: Securing Content with WorkSiteilta.personifycloud.com/webfiles/productfiles/1503820/SecuringCont… · Securing Content with WorkSite Harvey Jang, Esq., Director, ... ScaleXtreme

Copyright © 2012 Autonomy Inc., an HP Company. All rights reserved. Other trademarks are registered trademarks and the properties of their respective owners.

LinkSite for WorkSite

Page 15: Securing Content with WorkSiteilta.personifycloud.com/webfiles/productfiles/1503820/SecuringCont… · Securing Content with WorkSite Harvey Jang, Esq., Director, ... ScaleXtreme

Copyright © 2012 Autonomy Inc., an HP Company. All rights reserved. Other trademarks are registered trademarks and the properties of their respective owners.15

Cloud Will Transform Client Collaboration

Page 16: Securing Content with WorkSiteilta.personifycloud.com/webfiles/productfiles/1503820/SecuringCont… · Securing Content with WorkSite Harvey Jang, Esq., Director, ... ScaleXtreme

Copyright © 2012 Autonomy Inc., an HP Company. All rights reserved. Other trademarks are registered trademarks and the properties of their respective owners.16

WorkSite with Cloud Integration

Law Firm • Cannot send large Attachments

• Mailbox bloats

• Collaboration is difficult

Client

Page 17: Securing Content with WorkSiteilta.personifycloud.com/webfiles/productfiles/1503820/SecuringCont… · Securing Content with WorkSite Harvey Jang, Esq., Director, ... ScaleXtreme

Copyright © 2012 Autonomy Inc., an HP Company. All rights reserved. Other trademarks are registered trademarks and the properties of their respective owners.17

WorkSite with Cloud Integration

Law Firm Client• Integrated with WS

• Audited

• Under RM policy

Page 18: Securing Content with WorkSiteilta.personifycloud.com/webfiles/productfiles/1503820/SecuringCont… · Securing Content with WorkSite Harvey Jang, Esq., Director, ... ScaleXtreme

Copyright © 2012 Autonomy Inc., an HP Company. All rights reserved. Other trademarks are registered trademarks and the properties of their respective owners.

Demonstration

Page 19: Securing Content with WorkSiteilta.personifycloud.com/webfiles/productfiles/1503820/SecuringCont… · Securing Content with WorkSite Harvey Jang, Esq., Director, ... ScaleXtreme

Copyright © 2012 Autonomy Inc., an HP Company. All rights reserved. Other trademarks are registered trademarks and the properties of their respective owners.19

LinkSite for WorkSite – Leveraging the HP Cloud

• Secure Send from WorkSite

– Comprehensive audit trail in WorkSite

– Expiry and authentication options

– Bypass Exchange Attachments

• Ad-hoc, Self-service Extranets

– Mine Correspondence folder for external contacts

– LinkSite visible from within the Workspace

– External users access the cloud, not the corporate/firm WorkSite

Page 20: Securing Content with WorkSiteilta.personifycloud.com/webfiles/productfiles/1503820/SecuringCont… · Securing Content with WorkSite Harvey Jang, Esq., Director, ... ScaleXtreme

Copyright © 2012 Autonomy Inc., an HP Company. All rights reserved. Other trademarks are registered trademarks and the properties of their respective owners.

WorkSite Mobility

Page 21: Securing Content with WorkSiteilta.personifycloud.com/webfiles/productfiles/1503820/SecuringCont… · Securing Content with WorkSite Harvey Jang, Esq., Director, ... ScaleXtreme

Copyright © 2012 Autonomy Inc., an HP Company. All rights reserved. Other trademarks are registered trademarks and the properties of their respective owners.21

WorkSite App v2.0 (for iPad) –Security Enhancements

• HTTPS / SSL – no VPN required

– Works with WorkSite v8.5 & v9.0

• ADS Trusted Login supported

• Comprehensive Audit Trail

• iOS Encrypted Store for documents on iPad

Page 22: Securing Content with WorkSiteilta.personifycloud.com/webfiles/productfiles/1503820/SecuringCont… · Securing Content with WorkSite Harvey Jang, Esq., Director, ... ScaleXtreme

Copyright © 2012 Autonomy Inc., an HP Company. All rights reserved. Other trademarks are registered trademarks and the properties of their respective owners.22

New Enhancements to WorkSite Mobility

SECURITY

• Good Technologies

• RSA Integration

EDITING CONTENT

• Annotations

• Document revisions

CAPTURE & PRINT

• OCR & PDF

• Mobile Print

Page 23: Securing Content with WorkSiteilta.personifycloud.com/webfiles/productfiles/1503820/SecuringCont… · Securing Content with WorkSite Harvey Jang, Esq., Director, ... ScaleXtreme

Copyright © 2012 Autonomy Inc., an HP Company. All rights reserved. Other trademarks are registered trademarks and the properties of their respective owners.23

WorkSite App for iOS: Security Enhancements• Good Technology

– Leverage Good Dynamics

– WorkSite App for Good (separate app)

– Mobile device management

• Remote wipe

• Secured communication

• Secured container

• Etc.

• Additional Authentication Methods

– Trusted Authentication with providers targeted

• RSA Secure ID

• Working with Proxies & proxy authentication

Page 24: Securing Content with WorkSiteilta.personifycloud.com/webfiles/productfiles/1503820/SecuringCont… · Securing Content with WorkSite Harvey Jang, Esq., Director, ... ScaleXtreme

Copyright © 2012 Autonomy Inc., an HP Company. All rights reserved. Other trademarks are registered trademarks and the properties of their respective owners.24

Good Dynamics Architecture

Good Dynamics AppApp Code

Good Dynamics Library

Cloud Applications or Services

Good Dynamics NOC

Good Control (GC)

Good Proxy (GP)

Enterprise Applications or Services

Page 25: Securing Content with WorkSiteilta.personifycloud.com/webfiles/productfiles/1503820/SecuringCont… · Securing Content with WorkSite Harvey Jang, Esq., Director, ... ScaleXtreme

Copyright © 2012 Autonomy Inc., an HP Company. All rights reserved. Other trademarks are registered trademarks and the properties of their respective owners.

Information Governance

Page 26: Securing Content with WorkSiteilta.personifycloud.com/webfiles/productfiles/1503820/SecuringCont… · Securing Content with WorkSite Harvey Jang, Esq., Director, ... ScaleXtreme

Copyright © 2012 Autonomy Inc., an HP Company. All rights reserved. Other trademarks are registered trademarks and the properties of their respective owners.26

Know where your stuff is

Data security goes beyond ACL rights and must address data at rest and in motion

Being able to watch what is going on in real time serves as a deterrent as well as a monitoring system

Once you know what you have and where it is, you can apply policy to it.

Copyright © 2012 Autonomy Inc., an HP Company. All rights reserved. Other trademarks are registered trademarks and the properties of their respective owners.

Page 27: Securing Content with WorkSiteilta.personifycloud.com/webfiles/productfiles/1503820/SecuringCont… · Securing Content with WorkSite Harvey Jang, Esq., Director, ... ScaleXtreme

Copyright © 2012 Autonomy Inc., an HP Company. All rights reserved. Other trademarks are registered trademarks and the properties of their respective owners.27 Copyright © 2012 Autonomy Inc., an HP Company. All rights reserved. Other trademarks are registered trademarks and the properties of their respective owners.

Page 28: Securing Content with WorkSiteilta.personifycloud.com/webfiles/productfiles/1503820/SecuringCont… · Securing Content with WorkSite Harvey Jang, Esq., Director, ... ScaleXtreme

Copyright © 2012 Autonomy Inc., an HP Company. All rights reserved. Other trademarks are registered trademarks and the properties of their respective owners.28

From RM to Policy Driven Information Governance

• Visibility• Understanding• Action

Page 29: Securing Content with WorkSiteilta.personifycloud.com/webfiles/productfiles/1503820/SecuringCont… · Securing Content with WorkSite Harvey Jang, Esq., Director, ... ScaleXtreme

Copyright © 2012 Autonomy Inc., an HP Company. All rights reserved. Other trademarks are registered trademarks and the properties of their respective owners.

Demonstration

Page 30: Securing Content with WorkSiteilta.personifycloud.com/webfiles/productfiles/1503820/SecuringCont… · Securing Content with WorkSite Harvey Jang, Esq., Director, ... ScaleXtreme

Copyright © 2012 Autonomy Inc., an HP Company. All rights reserved. Other trademarks are registered trademarks and the properties of their respective owners.

Thank You