SlideShare ist ein Scribd-Unternehmen logo
1 von 22
HOW ARE YOUR ORGANISATION’S MOST VALUABLE ASSETS PROTECTED? The Core Question
[object Object],Security Fact Number 1
[object Object],[object Object],Introducing ERM
[object Object],Defining ERM
[object Object],[object Object],Security Fact Number 2
[object Object],[object Object],Why ERM?
Protecting Unstructured Data
[object Object],[object Object],Security Fact Number 3
[object Object],How Does ERM Protect Data?
[object Object],[object Object],[object Object],Data Security Breach #1
The threat profile has shifted Perimeter-based Security Keeping the Bad Guys Out Necessary but insufficient Information-based Security Assume They’re Already In Addresses root cause Threat Denial of Service, network  intrusion, external attack Focus Access and availability Approach Firewall, IPS/IDS, anti-malware Solution Build and protect perimeters Privacy breach, intellectual property theft, compromise of HR files, insider attack Authorization and accountability Identity management, data encryption Manage and protect information ,[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],What initiates a DRM Project?
[object Object],[object Object],[object Object],Data Security Breach #2
Who Leads a DRM Project? ,[object Object],[object Object],[object Object],[object Object],[object Object],Executive level sponsorship is required in order to overcome the reluctance of users to secure information
What most DRM Can Provide… ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Fasoo Modules ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Complete Data Protection Cycle Usage Access Granularity of Control Protection of data at rest Protection of data in transit Protection of data in use Enterprise DRM Data Loss Prevention Public Key Infrastructure Enterprise Content Mgt. Network Transport Encryption Full Disk Encryption
Introducing Fasoo.com Probably The World’s Largest eDRM Solution Provider by number of licensed seats
Introducing Documentti ,[object Object],[object Object],[object Object],[object Object]
Technology Advantages ,[object Object],[object Object],[object Object],[object Object],High Low High Security Any application Limited  2) Limited  1) Applicability EMC,  Oracle Plug-In Fasoo Microsoft Vendors Overriding ( Hooking ) Embedded 1) Applicable only if its source code is available 2) Applicable when Plug-in is allowed Comparison of DRM Client Technologies Fasoo’s DRM Client technology allows wide range of permission controls by controlling rendering apps Applications & File Formats Supported by Fasoo’s E- DRM Suites psd, ai, bmp, tiff, jpg, gif, png Adobe Photoshop, Adobe Illustrator, MS Paint, ACD See Image Files avi, mpg, mpeg, mp3, wma, wmv, asf, mid, wav Windows Media Player Multi Media Files dwg, catpart, catproduct, prt, asm, mf1, mf2, sldprt, sldasm Autocad, Catia, Pro-E,  I-deas, Solid Works CAD Documents doc, xls, ppt, pdf, hwp  Microsoft Office, Acrobat,  Area Hangul, Notepad, WordPad Documents Typical File Formats  3) Native Applications  3) 3) Upon request, others can also be supportable Organizations are using variety of rendering apps, yet other vendors only support limited apps.
Technology Advantages ,[object Object],[object Object],[object Object],[object Object],[object Object],Content Management Solutions Rendering  Applications MS Office Adobe Acrobat CAD Others Others Documentum Stellent DRM solution must support multiple server applications, DMS, KMS, CMS, etc. Comparison of Security Domains 1)  Supported * **** Liquid Machines ** ** * Microsoft * * Adobe ** * * **** Oracle * ** EMC ** ***** ***** ***** Fasoo Web Ad-hoc PC Server App Other DRM vendors’ solution does not cover all  security domain (e.g., file creation)
[object Object],Final Question The investment required to prevent a data breach is dwarfed by the resulting costs of a breach – Ponemon Institute

Weitere ähnliche Inhalte

Was ist angesagt?

Security and Privacy Issues of Cloud Computing; Solutions and Secure Framework
Security and Privacy Issues of Cloud Computing; Solutions and Secure FrameworkSecurity and Privacy Issues of Cloud Computing; Solutions and Secure Framework
Security and Privacy Issues of Cloud Computing; Solutions and Secure FrameworkIOSR Journals
 
Messaging Gateway
Messaging GatewayMessaging Gateway
Messaging Gatewayijsrd.com
 
Running head hardware and software security14 hardware an
Running head hardware and software security14 hardware anRunning head hardware and software security14 hardware an
Running head hardware and software security14 hardware anAKHIL969626
 
Wave 14 - Winodws 7 Security Story Core by MVP Azra Rizal
Wave 14 - Winodws 7 Security Story Core by MVP Azra RizalWave 14 - Winodws 7 Security Story Core by MVP Azra Rizal
Wave 14 - Winodws 7 Security Story Core by MVP Azra RizalQuek Lilian
 
Microsoft Forefront - Secure Collaboration Solution Datasheet
Microsoft Forefront -  Secure Collaboration Solution DatasheetMicrosoft Forefront -  Secure Collaboration Solution Datasheet
Microsoft Forefront - Secure Collaboration Solution DatasheetMicrosoft Private Cloud
 
IBM Infosphere Guardium - Database Security
IBM Infosphere Guardium - Database SecurityIBM Infosphere Guardium - Database Security
IBM Infosphere Guardium - Database Securityebuc
 
Partner Productivity Overview - Exchange 2013
Partner Productivity Overview - Exchange 2013Partner Productivity Overview - Exchange 2013
Partner Productivity Overview - Exchange 2013Jennifer Stevenson
 
Running head technology vulnerabilities in the cloud
Running head technology vulnerabilities in the cloud             Running head technology vulnerabilities in the cloud
Running head technology vulnerabilities in the cloud AKHIL969626
 
Guardium Data Activiy Monitor For C- Level Executives
Guardium Data Activiy Monitor For C- Level ExecutivesGuardium Data Activiy Monitor For C- Level Executives
Guardium Data Activiy Monitor For C- Level ExecutivesCamilo Fandiño Gómez
 
Seclore FileSecure HotFolder Walkthrough
Seclore FileSecure HotFolder WalkthroughSeclore FileSecure HotFolder Walkthrough
Seclore FileSecure HotFolder Walkthroughsiddarthc
 
Soonr IT Buyer's Guide
Soonr IT Buyer's GuideSoonr IT Buyer's Guide
Soonr IT Buyer's GuideReece Gaumont
 
Fasoo Secure Document (FSD) for SharePoint
Fasoo Secure Document (FSD) for SharePoint Fasoo Secure Document (FSD) for SharePoint
Fasoo Secure Document (FSD) for SharePoint Fasoo
 
Hirsch Identive | White Paper | Securing the Enterprise in a Networked World
Hirsch Identive | White Paper | Securing the Enterprise in a Networked WorldHirsch Identive | White Paper | Securing the Enterprise in a Networked World
Hirsch Identive | White Paper | Securing the Enterprise in a Networked WorldIdentive
 
Planning A Secure Partner Portal
Planning A Secure Partner PortalPlanning A Secure Partner Portal
Planning A Secure Partner PortalLeo de Sousa
 
How Secure Is Cloud
How Secure Is CloudHow Secure Is Cloud
How Secure Is CloudWilliam Lam
 
Extending Information Security to Non-Production Environments
Extending Information Security to Non-Production EnvironmentsExtending Information Security to Non-Production Environments
Extending Information Security to Non-Production EnvironmentsLindaWatson19
 

Was ist angesagt? (20)

Security and Privacy Issues of Cloud Computing; Solutions and Secure Framework
Security and Privacy Issues of Cloud Computing; Solutions and Secure FrameworkSecurity and Privacy Issues of Cloud Computing; Solutions and Secure Framework
Security and Privacy Issues of Cloud Computing; Solutions and Secure Framework
 
Messaging Gateway
Messaging GatewayMessaging Gateway
Messaging Gateway
 
Data leakage prevention EN Final
Data leakage prevention EN FinalData leakage prevention EN Final
Data leakage prevention EN Final
 
Running head hardware and software security14 hardware an
Running head hardware and software security14 hardware anRunning head hardware and software security14 hardware an
Running head hardware and software security14 hardware an
 
Wave 14 - Winodws 7 Security Story Core by MVP Azra Rizal
Wave 14 - Winodws 7 Security Story Core by MVP Azra RizalWave 14 - Winodws 7 Security Story Core by MVP Azra Rizal
Wave 14 - Winodws 7 Security Story Core by MVP Azra Rizal
 
Microsoft Forefront - Secure Collaboration Solution Datasheet
Microsoft Forefront -  Secure Collaboration Solution DatasheetMicrosoft Forefront -  Secure Collaboration Solution Datasheet
Microsoft Forefront - Secure Collaboration Solution Datasheet
 
IBM Infosphere Guardium - Database Security
IBM Infosphere Guardium - Database SecurityIBM Infosphere Guardium - Database Security
IBM Infosphere Guardium - Database Security
 
Partner Productivity Overview - Exchange 2013
Partner Productivity Overview - Exchange 2013Partner Productivity Overview - Exchange 2013
Partner Productivity Overview - Exchange 2013
 
Running head technology vulnerabilities in the cloud
Running head technology vulnerabilities in the cloud             Running head technology vulnerabilities in the cloud
Running head technology vulnerabilities in the cloud
 
Guardium Data Activiy Monitor For C- Level Executives
Guardium Data Activiy Monitor For C- Level ExecutivesGuardium Data Activiy Monitor For C- Level Executives
Guardium Data Activiy Monitor For C- Level Executives
 
Seclore FileSecure HotFolder Walkthrough
Seclore FileSecure HotFolder WalkthroughSeclore FileSecure HotFolder Walkthrough
Seclore FileSecure HotFolder Walkthrough
 
Soonr IT Buyer's Guide
Soonr IT Buyer's GuideSoonr IT Buyer's Guide
Soonr IT Buyer's Guide
 
Fasoo Secure Document (FSD) for SharePoint
Fasoo Secure Document (FSD) for SharePoint Fasoo Secure Document (FSD) for SharePoint
Fasoo Secure Document (FSD) for SharePoint
 
Hirsch Identive | White Paper | Securing the Enterprise in a Networked World
Hirsch Identive | White Paper | Securing the Enterprise in a Networked WorldHirsch Identive | White Paper | Securing the Enterprise in a Networked World
Hirsch Identive | White Paper | Securing the Enterprise in a Networked World
 
Planning A Secure Partner Portal
Planning A Secure Partner PortalPlanning A Secure Partner Portal
Planning A Secure Partner Portal
 
Term assignment
Term assignmentTerm assignment
Term assignment
 
How Secure Is Cloud
How Secure Is CloudHow Secure Is Cloud
How Secure Is Cloud
 
Extending Information Security to Non-Production Environments
Extending Information Security to Non-Production EnvironmentsExtending Information Security to Non-Production Environments
Extending Information Security to Non-Production Environments
 
Data Leakage Prevention
Data Leakage PreventionData Leakage Prevention
Data Leakage Prevention
 
Bcs consumerisation
Bcs consumerisationBcs consumerisation
Bcs consumerisation
 

Andere mochten auch

Weber DRM What Should The Model Be MIT 11 26 07
Weber DRM What Should The Model Be MIT 11 26 07Weber DRM What Should The Model Be MIT 11 26 07
Weber DRM What Should The Model Be MIT 11 26 07bobweber
 
Drm Evolution 2005 10 19
Drm Evolution 2005 10 19Drm Evolution 2005 10 19
Drm Evolution 2005 10 19Amit Maitra
 
DRM Interoperability
DRM InteroperabilityDRM Interoperability
DRM InteroperabilityHiram Juarbe
 
Developing a digital copyright strategy
Developing a digital copyright strategyDeveloping a digital copyright strategy
Developing a digital copyright strategyHeather Ford
 
To DRM or not to DRM?
To DRM or not to DRM?To DRM or not to DRM?
To DRM or not to DRM?Carlos Serrao
 
Digital Content Frustration
Digital Content FrustrationDigital Content Frustration
Digital Content FrustrationSarah Houghton
 
Digital Rights Management for Animation & Gaming
Digital Rights Management for Animation & GamingDigital Rights Management for Animation & Gaming
Digital Rights Management for Animation & GamingRamesh Kumar
 
An OWL Copyright Ontology for Semantic Digital Rights Management
An OWL Copyright Ontology for Semantic Digital Rights ManagementAn OWL Copyright Ontology for Semantic Digital Rights Management
An OWL Copyright Ontology for Semantic Digital Rights ManagementRoberto García
 
Drm digital rights managment-june2014-tarek gaber
Drm digital rights managment-june2014-tarek gaberDrm digital rights managment-june2014-tarek gaber
Drm digital rights managment-june2014-tarek gaberTarek Gaber
 
Digital rights management (drm) and you
Digital rights management (drm) and youDigital rights management (drm) and you
Digital rights management (drm) and youSaneMaly
 
De-mystifying DRM
De-mystifying DRMDe-mystifying DRM
De-mystifying DRMcastLabs
 

Andere mochten auch (12)

Weber DRM What Should The Model Be MIT 11 26 07
Weber DRM What Should The Model Be MIT 11 26 07Weber DRM What Should The Model Be MIT 11 26 07
Weber DRM What Should The Model Be MIT 11 26 07
 
Drm Evolution 2005 10 19
Drm Evolution 2005 10 19Drm Evolution 2005 10 19
Drm Evolution 2005 10 19
 
DRM Interoperability
DRM InteroperabilityDRM Interoperability
DRM Interoperability
 
Developing a digital copyright strategy
Developing a digital copyright strategyDeveloping a digital copyright strategy
Developing a digital copyright strategy
 
To DRM or not to DRM?
To DRM or not to DRM?To DRM or not to DRM?
To DRM or not to DRM?
 
Scenario Mapping
Scenario MappingScenario Mapping
Scenario Mapping
 
Digital Content Frustration
Digital Content FrustrationDigital Content Frustration
Digital Content Frustration
 
Digital Rights Management for Animation & Gaming
Digital Rights Management for Animation & GamingDigital Rights Management for Animation & Gaming
Digital Rights Management for Animation & Gaming
 
An OWL Copyright Ontology for Semantic Digital Rights Management
An OWL Copyright Ontology for Semantic Digital Rights ManagementAn OWL Copyright Ontology for Semantic Digital Rights Management
An OWL Copyright Ontology for Semantic Digital Rights Management
 
Drm digital rights managment-june2014-tarek gaber
Drm digital rights managment-june2014-tarek gaberDrm digital rights managment-june2014-tarek gaber
Drm digital rights managment-june2014-tarek gaber
 
Digital rights management (drm) and you
Digital rights management (drm) and youDigital rights management (drm) and you
Digital rights management (drm) and you
 
De-mystifying DRM
De-mystifying DRMDe-mystifying DRM
De-mystifying DRM
 

Ähnlich wie Enterprise Digital Rights Management (Persistent Security)

Information protection and compliance
Information protection and complianceInformation protection and compliance
Information protection and complianceDean Iacovelli
 
Mobile Security: 5 Steps to Mobile Risk Management
Mobile Security: 5 Steps to Mobile Risk ManagementMobile Security: 5 Steps to Mobile Risk Management
Mobile Security: 5 Steps to Mobile Risk ManagementDMIMarketing
 
5 Steps to Mobile Risk Management
5 Steps to Mobile Risk Management5 Steps to Mobile Risk Management
5 Steps to Mobile Risk ManagementDMIMarketing
 
The 2016 Guide to IT Identity Management
The 2016 Guide to IT Identity ManagementThe 2016 Guide to IT Identity Management
The 2016 Guide to IT Identity ManagementJumpCloud
 
ISACA New York Metro, Developing, Deploying and Managing a Risk-Adjusted Data...
ISACA New York Metro, Developing, Deploying and Managing a Risk-Adjusted Data...ISACA New York Metro, Developing, Deploying and Managing a Risk-Adjusted Data...
ISACA New York Metro, Developing, Deploying and Managing a Risk-Adjusted Data...Ulf Mattsson
 
Isaca global journal - choosing the most appropriate data security solution ...
Isaca global journal  - choosing the most appropriate data security solution ...Isaca global journal  - choosing the most appropriate data security solution ...
Isaca global journal - choosing the most appropriate data security solution ...Ulf Mattsson
 
The Need for DLP now - A Clearswift White Paper
The Need for DLP now - A Clearswift White PaperThe Need for DLP now - A Clearswift White Paper
The Need for DLP now - A Clearswift White PaperBen Rothke
 
Microsoft 365 Compliance and Security Overview
Microsoft 365 Compliance and Security OverviewMicrosoft 365 Compliance and Security Overview
Microsoft 365 Compliance and Security OverviewDavid J Rosenthal
 
5 Myths About Data Loss Prevention
5 Myths About Data Loss Prevention5 Myths About Data Loss Prevention
5 Myths About Data Loss PreventionGary Bahadur
 
"Evolving Cybersecurity Strategies" - Threat protection and incident managment
"Evolving Cybersecurity Strategies" - Threat protection and incident managment"Evolving Cybersecurity Strategies" - Threat protection and incident managment
"Evolving Cybersecurity Strategies" - Threat protection and incident managmentDean Iacovelli
 
Big Data Analytics Solutions
Big Data Analytics SolutionsBig Data Analytics Solutions
Big Data Analytics Solutionsharman041
 
Data security strategies and drivers
Data security strategies and driversData security strategies and drivers
Data security strategies and driversFreeform Dynamics
 
Achieving Data Privacy in the Enterprise
Achieving Data Privacy in the EnterpriseAchieving Data Privacy in the Enterprise
Achieving Data Privacy in the EnterpriseSafeNet
 
Identity & Access Management - Securing Your Data in the 21st Century Enterprise
Identity & Access Management - Securing Your Data in the 21st Century EnterpriseIdentity & Access Management - Securing Your Data in the 21st Century Enterprise
Identity & Access Management - Securing Your Data in the 21st Century EnterpriseLance Peterman
 
Data Security.pptx
Data Security.pptxData Security.pptx
Data Security.pptxFujifilmFbsg
 
Microsoft Security - New Capabilities In Microsoft 365 E5 Plans
Microsoft Security - New Capabilities In Microsoft 365 E5 PlansMicrosoft Security - New Capabilities In Microsoft 365 E5 Plans
Microsoft Security - New Capabilities In Microsoft 365 E5 PlansDavid J Rosenthal
 
Protecting your data against cyber attacks in big data environments
Protecting your data against cyber attacks in big data environmentsProtecting your data against cyber attacks in big data environments
Protecting your data against cyber attacks in big data environmentsat MicroFocus Italy ❖✔
 

Ähnlich wie Enterprise Digital Rights Management (Persistent Security) (20)

Information protection and compliance
Information protection and complianceInformation protection and compliance
Information protection and compliance
 
Mobile Security: 5 Steps to Mobile Risk Management
Mobile Security: 5 Steps to Mobile Risk ManagementMobile Security: 5 Steps to Mobile Risk Management
Mobile Security: 5 Steps to Mobile Risk Management
 
5 Steps to Mobile Risk Management
5 Steps to Mobile Risk Management5 Steps to Mobile Risk Management
5 Steps to Mobile Risk Management
 
Microsoft 365 Compliance
Microsoft 365 ComplianceMicrosoft 365 Compliance
Microsoft 365 Compliance
 
The 2016 Guide to IT Identity Management
The 2016 Guide to IT Identity ManagementThe 2016 Guide to IT Identity Management
The 2016 Guide to IT Identity Management
 
ISACA New York Metro, Developing, Deploying and Managing a Risk-Adjusted Data...
ISACA New York Metro, Developing, Deploying and Managing a Risk-Adjusted Data...ISACA New York Metro, Developing, Deploying and Managing a Risk-Adjusted Data...
ISACA New York Metro, Developing, Deploying and Managing a Risk-Adjusted Data...
 
Isaca global journal - choosing the most appropriate data security solution ...
Isaca global journal  - choosing the most appropriate data security solution ...Isaca global journal  - choosing the most appropriate data security solution ...
Isaca global journal - choosing the most appropriate data security solution ...
 
The Need for DLP now - A Clearswift White Paper
The Need for DLP now - A Clearswift White PaperThe Need for DLP now - A Clearswift White Paper
The Need for DLP now - A Clearswift White Paper
 
Microsoft 365 Compliance and Security Overview
Microsoft 365 Compliance and Security OverviewMicrosoft 365 Compliance and Security Overview
Microsoft 365 Compliance and Security Overview
 
5 Myths About Data Loss Prevention
5 Myths About Data Loss Prevention5 Myths About Data Loss Prevention
5 Myths About Data Loss Prevention
 
What every executive needs to know about information technology security
What every executive needs to know about information technology securityWhat every executive needs to know about information technology security
What every executive needs to know about information technology security
 
"Evolving Cybersecurity Strategies" - Threat protection and incident managment
"Evolving Cybersecurity Strategies" - Threat protection and incident managment"Evolving Cybersecurity Strategies" - Threat protection and incident managment
"Evolving Cybersecurity Strategies" - Threat protection and incident managment
 
Big Data Analytics Solutions
Big Data Analytics SolutionsBig Data Analytics Solutions
Big Data Analytics Solutions
 
Data security strategies and drivers
Data security strategies and driversData security strategies and drivers
Data security strategies and drivers
 
Achieving Data Privacy in the Enterprise
Achieving Data Privacy in the EnterpriseAchieving Data Privacy in the Enterprise
Achieving Data Privacy in the Enterprise
 
Data Security.pdf
Data Security.pdfData Security.pdf
Data Security.pdf
 
Identity & Access Management - Securing Your Data in the 21st Century Enterprise
Identity & Access Management - Securing Your Data in the 21st Century EnterpriseIdentity & Access Management - Securing Your Data in the 21st Century Enterprise
Identity & Access Management - Securing Your Data in the 21st Century Enterprise
 
Data Security.pptx
Data Security.pptxData Security.pptx
Data Security.pptx
 
Microsoft Security - New Capabilities In Microsoft 365 E5 Plans
Microsoft Security - New Capabilities In Microsoft 365 E5 PlansMicrosoft Security - New Capabilities In Microsoft 365 E5 Plans
Microsoft Security - New Capabilities In Microsoft 365 E5 Plans
 
Protecting your data against cyber attacks in big data environments
Protecting your data against cyber attacks in big data environmentsProtecting your data against cyber attacks in big data environments
Protecting your data against cyber attacks in big data environments
 

Enterprise Digital Rights Management (Persistent Security)

  • 1. HOW ARE YOUR ORGANISATION’S MOST VALUABLE ASSETS PROTECTED? The Core Question
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17. Complete Data Protection Cycle Usage Access Granularity of Control Protection of data at rest Protection of data in transit Protection of data in use Enterprise DRM Data Loss Prevention Public Key Infrastructure Enterprise Content Mgt. Network Transport Encryption Full Disk Encryption
  • 18. Introducing Fasoo.com Probably The World’s Largest eDRM Solution Provider by number of licensed seats
  • 19.
  • 20.
  • 21.
  • 22.