SlideShare ist ein Scribd-Unternehmen logo
1 von 21
www.watchfulsoftware.com
Secure Information Sharing: The External User Dilemma
Martin Kuppinger, KuppingerCole
Rui Melo Biscaia, Watchful Software
Webinar,
Wednesday, 16th of December 2015
www.watchfulsoftware.com
1) INTRODUCTION
2) INFORMATION CLASSIFICATION AND SECURE
INFORMATION SHARING BECOMING THE STANDARD, NOT
BEING THE EXCEPTION ANYMORE
3) POLICY DRIVEN INFORMATION SHARING WITH
RIGHTSWATCH
4) Q&A
Agenda
2/26/2016 © Copyright www.watchfulsoftware.com. 2015 All Rights Reserved. 2
www.watchfulsoftware.com
Introductions
Martin Kuppinger
CEO, Founder & Principal Analyst
KuppingerCole
mk@kuppingercole.com
Rui Melo Biscaia
Director of product Management
Watchful Software
rui.biscaia@watchfulsoftware.com
 You are muted centrally. You don’t need to
mute/unmute yourself
 This webinar is being recorded. The recording will
be available tomorrow at
www.watchfulsoftware.com
 The Q&A session will be at the end
 You are welcomed to enter questions anytime,
using the Chat feature in the GoToWebinar
Control Panel
2/26/2016 © Copyright www.watchfulsoftware.com. 2015 All Rights Reserved. 3
www.watchfulsoftware.com
1) INTRODUCTION
2) INFORMATION CLASSIFICATION AND SECURE
INFORMATION SHARING BECOMING THE STANDARD, NOT
BEING THE EXCEPTION ANYMORE
3) POLICY DRIVEN INFORMATION SHARING WITH
RIGHTSWATCH
4) Q&A
Agenda
2/26/2016 © Copyright www.watchfulsoftware.com. 2015 All Rights Reserved. 4
Secure Information Sharing: The External User Dilemma
Information Classification and Secure Information Sharing becoming the
standard, not being the exception anymore
www.kuppingercole.com
Martin Kuppinger
CEO, Founder & Principal Analyst
KuppingerCole
mk@kuppingercole.com
Brand
reputation
Customer
data
Intellectual
properties
People
An organization‘s crown jewels
6
Everything and everyone become connected
7
Corporate Network 10 years ago
8
Workstations and servers
Employees
Internet
Mobile worker Hacker
Gateway
Security perimeter
Corporate Network now
9
Cloud
Hackers
Data center
HQ
Office 1
Office 2
Mobile users Social networks
Supplier
Surveillance &
espionage
Paradigm Shift in Information Security
10
From
perimeter
security
There is no network perimeter anymore
Perimeter defense security tools leave too many gaps for APTs
These tools cannot protect from phishing, malicious insiders, etc.
Towards
defense of
internal
resources
Assume that the hack has already happened
Try to detect it as quickly as possible before more harm is done
Knowing as much as possible about our assets is the key
In use
In
motion
At rest
The what, where and when of Information Protection
11
• Structured data
• Unstructured data = documents
WHENWHAT
WHERE
• 100% secure key management
• Cloud vs. on-premise
• Classification schemes
• Policy explosion
• Details (Breadth of support,
implementation, administration)
• Combination of infrastructure building
blocks – core product and add-ons
• Alternative lightweight solutions
Rights Management challenges yesterday and today
12
• Application & Document format
support
• Platform support (OS, Device)
• External user support
• (Automated) classification
• Deployment
• Vendor focus & choice
Yesterday Today
C-level is aware of
need for Secure
Information Sharing
and Information
Protection
Even many IT
people are still not
aware of the
solutions,
particularly not the
maturity of Rights
Management
The awareness challenge
13
• Multiple vendors, many partnersAvailable
• Major problems are solvedMature
• There is no other way to really protect
your crown jewelsNo alternatives
Secure Information Sharing: Available. Mature. No alternatives.
14
www.watchfulsoftware.com
1) INTRODUCTION
2) INFORMATION CLASSIFICATION AND SECURE
INFORMATION SHARING BECOMING THE STANDARD, NOT
BEING THE EXCEPTION ANYMORE
3) POLICY DRIVEN INFORMATION SHARING WITH
RIGHTSWATCH
4) Q&A
Agenda
2/26/2016 © Copyright www.watchfulsoftware.com. 2015 All Rights Reserved. 15
www.watchfulsoftware.com
Secure Information Sharing - CISO’s questions:
2/26/2016 © Copyright www.watchfulsoftware.com. 2015 All Rights Reserved. 16
Secure
Information
Sharing
1. Can I enforce corporate policies?
2. Can I allow it via any media and not just e-mail?
3. Can I have a zero extra click environment to achieve it?
4. Can I not need to onboard “externals” into my systems?
5. Can I not require “externals” to own a license nor software?
6. Can I then know who, did what, when and how?
www.watchfulsoftware.com
Secure Information Sharing is …
2/26/2016 © Copyright www.watchfulsoftware.com. 2015 All Rights Reserved. 17
GOVERNANCE
PROTECTION
LOSS
PREVENTION
CLASSIFICATION
www.watchfulsoftware.com
Secure Information Sharing is RightsWATCH
2/26/2016 © Copyright www.watchfulsoftware.com. 2015 All Rights Reserved. 18
GOVERNANCE
PROTECTION
LOSS
PREVENTION
CLASSIFICATION
to enhance compliance
to uphold policies
to decrease liability
to apply policies
www.watchfulsoftware.com
RightsWATCH is Secure Information Sharing because:
2/26/2016 © Copyright www.watchfulsoftware.com. 2015 All Rights Reserved. 19
1. It can enforce corporate policies and not rely on users to know,
understand, reason with or be willing to apply policies to data
2. It allows data to be shared via any media and still uphold corporate
policies
3. It does not impact on users workflows, as it does not demand users to
click on any extra buttons, pop-ups, or combo boxes
4. It does not require enterprises to onboard, nor manage “external users”
identities
5. It does not require “external users” to have to buy or install any
RightsWATCH proprietary software
6. It delivers a comprehensive audit trail that enables leveraging SIEM tools
to do data analytics
www.watchfulsoftware.com
1) INTRODUCTION
2) INFORMATION CLASSIFICATION AND SECURE
INFORMATION SHARING BECOMING THE STANDARD, NOT
BEING THE EXCEPTION ANYMORE
3) POLICY DRIVEN INFORMATION SHARING WITH
RIGHTSWATCH
4) Q&A
Agenda
2/26/2016 © Copyright www.watchfulsoftware.com. 2015 All Rights Reserved. 20
Secure Information Sharing: The External User Dilemma
Martin Kuppinger, KuppingerCole
Rui Melo Biscaia, Watchful Software
Webinar,
Wednesday, 16th of December 2015

Weitere ähnliche Inhalte

Was ist angesagt?

Was ist angesagt? (10)

How much should you reveal on social media
How much should you reveal on social mediaHow much should you reveal on social media
How much should you reveal on social media
 
Turtles, Trust and The Future of Cybersecurity
Turtles, Trust and The Future of Cybersecurity Turtles, Trust and The Future of Cybersecurity
Turtles, Trust and The Future of Cybersecurity
 
M365 Gurgaon 2020 - How to manage sensitive and personal data in M365
M365 Gurgaon 2020 - How to manage sensitive and personal data in M365M365 Gurgaon 2020 - How to manage sensitive and personal data in M365
M365 Gurgaon 2020 - How to manage sensitive and personal data in M365
 
Why are Software Updates so Important for your Security
Why are Software Updates so Important for your SecurityWhy are Software Updates so Important for your Security
Why are Software Updates so Important for your Security
 
The 9 of SaaS: Widely-used legal clauses for Privacy Policy
The 9 of SaaS: Widely-used legal clauses for Privacy PolicyThe 9 of SaaS: Widely-used legal clauses for Privacy Policy
The 9 of SaaS: Widely-used legal clauses for Privacy Policy
 
Understanding Global Data Protection Laws: Webinar
Understanding Global Data Protection Laws: WebinarUnderstanding Global Data Protection Laws: Webinar
Understanding Global Data Protection Laws: Webinar
 
Securiser son digital workplace avec Microsoft Threat Protection
Securiser son digital workplace avec Microsoft Threat ProtectionSecuriser son digital workplace avec Microsoft Threat Protection
Securiser son digital workplace avec Microsoft Threat Protection
 
5 Security Questions To Ask When Deploying O365
5 Security Questions To Ask When Deploying O3655 Security Questions To Ask When Deploying O365
5 Security Questions To Ask When Deploying O365
 
5 Common Myths that Stop People from Using an Antivirus
5 Common Myths that Stop People from Using an Antivirus5 Common Myths that Stop People from Using an Antivirus
5 Common Myths that Stop People from Using an Antivirus
 
Seguridad: Realidad o Ficción: Control y Seguridad en sus Aplicaciones F5
Seguridad: Realidad o Ficción: Control y Seguridad en sus Aplicaciones F5Seguridad: Realidad o Ficción: Control y Seguridad en sus Aplicaciones F5
Seguridad: Realidad o Ficción: Control y Seguridad en sus Aplicaciones F5
 

Andere mochten auch

Architecture of-dbms-and-data-independence
Architecture of-dbms-and-data-independenceArchitecture of-dbms-and-data-independence
Architecture of-dbms-and-data-independence
Anuj Modi
 

Andere mochten auch (6)

Methods and results of the GEMS user survey - External evaluation.
Methods and results of the GEMS user survey - External evaluation.Methods and results of the GEMS user survey - External evaluation.
Methods and results of the GEMS user survey - External evaluation.
 
CA External WAAE Roadmap - UK User Group - CA Workload Automation Technology ...
CA External WAAE Roadmap - UK User Group - CA Workload Automation Technology ...CA External WAAE Roadmap - UK User Group - CA Workload Automation Technology ...
CA External WAAE Roadmap - UK User Group - CA Workload Automation Technology ...
 
SharePoint Online - What is an external user
SharePoint Online - What is an external userSharePoint Online - What is an external user
SharePoint Online - What is an external user
 
How to deploy SharePoint 2010 to external users?
How to deploy SharePoint 2010 to external users?How to deploy SharePoint 2010 to external users?
How to deploy SharePoint 2010 to external users?
 
Architecture of-dbms-and-data-independence
Architecture of-dbms-and-data-independenceArchitecture of-dbms-and-data-independence
Architecture of-dbms-and-data-independence
 
OneDrive For Business - What's new for IT Administrators and End-users
OneDrive For Business - What's new for IT Administrators and End-usersOneDrive For Business - What's new for IT Administrators and End-users
OneDrive For Business - What's new for IT Administrators and End-users
 

Ähnlich wie Secure information sharing - the external user dilemma

Unlocking AI Potential: Leveraging PIA Processes for Comprehensive Impact Ass...
Unlocking AI Potential: Leveraging PIA Processes for Comprehensive Impact Ass...Unlocking AI Potential: Leveraging PIA Processes for Comprehensive Impact Ass...
Unlocking AI Potential: Leveraging PIA Processes for Comprehensive Impact Ass...
TrustArc
 
Securing your digital world - Cybersecurity for SBEs
Securing your digital world - Cybersecurity for SBEsSecuring your digital world - Cybersecurity for SBEs
Securing your digital world - Cybersecurity for SBEs
Sonny Hashmi
 
Cybersecurity-Real World Approach FINAL 2-24-16
Cybersecurity-Real World Approach FINAL 2-24-16Cybersecurity-Real World Approach FINAL 2-24-16
Cybersecurity-Real World Approach FINAL 2-24-16
James Rutt
 
APAC Partner Update: SolarWinds Security
APAC Partner Update: SolarWinds SecurityAPAC Partner Update: SolarWinds Security
APAC Partner Update: SolarWinds Security
SolarWinds
 

Ähnlich wie Secure information sharing - the external user dilemma (20)

Make a case for Data Classification in your organization
Make a case for Data Classification in your organizationMake a case for Data Classification in your organization
Make a case for Data Classification in your organization
 
The BYOD Security Battleground
The BYOD Security BattlegroundThe BYOD Security Battleground
The BYOD Security Battleground
 
Unlocking AI Potential: Leveraging PIA Processes for Comprehensive Impact Ass...
Unlocking AI Potential: Leveraging PIA Processes for Comprehensive Impact Ass...Unlocking AI Potential: Leveraging PIA Processes for Comprehensive Impact Ass...
Unlocking AI Potential: Leveraging PIA Processes for Comprehensive Impact Ass...
 
Portable Biometrics (1)
Portable Biometrics (1)Portable Biometrics (1)
Portable Biometrics (1)
 
How classification changes the way you look into corporate data
How classification changes the way you look into corporate dataHow classification changes the way you look into corporate data
How classification changes the way you look into corporate data
 
Best Practices for Intelligent Compliance
Best Practices for Intelligent ComplianceBest Practices for Intelligent Compliance
Best Practices for Intelligent Compliance
 
Securing your digital world - Cybersecurity for SBEs
Securing your digital world - Cybersecurity for SBEsSecuring your digital world - Cybersecurity for SBEs
Securing your digital world - Cybersecurity for SBEs
 
Securing your digital world cybersecurity for sb es
Securing your digital world   cybersecurity for sb esSecuring your digital world   cybersecurity for sb es
Securing your digital world cybersecurity for sb es
 
The path to most GRC requirements
The path to most GRC requirementsThe path to most GRC requirements
The path to most GRC requirements
 
Creating Trust for the Internet of Things
Creating Trust for the Internet of ThingsCreating Trust for the Internet of Things
Creating Trust for the Internet of Things
 
6 Biggest Cyber Security Risks and How You Can Fight Back
6 Biggest Cyber Security Risks and How You Can Fight Back6 Biggest Cyber Security Risks and How You Can Fight Back
6 Biggest Cyber Security Risks and How You Can Fight Back
 
Zero Trust And Best Practices for Securing Endpoint Apps on May 24th 2021
Zero Trust And Best Practices for Securing Endpoint Apps on May 24th 2021Zero Trust And Best Practices for Securing Endpoint Apps on May 24th 2021
Zero Trust And Best Practices for Securing Endpoint Apps on May 24th 2021
 
Behavior biometrics - The silent revolution in digital fingerprinting
Behavior biometrics - The silent revolution in digital fingerprintingBehavior biometrics - The silent revolution in digital fingerprinting
Behavior biometrics - The silent revolution in digital fingerprinting
 
Cybersecurity-Real World Approach FINAL 2-24-16
Cybersecurity-Real World Approach FINAL 2-24-16Cybersecurity-Real World Approach FINAL 2-24-16
Cybersecurity-Real World Approach FINAL 2-24-16
 
APAC Partner Update: SolarWinds Security
APAC Partner Update: SolarWinds SecurityAPAC Partner Update: SolarWinds Security
APAC Partner Update: SolarWinds Security
 
TLabs - deutsche telekom
TLabs -  deutsche telekomTLabs -  deutsche telekom
TLabs - deutsche telekom
 
Iurii Garasym - Cloud Security Alliance Now in Ukraine. Mission, Opportunitie...
Iurii Garasym - Cloud Security Alliance Now in Ukraine. Mission, Opportunitie...Iurii Garasym - Cloud Security Alliance Now in Ukraine. Mission, Opportunitie...
Iurii Garasym - Cloud Security Alliance Now in Ukraine. Mission, Opportunitie...
 
MultiValue Security
MultiValue SecurityMultiValue Security
MultiValue Security
 
The X Factor in Data Centric Security
The X Factor in Data Centric SecurityThe X Factor in Data Centric Security
The X Factor in Data Centric Security
 
Delete vs Erase: How Are Companies Wiping Active Files
Delete vs Erase: How Are Companies Wiping Active Files Delete vs Erase: How Are Companies Wiping Active Files
Delete vs Erase: How Are Companies Wiping Active Files
 

Mehr von Watchful Software (7)

Jump start EU Data Privacy Compliance with Data Classification
Jump start EU Data Privacy Compliance with Data ClassificationJump start EU Data Privacy Compliance with Data Classification
Jump start EU Data Privacy Compliance with Data Classification
 
Leverage your Siem Tool with RightsWATCH
Leverage your Siem Tool with RightsWATCHLeverage your Siem Tool with RightsWATCH
Leverage your Siem Tool with RightsWATCH
 
Global Thought Leadership Webcast Presentation
Global Thought Leadership Webcast PresentationGlobal Thought Leadership Webcast Presentation
Global Thought Leadership Webcast Presentation
 
Top 10 Best Practices for Implementing Data Classification
Top 10 Best Practices for Implementing Data ClassificationTop 10 Best Practices for Implementing Data Classification
Top 10 Best Practices for Implementing Data Classification
 
Strategies for policy driven information classification
Strategies for policy driven information classificationStrategies for policy driven information classification
Strategies for policy driven information classification
 
You can't teach an old dog new tricks
You can't teach an old dog new tricksYou can't teach an old dog new tricks
You can't teach an old dog new tricks
 
The 5 Key Trends for Insider Threat
The 5 Key Trends for Insider ThreatThe 5 Key Trends for Insider Threat
The 5 Key Trends for Insider Threat
 

Kürzlich hochgeladen

Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024
Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024
Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024
VictoriaMetrics
 
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
masabamasaba
 
%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...
%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...
%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...
masabamasaba
 
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
masabamasaba
 
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
masabamasaba
 
The title is not connected to what is inside
The title is not connected to what is insideThe title is not connected to what is inside
The title is not connected to what is inside
shinachiaurasa2
 

Kürzlich hochgeladen (20)

%in kempton park+277-882-255-28 abortion pills for sale in kempton park
%in kempton park+277-882-255-28 abortion pills for sale in kempton park %in kempton park+277-882-255-28 abortion pills for sale in kempton park
%in kempton park+277-882-255-28 abortion pills for sale in kempton park
 
Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024
Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024
Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024
 
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital TransformationWSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
 
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...
 
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
 
8257 interfacing 2 in microprocessor for btech students
8257 interfacing 2 in microprocessor for btech students8257 interfacing 2 in microprocessor for btech students
8257 interfacing 2 in microprocessor for btech students
 
%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview
%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview
%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview
 
%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...
%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...
%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...
 
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
 
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
 
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
 
%in Midrand+277-882-255-28 abortion pills for sale in midrand
%in Midrand+277-882-255-28 abortion pills for sale in midrand%in Midrand+277-882-255-28 abortion pills for sale in midrand
%in Midrand+277-882-255-28 abortion pills for sale in midrand
 
Define the academic and professional writing..pdf
Define the academic and professional writing..pdfDefine the academic and professional writing..pdf
Define the academic and professional writing..pdf
 
tonesoftg
tonesoftgtonesoftg
tonesoftg
 
WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...
WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...
WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...
 
Announcing Codolex 2.0 from GDK Software
Announcing Codolex 2.0 from GDK SoftwareAnnouncing Codolex 2.0 from GDK Software
Announcing Codolex 2.0 from GDK Software
 
VTU technical seminar 8Th Sem on Scikit-learn
VTU technical seminar 8Th Sem on Scikit-learnVTU technical seminar 8Th Sem on Scikit-learn
VTU technical seminar 8Th Sem on Scikit-learn
 
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
 
%in ivory park+277-882-255-28 abortion pills for sale in ivory park
%in ivory park+277-882-255-28 abortion pills for sale in ivory park %in ivory park+277-882-255-28 abortion pills for sale in ivory park
%in ivory park+277-882-255-28 abortion pills for sale in ivory park
 
The title is not connected to what is inside
The title is not connected to what is insideThe title is not connected to what is inside
The title is not connected to what is inside
 

Secure information sharing - the external user dilemma

  • 1. www.watchfulsoftware.com Secure Information Sharing: The External User Dilemma Martin Kuppinger, KuppingerCole Rui Melo Biscaia, Watchful Software Webinar, Wednesday, 16th of December 2015
  • 2. www.watchfulsoftware.com 1) INTRODUCTION 2) INFORMATION CLASSIFICATION AND SECURE INFORMATION SHARING BECOMING THE STANDARD, NOT BEING THE EXCEPTION ANYMORE 3) POLICY DRIVEN INFORMATION SHARING WITH RIGHTSWATCH 4) Q&A Agenda 2/26/2016 © Copyright www.watchfulsoftware.com. 2015 All Rights Reserved. 2
  • 3. www.watchfulsoftware.com Introductions Martin Kuppinger CEO, Founder & Principal Analyst KuppingerCole mk@kuppingercole.com Rui Melo Biscaia Director of product Management Watchful Software rui.biscaia@watchfulsoftware.com  You are muted centrally. You don’t need to mute/unmute yourself  This webinar is being recorded. The recording will be available tomorrow at www.watchfulsoftware.com  The Q&A session will be at the end  You are welcomed to enter questions anytime, using the Chat feature in the GoToWebinar Control Panel 2/26/2016 © Copyright www.watchfulsoftware.com. 2015 All Rights Reserved. 3
  • 4. www.watchfulsoftware.com 1) INTRODUCTION 2) INFORMATION CLASSIFICATION AND SECURE INFORMATION SHARING BECOMING THE STANDARD, NOT BEING THE EXCEPTION ANYMORE 3) POLICY DRIVEN INFORMATION SHARING WITH RIGHTSWATCH 4) Q&A Agenda 2/26/2016 © Copyright www.watchfulsoftware.com. 2015 All Rights Reserved. 4
  • 5. Secure Information Sharing: The External User Dilemma Information Classification and Secure Information Sharing becoming the standard, not being the exception anymore www.kuppingercole.com Martin Kuppinger CEO, Founder & Principal Analyst KuppingerCole mk@kuppingercole.com
  • 7. Everything and everyone become connected 7
  • 8. Corporate Network 10 years ago 8 Workstations and servers Employees Internet Mobile worker Hacker Gateway Security perimeter
  • 9. Corporate Network now 9 Cloud Hackers Data center HQ Office 1 Office 2 Mobile users Social networks Supplier Surveillance & espionage
  • 10. Paradigm Shift in Information Security 10 From perimeter security There is no network perimeter anymore Perimeter defense security tools leave too many gaps for APTs These tools cannot protect from phishing, malicious insiders, etc. Towards defense of internal resources Assume that the hack has already happened Try to detect it as quickly as possible before more harm is done Knowing as much as possible about our assets is the key
  • 11. In use In motion At rest The what, where and when of Information Protection 11 • Structured data • Unstructured data = documents WHENWHAT WHERE
  • 12. • 100% secure key management • Cloud vs. on-premise • Classification schemes • Policy explosion • Details (Breadth of support, implementation, administration) • Combination of infrastructure building blocks – core product and add-ons • Alternative lightweight solutions Rights Management challenges yesterday and today 12 • Application & Document format support • Platform support (OS, Device) • External user support • (Automated) classification • Deployment • Vendor focus & choice Yesterday Today
  • 13. C-level is aware of need for Secure Information Sharing and Information Protection Even many IT people are still not aware of the solutions, particularly not the maturity of Rights Management The awareness challenge 13
  • 14. • Multiple vendors, many partnersAvailable • Major problems are solvedMature • There is no other way to really protect your crown jewelsNo alternatives Secure Information Sharing: Available. Mature. No alternatives. 14
  • 15. www.watchfulsoftware.com 1) INTRODUCTION 2) INFORMATION CLASSIFICATION AND SECURE INFORMATION SHARING BECOMING THE STANDARD, NOT BEING THE EXCEPTION ANYMORE 3) POLICY DRIVEN INFORMATION SHARING WITH RIGHTSWATCH 4) Q&A Agenda 2/26/2016 © Copyright www.watchfulsoftware.com. 2015 All Rights Reserved. 15
  • 16. www.watchfulsoftware.com Secure Information Sharing - CISO’s questions: 2/26/2016 © Copyright www.watchfulsoftware.com. 2015 All Rights Reserved. 16 Secure Information Sharing 1. Can I enforce corporate policies? 2. Can I allow it via any media and not just e-mail? 3. Can I have a zero extra click environment to achieve it? 4. Can I not need to onboard “externals” into my systems? 5. Can I not require “externals” to own a license nor software? 6. Can I then know who, did what, when and how?
  • 17. www.watchfulsoftware.com Secure Information Sharing is … 2/26/2016 © Copyright www.watchfulsoftware.com. 2015 All Rights Reserved. 17 GOVERNANCE PROTECTION LOSS PREVENTION CLASSIFICATION
  • 18. www.watchfulsoftware.com Secure Information Sharing is RightsWATCH 2/26/2016 © Copyright www.watchfulsoftware.com. 2015 All Rights Reserved. 18 GOVERNANCE PROTECTION LOSS PREVENTION CLASSIFICATION to enhance compliance to uphold policies to decrease liability to apply policies
  • 19. www.watchfulsoftware.com RightsWATCH is Secure Information Sharing because: 2/26/2016 © Copyright www.watchfulsoftware.com. 2015 All Rights Reserved. 19 1. It can enforce corporate policies and not rely on users to know, understand, reason with or be willing to apply policies to data 2. It allows data to be shared via any media and still uphold corporate policies 3. It does not impact on users workflows, as it does not demand users to click on any extra buttons, pop-ups, or combo boxes 4. It does not require enterprises to onboard, nor manage “external users” identities 5. It does not require “external users” to have to buy or install any RightsWATCH proprietary software 6. It delivers a comprehensive audit trail that enables leveraging SIEM tools to do data analytics
  • 20. www.watchfulsoftware.com 1) INTRODUCTION 2) INFORMATION CLASSIFICATION AND SECURE INFORMATION SHARING BECOMING THE STANDARD, NOT BEING THE EXCEPTION ANYMORE 3) POLICY DRIVEN INFORMATION SHARING WITH RIGHTSWATCH 4) Q&A Agenda 2/26/2016 © Copyright www.watchfulsoftware.com. 2015 All Rights Reserved. 20
  • 21. Secure Information Sharing: The External User Dilemma Martin Kuppinger, KuppingerCole Rui Melo Biscaia, Watchful Software Webinar, Wednesday, 16th of December 2015

Hinweis der Redaktion

  1. One location, strong perimeter All data are on-premise Few mobile workers using VPN Few risk factors out there IT is in complete control over infrastructure andapp
  2. Multiple locations Corporate data can be anywhere: on-premise, in data centers, in the cloud or in transit Need to onboard business partners, customers and other identities Large part of the workforce is mobile Numerous new risk factors out there There is no perimeter anymore!
  3. With the corporate security perimeter quickly eroding, traditional security tools like firewalls no longer provide protection Your network will be hacked, it’s the matter of “when”, not “if” Insider threats: rogue administrators, stolen credentials, etc. are now much bigger than external attackers Enterprise data itself is the last line of defense