SlideShare ist ein Scribd-Unternehmen logo
1 von 58
Microsoft
Rights Management Services (RMS)
What’s New?
A presentation by SECUDE
WHAT IS
RMS ?
Rights Management Services (RMS) are
offerings from Microsoft that help keep an
organizations information…
SECURE
Rights Management Services (RMS) are
offerings from Microsoft that help keep an
organizations information
Data-centric protection
Protection is applied directly to the data and documents
Data-centric protection
Protection is applied directly to the data and documents
Data-centric protection
Protection is applied directly to the data and documents
Wherever the data is moved
Data-centric protection
Protection is applied directly to the data and documents
Wherever the data is moved
THE PROTECTION STAYS WITH IT
Documents are protected
Documents are protected
 At a single location
On premise
Documents are protected
 Inside and outside the
organization
 At a single location
Partner
On premise
Shared
Documents are protected
 Inside and outside the
organization
 At a single location
 And when moving amongst various locations
Partner
On premise
Shared
Collaboration
Fine-grained control
Content owners can define who can
Fine-grained control
Content owners can define who can
 Open the document
Fine-grained control
Content owners can define who can
 Open the document
 Edit the contents
Fine-grained control
Content owners can define who can
 Open the document
 Edit the contents
 Print the document
Fine-grained control
Content owners can define who can
 Open the document
 Edit the contents
 Print the document
 Forward to anyone, internal or external
Fine-grained control
Content owners can define who can
 Open the document
 Edit the contents
 Print the document
 Forward to anyone, internal or external
 Take other actions with the information
Fine-grained control
Content owners can define who can
 Open the document
 Edit the contents
 Print the document
 Forward to anyone, internal or external
 Take other actions with the information
Fine-grained control
Content owners can define who can
 Open the document
 Edit the contents
 Print the document
 Forward to anyone, internal or external
 Take other actions with the information
Windows Azure RMS provides
A secure collaboration platform
Windows Azure RMS provides
A secure collaboration platform
For sharing between
organizations
Your Employees
Partner
SO WHAT’S
NEW ?
Not limited to Microsoft Office
RMS protects more than just Microsoft
Office documents
Not limited to Microsoft Office
RMS protects more than just Microsoft
Office documents
It now protects PDF’s, images, and more
Not limited to Windows
Documents can now be accessed on
many devices, not just Windows PC’s
Not limited to Windows
Documents can now be accessed on
many devices, not just Windows PC’s
Tablets
Not limited to Windows
Documents can now be accessed on
many devices, not just Windows PC’s
Android
Tablets
Not limited to Windows
Documents can now be accessed on
many devices, not just Windows PC’s
Android
Tablets
iPhone
Not limited to Windows
Documents can now be accessed on
many devices, not just Windows PC’s
Android
iPad
Tablets
iPhone
Share with Partners
Documents can be safely shared with
other organizations
…not just
within your company
Summary
With the new Rights Management
Services, users can:
 Sign up for RMS for free if you don’t already
have it
 Protect any file type
 Consume protected files on any device
 Share files with anyone
DIG DEEPER
Data is not exposed
Azure RMS never actually sees customer
data
Data is not exposed
Azure RMS never actually sees customer
data
Documents are protected, viewed, and
shared by the user, without ever being
sent to the Azure service
IT Dept. has control
IT departments can:
 keep data on premise and not move anything
to the cloud (their choice)
 be aware of how protected data is being
treated, viewed, and used
 control RMS tenant key on-premise
User Confidence Established
 Users can now be
confident that their
files are protected
 When files are shared
outside of the
organization,
protected documents
will be accessible to
the recipient No more sharing inaccessible
locked documents
Storage Options
Data and information has the flexibility to be
stored
Storage Options
Data and information has the flexibility to be
stored
on-premise
Storage Options
Data and information has the flexibility to be
stored
on-premise in the cloud
Storage Options
Data and information has the flexibility to be
stored
on-premise in the cloud
on any storage location
Storage Options
Data and information has the flexibility to be
stored
on-premise in the cloud
on any storage location
…and remain protected.
RMS & CLOUD READY
ORGANIZATIONS
Simply Enabled
 Within the combined and
integrated environment
of Office 365, RMS is
very simple to enable
 Just click one button and
deep RMS integration
can be enabled with
Exchange, SharePoint,
and the complete Office
2013 suite.
Collaboration
 This is the simplest way to get started with RMS.
 Office 365 users benefit
from generic protection
of any file type through
the RMS applications.
 They also have the
ability to collaborate
with non-Office 365
organizations and
individuals
BREAKDOWN OF FEATURES
Azure RMS
Microsoft Rights Management Services is
hosted in Azure and handles all service
duties.
The Azure RMS service relies on
Windows Azure Active Directory and
associated services (Directory Sync and
Federation).
High Value Tenant Keys
 Azure RMS requires storage for the high
value tenant keys at the core of RMS.
 The key management service (KMS) stores
RMS tenant keys securely
 The KMS also offers the Bring-Your-Own-
Key capability where CISO’s can generate a
key on premise, using tools of their choice, in
compliance with their own policies.
Rights Management Connector
The ‘connector’ pretends to be an AD
RMS server for the on-premise Exchange
and SharePoint workloads.
All requests are then relayed to the Azure-
hosted RMS service.
On Premise Email – within your
company
Most users have an Outlook Exchange
deployment with no form of information
protection.
Adding the Microsoft Rights Management
connector to Exchange deployments will
leave the Exchange fully RMS-capable.
The data never leaves the cloud but can
be protected.
Further Protection
For SAP Users
Protecting information as it
leaves SAP
 Information regularly
leaves ERP
applications like SAP
Protecting information as it
leaves SAP
 Information regularly
leaves ERP
applications like SAP
 Protection protocols
no longer exist on the
data once it leaves
SAP
Protecting information as it
leaves SAP
 Information regularly
leaves ERP
applications like SAP
 Protection protocols
no longer exist on the
data once it leaves
SAP
Microsoft speaks on the importance of protecting
data stored in ERP (Enterprise Resource
Planning) applications
FOR MORE INFORMATION
Read Now Microsoft RMS is now limiting SAP
data leakage with the help of SECUDE
Audit Data Movement
Monitor the activities surrounding the
information
 Track, record and classify data movement
 Identify who accesses it
 From where they access it (IP address &
terminal)
 Where they send it to
 Extract data for analysis
DOWNLOAD FREE AUDIT
NOW
Click HERE
PRESENTATION BY
Tweet us @secude
Contact us info@secude.com

Weitere ähnliche Inhalte

Was ist angesagt?

NIC 2017 Did you like Azure RMS? You will like Azure Information Protection e...
NIC 2017 Did you like Azure RMS? You will like Azure Information Protection e...NIC 2017 Did you like Azure RMS? You will like Azure Information Protection e...
NIC 2017 Did you like Azure RMS? You will like Azure Information Protection e...Morgan Simonsen
 
Microsoft 365 Security and Compliance
Microsoft 365 Security and ComplianceMicrosoft 365 Security and Compliance
Microsoft 365 Security and ComplianceDavid J Rosenthal
 
Get Ahead of Cyber Attacks with Microsoft Enterprise Mobility + Security
Get Ahead of Cyber Attacks with Microsoft Enterprise Mobility + SecurityGet Ahead of Cyber Attacks with Microsoft Enterprise Mobility + Security
Get Ahead of Cyber Attacks with Microsoft Enterprise Mobility + SecurityDavid J Rosenthal
 
Digital Asset Management with ES4
Digital Asset Management with ES4Digital Asset Management with ES4
Digital Asset Management with ES4Activo Consulting
 
SaaS Platform Securing
SaaS Platform SecuringSaaS Platform Securing
SaaS Platform SecuringLeo TechnoSoft
 
Microsoft Cloud App Security CASB
Microsoft Cloud App Security CASBMicrosoft Cloud App Security CASB
Microsoft Cloud App Security CASBAmmar Hasayen
 
EMS Diagram Click Through Web
EMS Diagram Click Through WebEMS Diagram Click Through Web
EMS Diagram Click Through WebEric Inch
 
MMS 2015: What is ems and how to configure it
MMS 2015: What is ems and how to configure itMMS 2015: What is ems and how to configure it
MMS 2015: What is ems and how to configure itPeter Daalmans
 
Secure Productive Enterprise from Microsoft and Atidan
Secure Productive Enterprise from Microsoft and AtidanSecure Productive Enterprise from Microsoft and Atidan
Secure Productive Enterprise from Microsoft and AtidanDavid J Rosenthal
 
DALIM SOFTWARE GmbH Keynote TechLab DAM NY 2017
DALIM SOFTWARE GmbH Keynote TechLab DAM NY 2017DALIM SOFTWARE GmbH Keynote TechLab DAM NY 2017
DALIM SOFTWARE GmbH Keynote TechLab DAM NY 2017Activo Consulting
 
[IGNITE2018] [BRK2495] What’s new in Microsoft Information Protection solutio...
[IGNITE2018] [BRK2495] What’s new in Microsoft Information Protection solutio...[IGNITE2018] [BRK2495] What’s new in Microsoft Information Protection solutio...
[IGNITE2018] [BRK2495] What’s new in Microsoft Information Protection solutio...☁️ Gustavo Magella
 
Intro to Office 365 Security & Compliance Center
Intro to Office 365 Security & Compliance CenterIntro to Office 365 Security & Compliance Center
Intro to Office 365 Security & Compliance CenterCraig Jahnke
 
Implementing zero trust architecture in azure hybrid cloud
Implementing zero trust architecture in azure hybrid cloudImplementing zero trust architecture in azure hybrid cloud
Implementing zero trust architecture in azure hybrid cloudAjit Bhingarkar
 
Empower Enterprise Mobility- Maximize Mobile Control- Presented by Atidan
Empower Enterprise Mobility- Maximize Mobile Control- Presented by AtidanEmpower Enterprise Mobility- Maximize Mobile Control- Presented by Atidan
Empower Enterprise Mobility- Maximize Mobile Control- Presented by AtidanDavid J Rosenthal
 
Protect customer's personal information eng 191018
Protect customer's personal information eng 191018Protect customer's personal information eng 191018
Protect customer's personal information eng 191018sang yoo
 
Office 365 security concerns, EU General Data Protection Regulation (GDPR)
Office 365 security concerns, EU General Data Protection Regulation (GDPR) Office 365 security concerns, EU General Data Protection Regulation (GDPR)
Office 365 security concerns, EU General Data Protection Regulation (GDPR) Sonja Madsen
 
Microsoft Azure Information Protection
Microsoft Azure Information Protection Microsoft Azure Information Protection
Microsoft Azure Information Protection Syed Sabhi Haider
 
Agile IT EMS webinar series, session 1
Agile IT EMS webinar series, session 1Agile IT EMS webinar series, session 1
Agile IT EMS webinar series, session 1AgileIT
 

Was ist angesagt? (20)

NIC 2017 Did you like Azure RMS? You will like Azure Information Protection e...
NIC 2017 Did you like Azure RMS? You will like Azure Information Protection e...NIC 2017 Did you like Azure RMS? You will like Azure Information Protection e...
NIC 2017 Did you like Azure RMS? You will like Azure Information Protection e...
 
Microsoft 365 Security and Compliance
Microsoft 365 Security and ComplianceMicrosoft 365 Security and Compliance
Microsoft 365 Security and Compliance
 
Get Ahead of Cyber Attacks with Microsoft Enterprise Mobility + Security
Get Ahead of Cyber Attacks with Microsoft Enterprise Mobility + SecurityGet Ahead of Cyber Attacks with Microsoft Enterprise Mobility + Security
Get Ahead of Cyber Attacks with Microsoft Enterprise Mobility + Security
 
Digital Asset Management with ES4
Digital Asset Management with ES4Digital Asset Management with ES4
Digital Asset Management with ES4
 
SaaS Platform Securing
SaaS Platform SecuringSaaS Platform Securing
SaaS Platform Securing
 
Microsoft Cloud App Security CASB
Microsoft Cloud App Security CASBMicrosoft Cloud App Security CASB
Microsoft Cloud App Security CASB
 
EMS Diagram Click Through Web
EMS Diagram Click Through WebEMS Diagram Click Through Web
EMS Diagram Click Through Web
 
MMS 2015: What is ems and how to configure it
MMS 2015: What is ems and how to configure itMMS 2015: What is ems and how to configure it
MMS 2015: What is ems and how to configure it
 
Secure Productive Enterprise from Microsoft and Atidan
Secure Productive Enterprise from Microsoft and AtidanSecure Productive Enterprise from Microsoft and Atidan
Secure Productive Enterprise from Microsoft and Atidan
 
DALIM SOFTWARE GmbH Keynote TechLab DAM NY 2017
DALIM SOFTWARE GmbH Keynote TechLab DAM NY 2017DALIM SOFTWARE GmbH Keynote TechLab DAM NY 2017
DALIM SOFTWARE GmbH Keynote TechLab DAM NY 2017
 
IAM Cloud
IAM CloudIAM Cloud
IAM Cloud
 
[IGNITE2018] [BRK2495] What’s new in Microsoft Information Protection solutio...
[IGNITE2018] [BRK2495] What’s new in Microsoft Information Protection solutio...[IGNITE2018] [BRK2495] What’s new in Microsoft Information Protection solutio...
[IGNITE2018] [BRK2495] What’s new in Microsoft Information Protection solutio...
 
Intro to Office 365 Security & Compliance Center
Intro to Office 365 Security & Compliance CenterIntro to Office 365 Security & Compliance Center
Intro to Office 365 Security & Compliance Center
 
Cloud App Security
Cloud App SecurityCloud App Security
Cloud App Security
 
Implementing zero trust architecture in azure hybrid cloud
Implementing zero trust architecture in azure hybrid cloudImplementing zero trust architecture in azure hybrid cloud
Implementing zero trust architecture in azure hybrid cloud
 
Empower Enterprise Mobility- Maximize Mobile Control- Presented by Atidan
Empower Enterprise Mobility- Maximize Mobile Control- Presented by AtidanEmpower Enterprise Mobility- Maximize Mobile Control- Presented by Atidan
Empower Enterprise Mobility- Maximize Mobile Control- Presented by Atidan
 
Protect customer's personal information eng 191018
Protect customer's personal information eng 191018Protect customer's personal information eng 191018
Protect customer's personal information eng 191018
 
Office 365 security concerns, EU General Data Protection Regulation (GDPR)
Office 365 security concerns, EU General Data Protection Regulation (GDPR) Office 365 security concerns, EU General Data Protection Regulation (GDPR)
Office 365 security concerns, EU General Data Protection Regulation (GDPR)
 
Microsoft Azure Information Protection
Microsoft Azure Information Protection Microsoft Azure Information Protection
Microsoft Azure Information Protection
 
Agile IT EMS webinar series, session 1
Agile IT EMS webinar series, session 1Agile IT EMS webinar series, session 1
Agile IT EMS webinar series, session 1
 

Andere mochten auch

What is Microsoft Active Directory RMS (Rights Management Services)?
What is Microsoft Active Directory RMS (Rights Management Services)?What is Microsoft Active Directory RMS (Rights Management Services)?
What is Microsoft Active Directory RMS (Rights Management Services)?irminsider
 
Windows Server 2012 Active Directory Rights Management Services
Windows Server 2012 Active Directory Rights Management ServicesWindows Server 2012 Active Directory Rights Management Services
Windows Server 2012 Active Directory Rights Management ServicesSerhad MAKBULOĞLU, MBA
 
Active directory rights management services
Active directory rights management servicesActive directory rights management services
Active directory rights management serviceslaonap166
 
Active directory
Active directory Active directory
Active directory deshvikas
 
Securing Intellectual Property using Azure Rights Management Services
Securing Intellectual Property using Azure Rights Management ServicesSecuring Intellectual Property using Azure Rights Management Services
Securing Intellectual Property using Azure Rights Management ServicesSPC Adriatics
 
Windows Server 2008 Active Directory
Windows Server 2008 Active DirectoryWindows Server 2008 Active Directory
Windows Server 2008 Active Directoryanilinvns
 

Andere mochten auch (9)

What is Microsoft Active Directory RMS (Rights Management Services)?
What is Microsoft Active Directory RMS (Rights Management Services)?What is Microsoft Active Directory RMS (Rights Management Services)?
What is Microsoft Active Directory RMS (Rights Management Services)?
 
Windows Server 2012 Active Directory Rights Management Services
Windows Server 2012 Active Directory Rights Management ServicesWindows Server 2012 Active Directory Rights Management Services
Windows Server 2012 Active Directory Rights Management Services
 
Active directory rights management services
Active directory rights management servicesActive directory rights management services
Active directory rights management services
 
Active directory
Active directory Active directory
Active directory
 
Information Rights Management (IRM)
Information Rights Management (IRM)Information Rights Management (IRM)
Information Rights Management (IRM)
 
Securing Intellectual Property using Azure Rights Management Services
Securing Intellectual Property using Azure Rights Management ServicesSecuring Intellectual Property using Azure Rights Management Services
Securing Intellectual Property using Azure Rights Management Services
 
Windows Server 2008 Active Directory
Windows Server 2008 Active DirectoryWindows Server 2008 Active Directory
Windows Server 2008 Active Directory
 
Active Directory
Active Directory Active Directory
Active Directory
 
Active Directory Training
Active Directory TrainingActive Directory Training
Active Directory Training
 

Ähnlich wie What's New in Microsoft Rights Management Services

Microsoft_Enterprise_Mobility_plus_Security_datasheet_EN_US
Microsoft_Enterprise_Mobility_plus_Security_datasheet_EN_USMicrosoft_Enterprise_Mobility_plus_Security_datasheet_EN_US
Microsoft_Enterprise_Mobility_plus_Security_datasheet_EN_US☁ ☁ Gautam T ☁☁
 
Securely Harden Microsoft 365 with Secure Score
Securely Harden Microsoft 365 with Secure ScoreSecurely Harden Microsoft 365 with Secure Score
Securely Harden Microsoft 365 with Secure ScoreJoel Oleson
 
Understanding Microsoft Teams Security & Compliance features and plan for Gov...
Understanding Microsoft Teams Security & Compliance features and plan for Gov...Understanding Microsoft Teams Security & Compliance features and plan for Gov...
Understanding Microsoft Teams Security & Compliance features and plan for Gov...Ravikumar Sathyamurthy
 
M365 reinventing digital environment for modern workplace
M365 reinventing digital environment for modern workplaceM365 reinventing digital environment for modern workplace
M365 reinventing digital environment for modern workplaceAhmad Almarzouk
 
Better Together Cx O V1 0
Better Together Cx O V1 0Better Together Cx O V1 0
Better Together Cx O V1 0Elizabeth Caley
 
Better Together Cx O V1 0
Better Together Cx O V1 0Better Together Cx O V1 0
Better Together Cx O V1 0Elizabeth Caley
 
Primend praktiline pilveseminar - Dokumendihalduse ja kommunikatsiooni viimin...
Primend praktiline pilveseminar - Dokumendihalduse ja kommunikatsiooni viimin...Primend praktiline pilveseminar - Dokumendihalduse ja kommunikatsiooni viimin...
Primend praktiline pilveseminar - Dokumendihalduse ja kommunikatsiooni viimin...Primend
 
What is Microsoft Enterprise Mobility Suite and how to deploy it
What is Microsoft Enterprise Mobility Suite and how to deploy itWhat is Microsoft Enterprise Mobility Suite and how to deploy it
What is Microsoft Enterprise Mobility Suite and how to deploy itPeter De Tender
 
05-Empowering-Enterprise-Mobility-FR.pptx
05-Empowering-Enterprise-Mobility-FR.pptx05-Empowering-Enterprise-Mobility-FR.pptx
05-Empowering-Enterprise-Mobility-FR.pptxAshvin Dixit
 
Security and Compliance with SharePoint and Office 365
Security and Compliance with SharePoint and Office 365Security and Compliance with SharePoint and Office 365
Security and Compliance with SharePoint and Office 365Richard Harbridge
 
Teamwork.com Security Overvew
Teamwork.com Security OvervewTeamwork.com Security Overvew
Teamwork.com Security OvervewIvotefan
 
Enterprise Mobility Poster from Microsoft and Atidan
Enterprise Mobility Poster from Microsoft and AtidanEnterprise Mobility Poster from Microsoft and Atidan
Enterprise Mobility Poster from Microsoft and AtidanDavid J Rosenthal
 
Microsoft 365 | Modern workplace
Microsoft 365 | Modern workplaceMicrosoft 365 | Modern workplace
Microsoft 365 | Modern workplaceSiddick Elaheebocus
 
Maintaining Trust & Control of your Data in the Cloud
Maintaining Trust & Control of your Data in the CloudMaintaining Trust & Control of your Data in the Cloud
Maintaining Trust & Control of your Data in the CloudAmazon Web Services
 
Microsoft Enterprise Mobility Suite Poster
Microsoft Enterprise Mobility Suite PosterMicrosoft Enterprise Mobility Suite Poster
Microsoft Enterprise Mobility Suite PosterDavid J Rosenthal
 
10 server security hacks to secure your web servers
10 server security hacks to secure your web servers10 server security hacks to secure your web servers
10 server security hacks to secure your web serversTemok IT Services
 
5 Ways How Microsoft 365 Is Helping Remote Workers
5 Ways How Microsoft 365 Is Helping Remote Workers5 Ways How Microsoft 365 Is Helping Remote Workers
5 Ways How Microsoft 365 Is Helping Remote WorkersAce Cloud Hosting
 
Protecting Your Key Asset – Data Protection Best Practices V2.0 Final
Protecting Your Key Asset – Data Protection Best Practices V2.0   FinalProtecting Your Key Asset – Data Protection Best Practices V2.0   Final
Protecting Your Key Asset – Data Protection Best Practices V2.0 FinalVinod Kumar
 
Securing Sensitive Data in Your Hybrid Cloud
Securing Sensitive Data in Your Hybrid CloudSecuring Sensitive Data in Your Hybrid Cloud
Securing Sensitive Data in Your Hybrid CloudRightScale
 

Ähnlich wie What's New in Microsoft Rights Management Services (20)

Microsoft_Enterprise_Mobility_plus_Security_datasheet_EN_US
Microsoft_Enterprise_Mobility_plus_Security_datasheet_EN_USMicrosoft_Enterprise_Mobility_plus_Security_datasheet_EN_US
Microsoft_Enterprise_Mobility_plus_Security_datasheet_EN_US
 
Securely Harden Microsoft 365 with Secure Score
Securely Harden Microsoft 365 with Secure ScoreSecurely Harden Microsoft 365 with Secure Score
Securely Harden Microsoft 365 with Secure Score
 
Understanding Microsoft Teams Security & Compliance features and plan for Gov...
Understanding Microsoft Teams Security & Compliance features and plan for Gov...Understanding Microsoft Teams Security & Compliance features and plan for Gov...
Understanding Microsoft Teams Security & Compliance features and plan for Gov...
 
M365 reinventing digital environment for modern workplace
M365 reinventing digital environment for modern workplaceM365 reinventing digital environment for modern workplace
M365 reinventing digital environment for modern workplace
 
Better Together Cx O V1 0
Better Together Cx O V1 0Better Together Cx O V1 0
Better Together Cx O V1 0
 
Better Together Cx O V1 0
Better Together Cx O V1 0Better Together Cx O V1 0
Better Together Cx O V1 0
 
Primend praktiline pilveseminar - Dokumendihalduse ja kommunikatsiooni viimin...
Primend praktiline pilveseminar - Dokumendihalduse ja kommunikatsiooni viimin...Primend praktiline pilveseminar - Dokumendihalduse ja kommunikatsiooni viimin...
Primend praktiline pilveseminar - Dokumendihalduse ja kommunikatsiooni viimin...
 
What is Microsoft Enterprise Mobility Suite and how to deploy it
What is Microsoft Enterprise Mobility Suite and how to deploy itWhat is Microsoft Enterprise Mobility Suite and how to deploy it
What is Microsoft Enterprise Mobility Suite and how to deploy it
 
05-Empowering-Enterprise-Mobility-FR.pptx
05-Empowering-Enterprise-Mobility-FR.pptx05-Empowering-Enterprise-Mobility-FR.pptx
05-Empowering-Enterprise-Mobility-FR.pptx
 
Security and Compliance with SharePoint and Office 365
Security and Compliance with SharePoint and Office 365Security and Compliance with SharePoint and Office 365
Security and Compliance with SharePoint and Office 365
 
Teamwork.com Security Overvew
Teamwork.com Security OvervewTeamwork.com Security Overvew
Teamwork.com Security Overvew
 
Enterprise Mobility Poster from Microsoft and Atidan
Enterprise Mobility Poster from Microsoft and AtidanEnterprise Mobility Poster from Microsoft and Atidan
Enterprise Mobility Poster from Microsoft and Atidan
 
Microsoft 365 | Modern workplace
Microsoft 365 | Modern workplaceMicrosoft 365 | Modern workplace
Microsoft 365 | Modern workplace
 
Maintaining Trust & Control of your Data in the Cloud
Maintaining Trust & Control of your Data in the CloudMaintaining Trust & Control of your Data in the Cloud
Maintaining Trust & Control of your Data in the Cloud
 
Microsoft Enterprise Mobility Suite Poster
Microsoft Enterprise Mobility Suite PosterMicrosoft Enterprise Mobility Suite Poster
Microsoft Enterprise Mobility Suite Poster
 
10 server security hacks to secure your web servers
10 server security hacks to secure your web servers10 server security hacks to secure your web servers
10 server security hacks to secure your web servers
 
5 Ways How Microsoft 365 Is Helping Remote Workers
5 Ways How Microsoft 365 Is Helping Remote Workers5 Ways How Microsoft 365 Is Helping Remote Workers
5 Ways How Microsoft 365 Is Helping Remote Workers
 
Modern Workplace with Microsoft 365
Modern Workplace with Microsoft 365Modern Workplace with Microsoft 365
Modern Workplace with Microsoft 365
 
Protecting Your Key Asset – Data Protection Best Practices V2.0 Final
Protecting Your Key Asset – Data Protection Best Practices V2.0   FinalProtecting Your Key Asset – Data Protection Best Practices V2.0   Final
Protecting Your Key Asset – Data Protection Best Practices V2.0 Final
 
Securing Sensitive Data in Your Hybrid Cloud
Securing Sensitive Data in Your Hybrid CloudSecuring Sensitive Data in Your Hybrid Cloud
Securing Sensitive Data in Your Hybrid Cloud
 

Mehr von UL Transaction Security

Webinar: Data Classification - Closing the Gap between Enterprise and SAP Data
Webinar: Data Classification - Closing the Gap between Enterprise and SAP DataWebinar: Data Classification - Closing the Gap between Enterprise and SAP Data
Webinar: Data Classification - Closing the Gap between Enterprise and SAP DataUL Transaction Security
 
Webinar: Eliminating Negative Impact on User Experience from Security Solutions
Webinar: Eliminating Negative Impact on User Experience from Security SolutionsWebinar: Eliminating Negative Impact on User Experience from Security Solutions
Webinar: Eliminating Negative Impact on User Experience from Security SolutionsUL Transaction Security
 
Solving Security, Collaboration, and Mobility Challenges in SAP With Microsof...
Solving Security, Collaboration, and Mobility Challenges in SAP With Microsof...Solving Security, Collaboration, and Mobility Challenges in SAP With Microsof...
Solving Security, Collaboration, and Mobility Challenges in SAP With Microsof...UL Transaction Security
 
BYOD Webinar for SAP: Securing Data in a Mobile World
BYOD Webinar for SAP: Securing Data in a Mobile WorldBYOD Webinar for SAP: Securing Data in a Mobile World
BYOD Webinar for SAP: Securing Data in a Mobile WorldUL Transaction Security
 
HR Security in SAP: Securing Data Beyond HCM Authorizations
HR Security in SAP: Securing Data Beyond HCM AuthorizationsHR Security in SAP: Securing Data Beyond HCM Authorizations
HR Security in SAP: Securing Data Beyond HCM AuthorizationsUL Transaction Security
 
Mobility & BYOD: Leveraging Best Practices and Latest Technologies for Compre...
Mobility & BYOD: Leveraging Best Practices and Latest Technologies for Compre...Mobility & BYOD: Leveraging Best Practices and Latest Technologies for Compre...
Mobility & BYOD: Leveraging Best Practices and Latest Technologies for Compre...UL Transaction Security
 
WEBINAR - A New Era in HR Security for SAP
WEBINAR - A New Era in HR Security for SAPWEBINAR - A New Era in HR Security for SAP
WEBINAR - A New Era in HR Security for SAPUL Transaction Security
 

Mehr von UL Transaction Security (9)

Webinar: Data Classification - Closing the Gap between Enterprise and SAP Data
Webinar: Data Classification - Closing the Gap between Enterprise and SAP DataWebinar: Data Classification - Closing the Gap between Enterprise and SAP Data
Webinar: Data Classification - Closing the Gap between Enterprise and SAP Data
 
Webinar: Eliminating Negative Impact on User Experience from Security Solutions
Webinar: Eliminating Negative Impact on User Experience from Security SolutionsWebinar: Eliminating Negative Impact on User Experience from Security Solutions
Webinar: Eliminating Negative Impact on User Experience from Security Solutions
 
BREACHED: Data Centric Security for SAP
BREACHED: Data Centric Security for SAPBREACHED: Data Centric Security for SAP
BREACHED: Data Centric Security for SAP
 
Perimeter Security is Failing
Perimeter Security is FailingPerimeter Security is Failing
Perimeter Security is Failing
 
Solving Security, Collaboration, and Mobility Challenges in SAP With Microsof...
Solving Security, Collaboration, and Mobility Challenges in SAP With Microsof...Solving Security, Collaboration, and Mobility Challenges in SAP With Microsof...
Solving Security, Collaboration, and Mobility Challenges in SAP With Microsof...
 
BYOD Webinar for SAP: Securing Data in a Mobile World
BYOD Webinar for SAP: Securing Data in a Mobile WorldBYOD Webinar for SAP: Securing Data in a Mobile World
BYOD Webinar for SAP: Securing Data in a Mobile World
 
HR Security in SAP: Securing Data Beyond HCM Authorizations
HR Security in SAP: Securing Data Beyond HCM AuthorizationsHR Security in SAP: Securing Data Beyond HCM Authorizations
HR Security in SAP: Securing Data Beyond HCM Authorizations
 
Mobility & BYOD: Leveraging Best Practices and Latest Technologies for Compre...
Mobility & BYOD: Leveraging Best Practices and Latest Technologies for Compre...Mobility & BYOD: Leveraging Best Practices and Latest Technologies for Compre...
Mobility & BYOD: Leveraging Best Practices and Latest Technologies for Compre...
 
WEBINAR - A New Era in HR Security for SAP
WEBINAR - A New Era in HR Security for SAPWEBINAR - A New Era in HR Security for SAP
WEBINAR - A New Era in HR Security for SAP
 

Kürzlich hochgeladen

Simplifying Microservices & Apps - The art of effortless development - Meetup...
Simplifying Microservices & Apps - The art of effortless development - Meetup...Simplifying Microservices & Apps - The art of effortless development - Meetup...
Simplifying Microservices & Apps - The art of effortless development - Meetup...Rob Geurden
 
Powering Real-Time Decisions with Continuous Data Streams
Powering Real-Time Decisions with Continuous Data StreamsPowering Real-Time Decisions with Continuous Data Streams
Powering Real-Time Decisions with Continuous Data StreamsSafe Software
 
Revolutionizing the Digital Transformation Office - Leveraging OnePlan’s AI a...
Revolutionizing the Digital Transformation Office - Leveraging OnePlan’s AI a...Revolutionizing the Digital Transformation Office - Leveraging OnePlan’s AI a...
Revolutionizing the Digital Transformation Office - Leveraging OnePlan’s AI a...OnePlan Solutions
 
Not a Kubernetes fan? The state of PaaS in 2024
Not a Kubernetes fan? The state of PaaS in 2024Not a Kubernetes fan? The state of PaaS in 2024
Not a Kubernetes fan? The state of PaaS in 2024Anthony Dahanne
 
OpenChain AI Study Group - Europe and Asia Recap - 2024-04-11 - Full Recording
OpenChain AI Study Group - Europe and Asia Recap - 2024-04-11 - Full RecordingOpenChain AI Study Group - Europe and Asia Recap - 2024-04-11 - Full Recording
OpenChain AI Study Group - Europe and Asia Recap - 2024-04-11 - Full RecordingShane Coughlan
 
Machine Learning Software Engineering Patterns and Their Engineering
Machine Learning Software Engineering Patterns and Their EngineeringMachine Learning Software Engineering Patterns and Their Engineering
Machine Learning Software Engineering Patterns and Their EngineeringHironori Washizaki
 
Understanding Flamingo - DeepMind's VLM Architecture
Understanding Flamingo - DeepMind's VLM ArchitectureUnderstanding Flamingo - DeepMind's VLM Architecture
Understanding Flamingo - DeepMind's VLM Architecturerahul_net
 
Patterns for automating API delivery. API conference
Patterns for automating API delivery. API conferencePatterns for automating API delivery. API conference
Patterns for automating API delivery. API conferencessuser9e7c64
 
Ronisha Informatics Private Limited Catalogue
Ronisha Informatics Private Limited CatalogueRonisha Informatics Private Limited Catalogue
Ronisha Informatics Private Limited Catalogueitservices996
 
Effectively Troubleshoot 9 Types of OutOfMemoryError
Effectively Troubleshoot 9 Types of OutOfMemoryErrorEffectively Troubleshoot 9 Types of OutOfMemoryError
Effectively Troubleshoot 9 Types of OutOfMemoryErrorTier1 app
 
Odoo 14 - eLearning Module In Odoo 14 Enterprise
Odoo 14 - eLearning Module In Odoo 14 EnterpriseOdoo 14 - eLearning Module In Odoo 14 Enterprise
Odoo 14 - eLearning Module In Odoo 14 Enterprisepreethippts
 
Exploring Selenium_Appium Frameworks for Seamless Integration with HeadSpin.pdf
Exploring Selenium_Appium Frameworks for Seamless Integration with HeadSpin.pdfExploring Selenium_Appium Frameworks for Seamless Integration with HeadSpin.pdf
Exploring Selenium_Appium Frameworks for Seamless Integration with HeadSpin.pdfkalichargn70th171
 
OpenChain Education Work Group Monthly Meeting - 2024-04-10 - Full Recording
OpenChain Education Work Group Monthly Meeting - 2024-04-10 - Full RecordingOpenChain Education Work Group Monthly Meeting - 2024-04-10 - Full Recording
OpenChain Education Work Group Monthly Meeting - 2024-04-10 - Full RecordingShane Coughlan
 
SensoDat: Simulation-based Sensor Dataset of Self-driving Cars
SensoDat: Simulation-based Sensor Dataset of Self-driving CarsSensoDat: Simulation-based Sensor Dataset of Self-driving Cars
SensoDat: Simulation-based Sensor Dataset of Self-driving CarsChristian Birchler
 
Introduction to Firebase Workshop Slides
Introduction to Firebase Workshop SlidesIntroduction to Firebase Workshop Slides
Introduction to Firebase Workshop Slidesvaideheekore1
 
Comparing Linux OS Image Update Models - EOSS 2024.pdf
Comparing Linux OS Image Update Models - EOSS 2024.pdfComparing Linux OS Image Update Models - EOSS 2024.pdf
Comparing Linux OS Image Update Models - EOSS 2024.pdfDrew Moseley
 
Enhancing Supply Chain Visibility with Cargo Cloud Solutions.pdf
Enhancing Supply Chain Visibility with Cargo Cloud Solutions.pdfEnhancing Supply Chain Visibility with Cargo Cloud Solutions.pdf
Enhancing Supply Chain Visibility with Cargo Cloud Solutions.pdfRTS corp
 
Leveraging AI for Mobile App Testing on Real Devices | Applitools + Kobiton
Leveraging AI for Mobile App Testing on Real Devices | Applitools + KobitonLeveraging AI for Mobile App Testing on Real Devices | Applitools + Kobiton
Leveraging AI for Mobile App Testing on Real Devices | Applitools + KobitonApplitools
 
Amazon Bedrock in Action - presentation of the Bedrock's capabilities
Amazon Bedrock in Action - presentation of the Bedrock's capabilitiesAmazon Bedrock in Action - presentation of the Bedrock's capabilities
Amazon Bedrock in Action - presentation of the Bedrock's capabilitiesKrzysztofKkol1
 
Post Quantum Cryptography – The Impact on Identity
Post Quantum Cryptography – The Impact on IdentityPost Quantum Cryptography – The Impact on Identity
Post Quantum Cryptography – The Impact on Identityteam-WIBU
 

Kürzlich hochgeladen (20)

Simplifying Microservices & Apps - The art of effortless development - Meetup...
Simplifying Microservices & Apps - The art of effortless development - Meetup...Simplifying Microservices & Apps - The art of effortless development - Meetup...
Simplifying Microservices & Apps - The art of effortless development - Meetup...
 
Powering Real-Time Decisions with Continuous Data Streams
Powering Real-Time Decisions with Continuous Data StreamsPowering Real-Time Decisions with Continuous Data Streams
Powering Real-Time Decisions with Continuous Data Streams
 
Revolutionizing the Digital Transformation Office - Leveraging OnePlan’s AI a...
Revolutionizing the Digital Transformation Office - Leveraging OnePlan’s AI a...Revolutionizing the Digital Transformation Office - Leveraging OnePlan’s AI a...
Revolutionizing the Digital Transformation Office - Leveraging OnePlan’s AI a...
 
Not a Kubernetes fan? The state of PaaS in 2024
Not a Kubernetes fan? The state of PaaS in 2024Not a Kubernetes fan? The state of PaaS in 2024
Not a Kubernetes fan? The state of PaaS in 2024
 
OpenChain AI Study Group - Europe and Asia Recap - 2024-04-11 - Full Recording
OpenChain AI Study Group - Europe and Asia Recap - 2024-04-11 - Full RecordingOpenChain AI Study Group - Europe and Asia Recap - 2024-04-11 - Full Recording
OpenChain AI Study Group - Europe and Asia Recap - 2024-04-11 - Full Recording
 
Machine Learning Software Engineering Patterns and Their Engineering
Machine Learning Software Engineering Patterns and Their EngineeringMachine Learning Software Engineering Patterns and Their Engineering
Machine Learning Software Engineering Patterns and Their Engineering
 
Understanding Flamingo - DeepMind's VLM Architecture
Understanding Flamingo - DeepMind's VLM ArchitectureUnderstanding Flamingo - DeepMind's VLM Architecture
Understanding Flamingo - DeepMind's VLM Architecture
 
Patterns for automating API delivery. API conference
Patterns for automating API delivery. API conferencePatterns for automating API delivery. API conference
Patterns for automating API delivery. API conference
 
Ronisha Informatics Private Limited Catalogue
Ronisha Informatics Private Limited CatalogueRonisha Informatics Private Limited Catalogue
Ronisha Informatics Private Limited Catalogue
 
Effectively Troubleshoot 9 Types of OutOfMemoryError
Effectively Troubleshoot 9 Types of OutOfMemoryErrorEffectively Troubleshoot 9 Types of OutOfMemoryError
Effectively Troubleshoot 9 Types of OutOfMemoryError
 
Odoo 14 - eLearning Module In Odoo 14 Enterprise
Odoo 14 - eLearning Module In Odoo 14 EnterpriseOdoo 14 - eLearning Module In Odoo 14 Enterprise
Odoo 14 - eLearning Module In Odoo 14 Enterprise
 
Exploring Selenium_Appium Frameworks for Seamless Integration with HeadSpin.pdf
Exploring Selenium_Appium Frameworks for Seamless Integration with HeadSpin.pdfExploring Selenium_Appium Frameworks for Seamless Integration with HeadSpin.pdf
Exploring Selenium_Appium Frameworks for Seamless Integration with HeadSpin.pdf
 
OpenChain Education Work Group Monthly Meeting - 2024-04-10 - Full Recording
OpenChain Education Work Group Monthly Meeting - 2024-04-10 - Full RecordingOpenChain Education Work Group Monthly Meeting - 2024-04-10 - Full Recording
OpenChain Education Work Group Monthly Meeting - 2024-04-10 - Full Recording
 
SensoDat: Simulation-based Sensor Dataset of Self-driving Cars
SensoDat: Simulation-based Sensor Dataset of Self-driving CarsSensoDat: Simulation-based Sensor Dataset of Self-driving Cars
SensoDat: Simulation-based Sensor Dataset of Self-driving Cars
 
Introduction to Firebase Workshop Slides
Introduction to Firebase Workshop SlidesIntroduction to Firebase Workshop Slides
Introduction to Firebase Workshop Slides
 
Comparing Linux OS Image Update Models - EOSS 2024.pdf
Comparing Linux OS Image Update Models - EOSS 2024.pdfComparing Linux OS Image Update Models - EOSS 2024.pdf
Comparing Linux OS Image Update Models - EOSS 2024.pdf
 
Enhancing Supply Chain Visibility with Cargo Cloud Solutions.pdf
Enhancing Supply Chain Visibility with Cargo Cloud Solutions.pdfEnhancing Supply Chain Visibility with Cargo Cloud Solutions.pdf
Enhancing Supply Chain Visibility with Cargo Cloud Solutions.pdf
 
Leveraging AI for Mobile App Testing on Real Devices | Applitools + Kobiton
Leveraging AI for Mobile App Testing on Real Devices | Applitools + KobitonLeveraging AI for Mobile App Testing on Real Devices | Applitools + Kobiton
Leveraging AI for Mobile App Testing on Real Devices | Applitools + Kobiton
 
Amazon Bedrock in Action - presentation of the Bedrock's capabilities
Amazon Bedrock in Action - presentation of the Bedrock's capabilitiesAmazon Bedrock in Action - presentation of the Bedrock's capabilities
Amazon Bedrock in Action - presentation of the Bedrock's capabilities
 
Post Quantum Cryptography – The Impact on Identity
Post Quantum Cryptography – The Impact on IdentityPost Quantum Cryptography – The Impact on Identity
Post Quantum Cryptography – The Impact on Identity
 

What's New in Microsoft Rights Management Services

  • 1. Microsoft Rights Management Services (RMS) What’s New? A presentation by SECUDE
  • 3. Rights Management Services (RMS) are offerings from Microsoft that help keep an organizations information…
  • 4. SECURE Rights Management Services (RMS) are offerings from Microsoft that help keep an organizations information
  • 5. Data-centric protection Protection is applied directly to the data and documents
  • 6. Data-centric protection Protection is applied directly to the data and documents
  • 7. Data-centric protection Protection is applied directly to the data and documents Wherever the data is moved
  • 8. Data-centric protection Protection is applied directly to the data and documents Wherever the data is moved THE PROTECTION STAYS WITH IT
  • 10. Documents are protected  At a single location On premise
  • 11. Documents are protected  Inside and outside the organization  At a single location Partner On premise Shared
  • 12. Documents are protected  Inside and outside the organization  At a single location  And when moving amongst various locations Partner On premise Shared Collaboration
  • 14. Fine-grained control Content owners can define who can  Open the document
  • 15. Fine-grained control Content owners can define who can  Open the document  Edit the contents
  • 16. Fine-grained control Content owners can define who can  Open the document  Edit the contents  Print the document
  • 17. Fine-grained control Content owners can define who can  Open the document  Edit the contents  Print the document  Forward to anyone, internal or external
  • 18. Fine-grained control Content owners can define who can  Open the document  Edit the contents  Print the document  Forward to anyone, internal or external  Take other actions with the information
  • 19. Fine-grained control Content owners can define who can  Open the document  Edit the contents  Print the document  Forward to anyone, internal or external  Take other actions with the information
  • 20. Fine-grained control Content owners can define who can  Open the document  Edit the contents  Print the document  Forward to anyone, internal or external  Take other actions with the information
  • 21. Windows Azure RMS provides A secure collaboration platform
  • 22. Windows Azure RMS provides A secure collaboration platform For sharing between organizations Your Employees Partner
  • 24. Not limited to Microsoft Office RMS protects more than just Microsoft Office documents
  • 25. Not limited to Microsoft Office RMS protects more than just Microsoft Office documents It now protects PDF’s, images, and more
  • 26. Not limited to Windows Documents can now be accessed on many devices, not just Windows PC’s
  • 27. Not limited to Windows Documents can now be accessed on many devices, not just Windows PC’s Tablets
  • 28. Not limited to Windows Documents can now be accessed on many devices, not just Windows PC’s Android Tablets
  • 29. Not limited to Windows Documents can now be accessed on many devices, not just Windows PC’s Android Tablets iPhone
  • 30. Not limited to Windows Documents can now be accessed on many devices, not just Windows PC’s Android iPad Tablets iPhone
  • 31. Share with Partners Documents can be safely shared with other organizations …not just within your company
  • 32. Summary With the new Rights Management Services, users can:  Sign up for RMS for free if you don’t already have it  Protect any file type  Consume protected files on any device  Share files with anyone
  • 34. Data is not exposed Azure RMS never actually sees customer data
  • 35. Data is not exposed Azure RMS never actually sees customer data Documents are protected, viewed, and shared by the user, without ever being sent to the Azure service
  • 36. IT Dept. has control IT departments can:  keep data on premise and not move anything to the cloud (their choice)  be aware of how protected data is being treated, viewed, and used  control RMS tenant key on-premise
  • 37. User Confidence Established  Users can now be confident that their files are protected  When files are shared outside of the organization, protected documents will be accessible to the recipient No more sharing inaccessible locked documents
  • 38. Storage Options Data and information has the flexibility to be stored
  • 39. Storage Options Data and information has the flexibility to be stored on-premise
  • 40. Storage Options Data and information has the flexibility to be stored on-premise in the cloud
  • 41. Storage Options Data and information has the flexibility to be stored on-premise in the cloud on any storage location
  • 42. Storage Options Data and information has the flexibility to be stored on-premise in the cloud on any storage location …and remain protected.
  • 43. RMS & CLOUD READY ORGANIZATIONS
  • 44. Simply Enabled  Within the combined and integrated environment of Office 365, RMS is very simple to enable  Just click one button and deep RMS integration can be enabled with Exchange, SharePoint, and the complete Office 2013 suite.
  • 45. Collaboration  This is the simplest way to get started with RMS.  Office 365 users benefit from generic protection of any file type through the RMS applications.  They also have the ability to collaborate with non-Office 365 organizations and individuals
  • 47. Azure RMS Microsoft Rights Management Services is hosted in Azure and handles all service duties. The Azure RMS service relies on Windows Azure Active Directory and associated services (Directory Sync and Federation).
  • 48. High Value Tenant Keys  Azure RMS requires storage for the high value tenant keys at the core of RMS.  The key management service (KMS) stores RMS tenant keys securely  The KMS also offers the Bring-Your-Own- Key capability where CISO’s can generate a key on premise, using tools of their choice, in compliance with their own policies.
  • 49. Rights Management Connector The ‘connector’ pretends to be an AD RMS server for the on-premise Exchange and SharePoint workloads. All requests are then relayed to the Azure- hosted RMS service.
  • 50. On Premise Email – within your company Most users have an Outlook Exchange deployment with no form of information protection. Adding the Microsoft Rights Management connector to Exchange deployments will leave the Exchange fully RMS-capable. The data never leaves the cloud but can be protected.
  • 52. Protecting information as it leaves SAP  Information regularly leaves ERP applications like SAP
  • 53. Protecting information as it leaves SAP  Information regularly leaves ERP applications like SAP  Protection protocols no longer exist on the data once it leaves SAP
  • 54. Protecting information as it leaves SAP  Information regularly leaves ERP applications like SAP  Protection protocols no longer exist on the data once it leaves SAP Microsoft speaks on the importance of protecting data stored in ERP (Enterprise Resource Planning) applications
  • 55. FOR MORE INFORMATION Read Now Microsoft RMS is now limiting SAP data leakage with the help of SECUDE
  • 56. Audit Data Movement Monitor the activities surrounding the information  Track, record and classify data movement  Identify who accesses it  From where they access it (IP address & terminal)  Where they send it to  Extract data for analysis
  • 58. PRESENTATION BY Tweet us @secude Contact us info@secude.com