2. Securing Information Wherever It Goes
Most of us can keep a secret.
It is the people we tell it to, who cannot.
- Anonymous
3. Structured
Databases
Digital
Information
Applications
ERP, CRM, DW
MIS / Reports / Data Extracts Content
Files, Folders, Emails
Unstructured
Information
Gartner 2013
Big Content: The Unstructured Side of Big Data
“Unstructured data represents as much as
80% of an organization’s total information
assets”
Enterprise Information Universe
4. Internal: Perimeter Definition Challenges
End Points Locations
People Applications
Bring Your Own
Device
iPads in Boardroom
Mobile Employees
External
Collaboration
Lawyers, Auditors,
Partners, Service
Providers, Joint Ventures
…
Cloud Applications:
SalesForce…
Cloud Services:
DropBox…
5. Very often, information needs to travel outside the enterprise
boundary to:
Every enterprise needs External Collaboration
External: Information Going Out
11. Permanence
Protection will always persist with the file
Remote-Control
Change your protection policy,
sitting anywhere in the world
Audit Trail
All activities on file tracked:
Users, Activity type, Date/Time,
Location
What other features will be
required?
12. 1. Ease of Protection - Automating Policy assignment
2. Easy for user
3. Senior Management involvement
Key requirements for successful
implementation of IRM
12 Seclore Company Confidential
13. API
Integration
ERP, CRM,
DW, etc.
Data Loss
Prevention
Content /
Document
Management
Mail &
Messaging
* Recipient
can use any
mail client
Ease of protection (Automatic
Protection)
14. Use in native application
• File extension in maintained
• File opens in native application
(e.g. MS-Office, Acrobat Reader, AutoCAD, OpenOffice)
User authentication
For internal users, integrate with AD and other IAM / SSO tools
Smart devices support
iOS and Android viewers, for smartphone and tabs
BYOD
Easy for Users
Access for external users
15. Senior Management
Involvement
1. Buy in from the senior leadership of the organization
2. High visibility
• Internal marketing of the project
• Awareness of security risk
3. Process changes to handle regulatory and compliance data