- IRM SECURE

advertisement
Information Rights Management (IRM):
Enhancing Security of IBM FileNet
The Problem:
A Typical File Downloading Scenario
User
IBM FileNet
Click for NEXT
Once the file is downloaded by the user, IBM FileNet has
no control on the file.
A Typical File Sharing Scenario
Edited
Copied
Printed
Un-protected File
Viewed
Distributed
It can further be:
Edited, Copied, Printed, Distributed, Viewed (by others)
Click for NEXT
It can further be:
Edited, Copied, Printed, Distributed, Viewed (by others) !!
The Solution:
File Downloading Scenario with Seclore FileSecure
User
IBM FileNet +
Seclore FileSecure
Click for NEXT
When the file is downloaded, Seclore FileSecure protects
the file
File Downloading Scenario with Seclore FileSecure
Edited
Copied
Printed
Protected File
Viewed
Distributed
Click for NEXT
It can further be:
Edited, Copied, Printed, Distributed, Viewed (by others)
The user has only restricted usage rights (e.g. view only,
edit + print only, etc)
Feature
IBM FileNet
IBM FileNet + Seclore
FileSecure
Access Control
Can provide control while
the information is within
the system only
Can provide control even after
the information is download
from the system
Usage Control
(View, Edit,
Print, etc)
Doesn't provide usage
control
Can provide usage control
persistently within & outside the
system
Policy changes
Can reflect changes in
policies while the
information is within the
system
Can reflect changes in policies
while the information is outside
the system & in real time
Audit trail
Can provide audit trails for
information before
download only
Can track all authorized and
unauthorized attempts on
information before and after
download
Some screen shots
1. Assigning Seclore Policies to FileNet folder
“Hot-Folder”
Policy Admin
Computer
Policy definition could be centralized (done by central
team) or decentralized (done by dept. level teams)
Internal Users
External Users
Policy Admin
Computer
Policy is defined asa. WHO - people / groups within or outside
of the enterprise
Policy Admin
Computer
Policy is defined as
b. WHAT - (VIEW, EDIT, PRINT,
FORWARD,… )
Policy Admin
Computer
WHEN
date range,
time span, …
Policy Admin
Computer
Policy is defined asc. WHEN - date range, time span, …
Policy Admin
Computer
Policy is defined asd. WHERE - Specific computers, specific networks, only
from the office, …
2. Downloading document from “Hot-Folder”
User’s Computer
User logs into FileNet and downloads a file
User’s Computer
The downloaded file is automatically protected with the
policy of the “Hot Folder”. Notice the “red” lock
3. Opening the document
User’s Computer
When the user opens the file, he gets to see the rights
that he has on the document
4. Performing un-authorized actions
User’s Computer
If he tries to print….
User’s Computer
He will be restricted from printing !!
User’s Computer
If the user tries to copy data…
User’s Computer
He will be restricted from copying data!!
User’s Computer
Even print-screen is blocked !!
User’s Computer
The system also maintains a complete audit trail of all the
user actions, time & even location !!
About Seclore
Corporate Background …
“Seclore is a high growth software product company.
Seclore’s technology helps mitigate the risks arising out of
information breaches whilst enhancing collaboration”
6 years old, Headquartered in Mumbai, India
Geographical and customer presence
Middle East, India, ASEAN, Western Europe, North Africa
Keywords
Information Rights Management, Secure outsourcing
Investors
The largest private bank in India, one of the foremost R&D institute &
professional financial investors
Why are we different
Minimally intrusive security technology, value based pricing, usage without
training
About …
Seclore is a high growth information security product company focussed on
providing Security without compromising collaboration
Seclore’s flagship product Seclore FileSecure is used by More than 1.5
million users & some of the largest enterprises
For more informationhttp://www.seclore.com/ibm_filenet.html
Email: info@seclore.com
Download