SlideShare une entreprise Scribd logo
1  sur  29
Oracle Information Rights Management 11g Deborah Assayag [email_address]
Oracle Security Inside Out Oracle Confidential Information Rights Management ,[object Object],[object Object],[object Object],[object Object],[object Object],Identity Management Database Security ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Databases Applications Content Infrastructure Information
Risks of not controlling sensitive data ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Examples
How does the loss happen and by who? ,[object Object],[object Object],[object Object],[object Object],The Business Impact of Data Breach . Ponemon Institute LLC. May 15, 2007 Causes of security breaches Trends in Data Breach Sources 2008 Data Breach Investigations Report . Verizon Business. June 10, 2008
You have secured the perimeters… … but digital information is no respecter of perimeters! SharePoint Email File system Content Management Intranet/ Extranet
Which perimeter are we talking about? Many business processes involve external parties SharePoint Email File system Content Management Intranet/ Extranet
Typical methods for securing desktops Encrypt disk Prevent use of  external devices Monitor information flow (DLP) OS access control Encrypt content (PGP) Prevent use of  external services ,[object Object],[object Object],[object Object],[object Object]
Security – Usability - Manageability An enterprise-class solution must balance all three aspects Secure Usable Manageable
Imagine if you could… ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
The Solution:  Information Rights Management ,[object Object],What Single documents or groups of documents Who Single people or groups of people When Flexible start and stop times, revoke after delivery Where Single device or roaming across internet, on or offline How Open, Print, Edit, Annotate, Interact, Reply, Pause…
Oracle Information Rights Management Securing all copies of your sensitive information ,[object Object],[object Object],[object Object],[object Object],[object Object],ECM Email File systems Intranet/ extranet Databases Oracle IRM Server Enterprise perimeters Customer Partner Supplier
With Oracle Information Rights Mgmt Flexible & comprehensive information protection Oracle IRM Server Oracle IRM Server Application Export Saved in Content Management Secured from the Desktop
Sealed documents & emails ,[object Object],[object Object],[object Object],[object Object],[object Object]
Benefits  Secure and track information beyond the repository ,[object Object],[object Object],[object Object],[object Object],Storage Area Network Email Web Collaborative Workspace Content Management Oracle IRM Server
<Insert Picture Here> Oracle  Information Rights Management DEMO
Content Author Seals Content Could be… Intellectual property, research, supplier communications,  manuals, BI reports… Content Author Chooses Content Classification Confidential Highly Restricted  (Board, Legal, M&A, Project, etc.) Confidential Restricted Confidential Internal Public
This User Doesn’t Have Rights to View Even if stored on a local file system or external drive Access can be revoked at any time
This User Only Has Read Access No printing, editing or screen captures… User can view document in MS Word, but take screenshot and paste…. Partner
Oracle Information Rights Management Enterprise-class security within & beyond your firewall Different users have  different access  to a single, secured document
Why customers choose Oracle IRM ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Headline Oracle IRM Differentiators ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Oracle IRM 11g Release Highlights ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Oracle IRM + ECM Suite ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Oracle Information Rights Management Customer Success
Use case: Renault F1 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Case Study : Beckman Coulter ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Basic IRM Deployment Architecture IRM Server WebLogic External User DMZ (or Intranet) Internet / External Networks Corporate Network F I R E W A L L F I R E W A L L Load balancer Eg OHS F I R E W A L L Web Services LDAP Server  Database Server
Classification-based rights management Manageable security at enterprise scale ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Classification:  “Board Communications” Classification:  “Company Announcements” CFO All Employees Documents Health+Safety Issues.sdoc HR procedures.spdf Sales pipeline.sxls New customers Roles Contributor Reader Reviewer Print Edit Comment Open Open Open Documents Roles Contributor Reader Reviewer Print Edit Comment Open Open Open Sales strategy Q3 Figures.sxls 2008 Business Plan.sppt ACME competitive review.sdoc HR Director

Contenu connexe

Tendances

Gartner Security & Risk Management Summit 2014 - Defending the Enterprise Aga...
Gartner Security & Risk Management Summit 2014 - Defending the Enterprise Aga...Gartner Security & Risk Management Summit 2014 - Defending the Enterprise Aga...
Gartner Security & Risk Management Summit 2014 - Defending the Enterprise Aga...Fasoo
 
Brochure Imperva Securesphere Vormetric Encryption
Brochure Imperva Securesphere Vormetric EncryptionBrochure Imperva Securesphere Vormetric Encryption
Brochure Imperva Securesphere Vormetric EncryptionMichelle Guerrero Montalvo
 
Windows 10 Enterprise E3 - Best in Class Security and Control - Presented by ...
Windows 10 Enterprise E3 - Best in Class Security and Control - Presented by ...Windows 10 Enterprise E3 - Best in Class Security and Control - Presented by ...
Windows 10 Enterprise E3 - Best in Class Security and Control - Presented by ...David J Rosenthal
 
Cloud Audit and Compliance
Cloud Audit and ComplianceCloud Audit and Compliance
Cloud Audit and ComplianceQuadrisk
 
Intel IT's Identity and Access Management Journey
Intel IT's Identity and Access Management JourneyIntel IT's Identity and Access Management Journey
Intel IT's Identity and Access Management JourneyIntel IT Center
 
In data security
In data securityIn data security
In data securityadithdev
 
Identity & Access Management - Securing Your Data in the 21st Century Enterprise
Identity & Access Management - Securing Your Data in the 21st Century EnterpriseIdentity & Access Management - Securing Your Data in the 21st Century Enterprise
Identity & Access Management - Securing Your Data in the 21st Century EnterpriseLance Peterman
 
B2 - The History of Content Security: Part 2 - Adam Levithan
B2 - The History of Content Security: Part 2 - Adam LevithanB2 - The History of Content Security: Part 2 - Adam Levithan
B2 - The History of Content Security: Part 2 - Adam LevithanSPS Paris
 
IDENTITY IS THE FIRST STEP TO TRUE NETWORK SECURITY
IDENTITY IS THE FIRST STEP TO TRUE NETWORK SECURITYIDENTITY IS THE FIRST STEP TO TRUE NETWORK SECURITY
IDENTITY IS THE FIRST STEP TO TRUE NETWORK SECURITYForgeRock
 
Blbs prod-bloombase-store safe-product-brochure-uslet-en-r3
Blbs prod-bloombase-store safe-product-brochure-uslet-en-r3Blbs prod-bloombase-store safe-product-brochure-uslet-en-r3
Blbs prod-bloombase-store safe-product-brochure-uslet-en-r3Bloombase
 
Microsoft Azure Information Protection
Microsoft Azure Information Protection Microsoft Azure Information Protection
Microsoft Azure Information Protection Syed Sabhi Haider
 
Emma Aubert | Information Protection
Emma Aubert | Information ProtectionEmma Aubert | Information Protection
Emma Aubert | Information ProtectionMicrosoft Österreich
 
Wave 14 - Winodws 7 Security Story Core by MVP Azra Rizal
Wave 14 - Winodws 7 Security Story Core by MVP Azra RizalWave 14 - Winodws 7 Security Story Core by MVP Azra Rizal
Wave 14 - Winodws 7 Security Story Core by MVP Azra RizalQuek Lilian
 
IBM - IAM Security and Trends
IBM - IAM Security and TrendsIBM - IAM Security and Trends
IBM - IAM Security and TrendsIBM Sverige
 
5 reasons your iam solution will fail
5 reasons your iam solution will fail5 reasons your iam solution will fail
5 reasons your iam solution will failIBM Security
 
Identity and Access Management Introduction
Identity and Access Management IntroductionIdentity and Access Management Introduction
Identity and Access Management IntroductionAidy Tificate
 

Tendances (20)

Gartner Security & Risk Management Summit 2014 - Defending the Enterprise Aga...
Gartner Security & Risk Management Summit 2014 - Defending the Enterprise Aga...Gartner Security & Risk Management Summit 2014 - Defending the Enterprise Aga...
Gartner Security & Risk Management Summit 2014 - Defending the Enterprise Aga...
 
Brochure Imperva Securesphere Vormetric Encryption
Brochure Imperva Securesphere Vormetric EncryptionBrochure Imperva Securesphere Vormetric Encryption
Brochure Imperva Securesphere Vormetric Encryption
 
Windows 10 Enterprise E3 - Best in Class Security and Control - Presented by ...
Windows 10 Enterprise E3 - Best in Class Security and Control - Presented by ...Windows 10 Enterprise E3 - Best in Class Security and Control - Presented by ...
Windows 10 Enterprise E3 - Best in Class Security and Control - Presented by ...
 
Cloud Audit and Compliance
Cloud Audit and ComplianceCloud Audit and Compliance
Cloud Audit and Compliance
 
Brochure Imperva Vormetric
Brochure Imperva VormetricBrochure Imperva Vormetric
Brochure Imperva Vormetric
 
Intel IT's Identity and Access Management Journey
Intel IT's Identity and Access Management JourneyIntel IT's Identity and Access Management Journey
Intel IT's Identity and Access Management Journey
 
In data security
In data securityIn data security
In data security
 
Identity & Access Management - Securing Your Data in the 21st Century Enterprise
Identity & Access Management - Securing Your Data in the 21st Century EnterpriseIdentity & Access Management - Securing Your Data in the 21st Century Enterprise
Identity & Access Management - Securing Your Data in the 21st Century Enterprise
 
IBM Security Portfolio - 2015
IBM Security Portfolio - 2015IBM Security Portfolio - 2015
IBM Security Portfolio - 2015
 
B2 - The History of Content Security: Part 2 - Adam Levithan
B2 - The History of Content Security: Part 2 - Adam LevithanB2 - The History of Content Security: Part 2 - Adam Levithan
B2 - The History of Content Security: Part 2 - Adam Levithan
 
IDENTITY IS THE FIRST STEP TO TRUE NETWORK SECURITY
IDENTITY IS THE FIRST STEP TO TRUE NETWORK SECURITYIDENTITY IS THE FIRST STEP TO TRUE NETWORK SECURITY
IDENTITY IS THE FIRST STEP TO TRUE NETWORK SECURITY
 
Blbs prod-bloombase-store safe-product-brochure-uslet-en-r3
Blbs prod-bloombase-store safe-product-brochure-uslet-en-r3Blbs prod-bloombase-store safe-product-brochure-uslet-en-r3
Blbs prod-bloombase-store safe-product-brochure-uslet-en-r3
 
Microsoft Azure Information Protection
Microsoft Azure Information Protection Microsoft Azure Information Protection
Microsoft Azure Information Protection
 
Emma Aubert | Information Protection
Emma Aubert | Information ProtectionEmma Aubert | Information Protection
Emma Aubert | Information Protection
 
Wave 14 - Winodws 7 Security Story Core by MVP Azra Rizal
Wave 14 - Winodws 7 Security Story Core by MVP Azra RizalWave 14 - Winodws 7 Security Story Core by MVP Azra Rizal
Wave 14 - Winodws 7 Security Story Core by MVP Azra Rizal
 
18 Tips for Data Classification - Data Sheet by Secure Islands
18 Tips for Data Classification - Data Sheet by Secure Islands18 Tips for Data Classification - Data Sheet by Secure Islands
18 Tips for Data Classification - Data Sheet by Secure Islands
 
HIPAA_CheatSheet
HIPAA_CheatSheetHIPAA_CheatSheet
HIPAA_CheatSheet
 
IBM - IAM Security and Trends
IBM - IAM Security and TrendsIBM - IAM Security and Trends
IBM - IAM Security and Trends
 
5 reasons your iam solution will fail
5 reasons your iam solution will fail5 reasons your iam solution will fail
5 reasons your iam solution will fail
 
Identity and Access Management Introduction
Identity and Access Management IntroductionIdentity and Access Management Introduction
Identity and Access Management Introduction
 

En vedette

Mekanisme pasar modal
Mekanisme pasar modalMekanisme pasar modal
Mekanisme pasar modalEjayanti Eka
 
Learn BEM: CSS Naming Convention
Learn BEM: CSS Naming ConventionLearn BEM: CSS Naming Convention
Learn BEM: CSS Naming ConventionIn a Rocket
 
How to Build a Dynamic Social Media Plan
How to Build a Dynamic Social Media PlanHow to Build a Dynamic Social Media Plan
How to Build a Dynamic Social Media PlanPost Planner
 
SEO: Getting Personal
SEO: Getting PersonalSEO: Getting Personal
SEO: Getting PersonalKirsty Hulse
 
Lightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika Aldaba
Lightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika AldabaLightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika Aldaba
Lightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika Aldabaux singapore
 

En vedette (6)

Mekanisme pasar modal
Mekanisme pasar modalMekanisme pasar modal
Mekanisme pasar modal
 
Learn BEM: CSS Naming Convention
Learn BEM: CSS Naming ConventionLearn BEM: CSS Naming Convention
Learn BEM: CSS Naming Convention
 
How to Build a Dynamic Social Media Plan
How to Build a Dynamic Social Media PlanHow to Build a Dynamic Social Media Plan
How to Build a Dynamic Social Media Plan
 
SEO: Getting Personal
SEO: Getting PersonalSEO: Getting Personal
SEO: Getting Personal
 
Lightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika Aldaba
Lightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika AldabaLightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika Aldaba
Lightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika Aldaba
 
Succession “Losers”: What Happens to Executives Passed Over for the CEO Job?
Succession “Losers”: What Happens to Executives Passed Over for the CEO Job? Succession “Losers”: What Happens to Executives Passed Over for the CEO Job?
Succession “Losers”: What Happens to Executives Passed Over for the CEO Job?
 

Similaire à Irm11g overview

Microsoft Azure Rights Management
Microsoft Azure Rights ManagementMicrosoft Azure Rights Management
Microsoft Azure Rights ManagementDavid J Rosenthal
 
Understanding Database Encryption & Protecting Against the Insider Threat wit...
Understanding Database Encryption & Protecting Against the Insider Threat wit...Understanding Database Encryption & Protecting Against the Insider Threat wit...
Understanding Database Encryption & Protecting Against the Insider Threat wit...MongoDB
 
Office 365 Security, Privacy and Compliance - SMB Nation 2015
Office 365 Security, Privacy and Compliance - SMB Nation 2015Office 365 Security, Privacy and Compliance - SMB Nation 2015
Office 365 Security, Privacy and Compliance - SMB Nation 2015Robert Crane
 
Lab Datareach Presentation V5
Lab Datareach Presentation V5Lab Datareach Presentation V5
Lab Datareach Presentation V5damonhough
 
Webinar: Endpoint Backup is not Enough - You Need an End-user Data Strategy
Webinar: Endpoint Backup is not Enough - You Need an End-user Data StrategyWebinar: Endpoint Backup is not Enough - You Need an End-user Data Strategy
Webinar: Endpoint Backup is not Enough - You Need an End-user Data StrategyStorage Switzerland
 
Value Microsoft 365 E5 English
Value Microsoft 365 E5 EnglishValue Microsoft 365 E5 English
Value Microsoft 365 E5 EnglishGuillaume Lagache
 
Share Point Server Security with Joel Oleson
Share Point Server Security with Joel OlesonShare Point Server Security with Joel Oleson
Share Point Server Security with Joel OlesonJoel Oleson
 
Oracle-Security_Executive-Presentation
Oracle-Security_Executive-PresentationOracle-Security_Executive-Presentation
Oracle-Security_Executive-Presentationstefanjung
 
Secure File Sharing Basics - What Every File Sharing Provider Should Have
Secure File Sharing Basics -  What Every File Sharing Provider Should HaveSecure File Sharing Basics -  What Every File Sharing Provider Should Have
Secure File Sharing Basics - What Every File Sharing Provider Should HaveBoxHQ
 
Azure Information Protection
Azure Information ProtectionAzure Information Protection
Azure Information ProtectionRobert Crane
 
[IGNITE2018] [BRK2495] What’s new in Microsoft Information Protection solutio...
[IGNITE2018] [BRK2495] What’s new in Microsoft Information Protection solutio...[IGNITE2018] [BRK2495] What’s new in Microsoft Information Protection solutio...
[IGNITE2018] [BRK2495] What’s new in Microsoft Information Protection solutio...☁️ Gustavo Magella
 
Information protection & classification
Information protection & classificationInformation protection & classification
Information protection & classificationDavid De Vos
 
Security and Compliance with SharePoint and Office 365
Security and Compliance with SharePoint and Office 365Security and Compliance with SharePoint and Office 365
Security and Compliance with SharePoint and Office 365Richard Harbridge
 
Importance of Identity Management in Security - Microsoft Tech Tour @Towson
Importance of Identity Management in Security - Microsoft Tech Tour @TowsonImportance of Identity Management in Security - Microsoft Tech Tour @Towson
Importance of Identity Management in Security - Microsoft Tech Tour @TowsonAdam Levithan
 
Information Security
Information SecurityInformation Security
Information SecurityMohit8780
 
Information protection and compliance
Information protection and complianceInformation protection and compliance
Information protection and complianceDean Iacovelli
 

Similaire à Irm11g overview (20)

Microsoft Azure Rights Management
Microsoft Azure Rights ManagementMicrosoft Azure Rights Management
Microsoft Azure Rights Management
 
Understanding Database Encryption & Protecting Against the Insider Threat wit...
Understanding Database Encryption & Protecting Against the Insider Threat wit...Understanding Database Encryption & Protecting Against the Insider Threat wit...
Understanding Database Encryption & Protecting Against the Insider Threat wit...
 
Office 365 Security, Privacy and Compliance - SMB Nation 2015
Office 365 Security, Privacy and Compliance - SMB Nation 2015Office 365 Security, Privacy and Compliance - SMB Nation 2015
Office 365 Security, Privacy and Compliance - SMB Nation 2015
 
Lab Datareach Presentation V5
Lab Datareach Presentation V5Lab Datareach Presentation V5
Lab Datareach Presentation V5
 
CIO Forum June Microsoft.pdf
CIO Forum June Microsoft.pdfCIO Forum June Microsoft.pdf
CIO Forum June Microsoft.pdf
 
Apani Ov V9
Apani Ov V9Apani Ov V9
Apani Ov V9
 
Webinar: Endpoint Backup is not Enough - You Need an End-user Data Strategy
Webinar: Endpoint Backup is not Enough - You Need an End-user Data StrategyWebinar: Endpoint Backup is not Enough - You Need an End-user Data Strategy
Webinar: Endpoint Backup is not Enough - You Need an End-user Data Strategy
 
Value Microsoft 365 E5 English
Value Microsoft 365 E5 EnglishValue Microsoft 365 E5 English
Value Microsoft 365 E5 English
 
Share Point Server Security with Joel Oleson
Share Point Server Security with Joel OlesonShare Point Server Security with Joel Oleson
Share Point Server Security with Joel Oleson
 
Oracle-Security_Executive-Presentation
Oracle-Security_Executive-PresentationOracle-Security_Executive-Presentation
Oracle-Security_Executive-Presentation
 
Secure File Sharing Basics - What Every File Sharing Provider Should Have
Secure File Sharing Basics -  What Every File Sharing Provider Should HaveSecure File Sharing Basics -  What Every File Sharing Provider Should Have
Secure File Sharing Basics - What Every File Sharing Provider Should Have
 
Dstca
DstcaDstca
Dstca
 
Azure Information Protection
Azure Information ProtectionAzure Information Protection
Azure Information Protection
 
VISULOX-Summary-SN
VISULOX-Summary-SNVISULOX-Summary-SN
VISULOX-Summary-SN
 
[IGNITE2018] [BRK2495] What’s new in Microsoft Information Protection solutio...
[IGNITE2018] [BRK2495] What’s new in Microsoft Information Protection solutio...[IGNITE2018] [BRK2495] What’s new in Microsoft Information Protection solutio...
[IGNITE2018] [BRK2495] What’s new in Microsoft Information Protection solutio...
 
Information protection & classification
Information protection & classificationInformation protection & classification
Information protection & classification
 
Security and Compliance with SharePoint and Office 365
Security and Compliance with SharePoint and Office 365Security and Compliance with SharePoint and Office 365
Security and Compliance with SharePoint and Office 365
 
Importance of Identity Management in Security - Microsoft Tech Tour @Towson
Importance of Identity Management in Security - Microsoft Tech Tour @TowsonImportance of Identity Management in Security - Microsoft Tech Tour @Towson
Importance of Identity Management in Security - Microsoft Tech Tour @Towson
 
Information Security
Information SecurityInformation Security
Information Security
 
Information protection and compliance
Information protection and complianceInformation protection and compliance
Information protection and compliance
 

Dernier

Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Scott Andery
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...AliaaTarek5
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesThousandEyes
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditSkynet Technologies
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 

Dernier (20)

Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance Audit
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 

Irm11g overview

  • 1. Oracle Information Rights Management 11g Deborah Assayag [email_address]
  • 2.
  • 3.
  • 5.
  • 6. You have secured the perimeters… … but digital information is no respecter of perimeters! SharePoint Email File system Content Management Intranet/ Extranet
  • 7. Which perimeter are we talking about? Many business processes involve external parties SharePoint Email File system Content Management Intranet/ Extranet
  • 8.
  • 9. Security – Usability - Manageability An enterprise-class solution must balance all three aspects Secure Usable Manageable
  • 10.
  • 11.
  • 12.
  • 13. With Oracle Information Rights Mgmt Flexible & comprehensive information protection Oracle IRM Server Oracle IRM Server Application Export Saved in Content Management Secured from the Desktop
  • 14.
  • 15.
  • 16. <Insert Picture Here> Oracle Information Rights Management DEMO
  • 17. Content Author Seals Content Could be… Intellectual property, research, supplier communications, manuals, BI reports… Content Author Chooses Content Classification Confidential Highly Restricted (Board, Legal, M&A, Project, etc.) Confidential Restricted Confidential Internal Public
  • 18. This User Doesn’t Have Rights to View Even if stored on a local file system or external drive Access can be revoked at any time
  • 19. This User Only Has Read Access No printing, editing or screen captures… User can view document in MS Word, but take screenshot and paste…. Partner
  • 20. Oracle Information Rights Management Enterprise-class security within & beyond your firewall Different users have different access to a single, secured document
  • 21.
  • 22.
  • 23.
  • 24.
  • 25. Oracle Information Rights Management Customer Success
  • 26.
  • 27.
  • 28. Basic IRM Deployment Architecture IRM Server WebLogic External User DMZ (or Intranet) Internet / External Networks Corporate Network F I R E W A L L F I R E W A L L Load balancer Eg OHS F I R E W A L L Web Services LDAP Server Database Server
  • 29.

Notes de l'éditeur

  1. 05/08/10 Oracle Confidential Most regulated information originates and concentrates in databases. Oracle offers industry-leading database security options for its database. Worth starting to secure information at source (losing a database is worse than losing a file). Myriad end users access regulated information in databases via business applications (HR self-service, CRM, etc.). Oracle Identity Management offers industry-leading identity and access management governing end user/application access to regulated information. Centralised and consistent policy control and auditing across Oracle and non-Oracle applications. Industry leadership in this area extended by Sun acquisition. End users copy information beyond databases and applications, generally in the form of documents (e.g. sensitive reports). These copies proliferate hugely in number and location (e.g. to unmanaged servers and web sites and corporate and home computers, inside and outside the firewall). Oracle IRM uses encryption to retain control over all copies of these sensitive documents, regardless of where they are located, inside and outside the firewall. Oracle is doing more than just reorganising its security sales forces to sell database security, IAM and IRM together. It is engineering the product suites to work together so that enterprises can consistently and cost-effectively manage the security of their most sensitive and regulated information – in the database and application layers and beyond.
  2. Many organizations today are exposed to the risk of losing valuable information which resides in emails and documents. Financial information, mergers and acquisition activity, engineering and research data, often resides in Word, Excel or PDF documents and when lost can have significant impact to your business. Regulations specify controls must be in place when handling classified content, failing to comply with these regulations can result in fines. Losing your intellectual property to competitors reduces your effectiveness in the market place. Often such incidents are reported by the popular press which has a severe impact to your company brand and your customers lose confidence in your ability to protect their information.
  3. Over the past few years we have seen many examples of organizations losing important information. This is exposure you do not desire.
  4. 6/ 10 Research also reveals that a high percentage of data loss happens by mistake or through pure negligence and only a small amount of incidents happen internally where your existing security infrastructure is implemented. These risks are increasing as more and more business use cases involve the collaboration of sensitive content with external parties, parties who don’t employ the same importance on protecting your information and accidently lose it.
  5. Database security not enough Select / report / applications API Web service Your business has of course deployed security solutions for content that resides internally. Take SharePoint for instance, different folders provide different access controls to documents. Yet when these documents are taken out of SharePoint, say by emailing to someone, the security doesn’t travel with them. Instead security is applied at each location the content could reside. But this is a constant struggle when the digital information doesn’t respect your security perimeters, they can be stored on USB devices, external hard drives, CDs etc. Information proliferates. Between share filed systems, email, intranets, extranets and thousands of desktops inside and outside the firewall. Red boxes: If you are looking for conventional information security to provide with compliance, records management &amp; content management. Today, at best you are really only managing a small subset of your information within these systems.
  6. But the problem doesn’t stop there. Your business requires that information is shared beyond your enterprise, to customer, partners and suppliers. Yet you cannot enforce the same level of security on their firewalls and content repositories. The previous slide shows the perimeters of existing systems, but which perimeters are we talking about? Many business processes, for example with Oracle acquiring other companies, information is shared with external parties such as customers, partners and people working at home.
  7. Your business has of course deployed security solutions for content that resides internally. Take SharePoint for instance, different folders provide different access controls to documents. Yet when these documents are taken out of SharePoint, say by emailing to someone, the security doesn’t travel with them. Instead security is applied at each location the content could reside. But this is a constant struggle when the digital information doesn’t respect your security perimeters, they can be stored on USB devices, external hard drives, CDs etc. Information proliferates. Between share filed systems, email, intranets, extranets and thousands of desktops inside and outside the firewall. Red boxes: If you are looking for conventional information security to provide with compliance, records management &amp; content management. Today, at best you are really only managing a small subset of your information within these systems.
  8. Wouldn’t it be nice if you could solve this problem? Have control over content no matter where it exists, beyond your networks. Imagine if you could produce evidence that regulatory controls had been put in place by showing every single access to controlled content by authorized users.
  9. In summary, Oracle IRM is the leading document rights management technology and our customers have chosen it for the immediate reduction in costs and increase in security it brings. But as important as security is, Oracle IRM delivers unprecedented ease of use and the ability to scale to very large numbers of users and documents. This balance of security, usability and manageability means your business can deploy an IRM solution without interrupting existing workflows and meet the desired security and regulatory requirements.
  10. Offline Use Oracle IRM stores a copy of a user’s rights locally on their PC.  These rights are refreshed every day via invisible synchronization with the IRM Server.  This means that a user can be given an offline working period of, say, 3 days.  This enables them to work with sealed documents, just as easily as if they were unsealed, without needing to connect to the internet for 3 days.  However, whenever they do connect their rights are refreshed and they are given another 5 days from that point in time.  Thus in reality users are never aware of refreshing their rights, all of their documents just open, regardless of when the last time they opened any given document was or even if they have never opened it before  Oracle IRM daily synchronization also allows remote users to have their rights revoked at short notice.  So partners at the end of a project, or employees leaving the organization, can have their access denied to all of their sealed documents the next time they synchronize.  Highly sensitive data can be given shorter offline periods, or even only have access whilst online, to enable faster revocation of rights. Microsoft, Adobe, EMC, Liquid Machines All other IRM products issue a fixed length offline lease to a document only when that document is opened.  If that offline period is 5 days, then it cannot be refreshed until that 5 day lease has expired.  Thus it is common for offline leases to expire whilst a user is offline and unable to refresh their rights, thus being denied access to their document.  Also if a user does not obtain leases for their documents before going offline (because they have never opened them before, or they haven’t opened them for some time) then again they will be denied access whilst offline. Microsoft: Revocation of rights can only be performed by a system administrator editing an XML file, the ‘revocation list’.  This is effectively impractical and clearly does not scale. EMC, Adobe: Rights can only be revoked at the end of the offline lease, not during as with Oracle IRM synchronization. Search Only Oracle IRM has out-of-the-box integrations with Windows Explorer Search, Windows Indexing Service, Windows Desktop Search (on Vista) and SharePoint 2007 Indexing Search. Oracle IRM also has easy to deploy Search APIs which for example have been integrated with: Autonomy, Oracle SES, LiveLink Search, Oracle Text Microsoft, Adobe, EMC, Liquid Machines No other IRM solutions have out-of-the-box search integrations nor easy to integrate APIs enabling searching of sealed documents Thus not even Microsoft can search its own sealed documents within SharePoint, their answer is to store unprotected documents in SharePoint, which does not scale Cont..
  11. Renault F1 wanted to be able to replicate documents when shared between 2 factories, 2 mobile teams, suppliers, sub-contractors and partners Security of documents containing technical specifications, including the “Bible” which contains all the information relating to the racing car. The solution needed to convert 80TB of documents stored in multiple repositories and with no global search functionality Necessary? See http://www.theregister.co.uk/2007/04/30/f*****i_espionage_conviction Sophisticated deployment, illustrating several key Oracle IRM differentiators Rapid (hosted) evaluation, rapid deployment Active Directory integration Windows authentication Transparent offline working (track-side) Citrix deployment (design office, Linux, Citrix) Silent MSI rollout
  12. To recap…
  13. A key differentiator of Oracle IRM - the key to moving from initial pilot IRM deployments to successful, large-scale enterprise IRM deployments - is its unique classification-based rights model. Ignoring the text for a moment … The picture shows 8 documents: 4 sealed to one classification “Board Communications”, and 4 sealed to “Company Announcements”. The CFO is assigned a “Contributor” role, which means he can open, print and edit documents sealed to “Board Communications”. The HR Director has a similar “Contributor” role for “Company Announcements” but only has a “Reader” role for “Board Communications”. The group “All Employees” which like the users comes from an enterprise directory, are “Readers” for “Company Announcements” but cannot access documents sealed to “Board Communications”. The point of the picture is that for 8 documents there are 4 role assignments – the black dotted lines to the right of the picture. But if there were 80,000 documents – 40,000 sealed to “Board Communications” and 40,000 sealed to “Company Announcements” there would still only be 4 role assignments. This is a subtle but huge advantage for Oracle IRM, with both technical and business benefits. From the business perspective end users and business and IT administrators are presented with a simple model governing access to their information that they can understand and communicate, even at enterprise scale, because it is implemented in terms of things they already understand – classifications based on existing information classifications, or business processes or projects; their roles within these business processes; and existing organizational groupings in enterprise directories. From a technical perspective the per-classification Oracle IRM system has to manage orders of magnitude fewer rights than systems which clone per-user and per-file rights from policy templates. Far fewer rights enables the automated synchronization of rights to the desktop that provides Oracle IRM with its unique “hands free” offline working, while retaining timely revocation and up-to-date audit trails. This is not at the expense of making real-world exceptions. While Oracle IRM manages rights primarily at the level of classifications and roles it can easily make per-user and per-file exceptions – when they are needed – as compared to competing solutions which attempt to build enterprise policy on the quicksand of millions of per-user and per-file exceptions.