This webinar discusses secure information sharing with external users. It notes that corporate networks are now more connected, with cloud services, mobile users, and more access points, eliminating the traditional network perimeter. Effective information protection now requires assuming a breach and focusing on rapid detection. Rights management solutions have matured and are necessary to enforce policies during sharing and access. The presentation then focuses on how RightsWatch provides policy-driven information sharing without requiring onboarding or software for external users, while still providing an audit trail of access. It argues RightsWatch meets key criteria to allow secure sharing of information with users outside the organization.
5. Secure Information Sharing: The External User Dilemma
Information Classification and Secure Information Sharing becoming the
standard, not being the exception anymore
www.kuppingercole.com
Martin Kuppinger
CEO, Founder & Principal Analyst
KuppingerCole
mk@kuppingercole.com
10. Paradigm Shift in Information Security
10
From
perimeter
security
There is no network perimeter anymore
Perimeter defense security tools leave too many gaps for APTs
These tools cannot protect from phishing, malicious insiders, etc.
Towards
defense of
internal
resources
Assume that the hack has already happened
Try to detect it as quickly as possible before more harm is done
Knowing as much as possible about our assets is the key
11. In use
In
motion
At rest
The what, where and when of Information Protection
11
• Structured data
• Unstructured data = documents
WHENWHAT
WHERE
12. • 100% secure key management
• Cloud vs. on-premise
• Classification schemes
• Policy explosion
• Details (Breadth of support,
implementation, administration)
• Combination of infrastructure building
blocks – core product and add-ons
• Alternative lightweight solutions
Rights Management challenges yesterday and today
12
• Application & Document format
support
• Platform support (OS, Device)
• External user support
• (Automated) classification
• Deployment
• Vendor focus & choice
Yesterday Today
13. C-level is aware of
need for Secure
Information Sharing
and Information
Protection
Even many IT
people are still not
aware of the
solutions,
particularly not the
maturity of Rights
Management
The awareness challenge
13
14. • Multiple vendors, many partnersAvailable
• Major problems are solvedMature
• There is no other way to really protect
your crown jewelsNo alternatives
Secure Information Sharing: Available. Mature. No alternatives.
14
21. Secure Information Sharing: The External User Dilemma
Martin Kuppinger, KuppingerCole
Rui Melo Biscaia, Watchful Software
Webinar,
Wednesday, 16th of December 2015
Hinweis der Redaktion
One location, strong perimeter
All data are on-premise
Few mobile workers using VPN
Few risk factors out there
IT is in complete control over infrastructure andapp
Multiple locations
Corporate data can be anywhere: on-premise, in data centers, in the cloud or in transit
Need to onboard business partners, customers and other identities
Large part of the workforce is mobile
Numerous new risk factors out there
There is no perimeter anymore!
With the corporate security perimeter quickly eroding, traditional security tools like firewalls no longer provide protection
Your network will be hacked, it’s the matter of “when”, not “if”
Insider threats: rogue administrators, stolen credentials, etc. are now much bigger than external attackers
Enterprise data itself is the last line of defense