1 © Copyright 2008 EMC Corporation. All rights reserved. EMC Documentum Trusted Content Services.

Slides:



Advertisements
Similar presentations
Powerful and convenient management for Windows Mobile ® 6.1 devices in an enterprise environment. These features include: Centralized, over-the-air device.
Advertisements

Compliance storyboard: Classifying & controlling content at the input device.
Meganet Corporation VME Office Meganet Corporation Meganet Corporation is a leading worldwide provider of data security to Governments, Military,
Presentation by Priyanka Sawarkar
Steve Jordan Director. Industry Solutions 05/05/14 Managing Chaos: Data Movement in 2014.
JEFF WILLIAMS INFORMATION SECURITY OFFICER CALIFORNIA STATE UNIVERSITY, SACRAMENTO Payment Card Industry Data Security Standard (PCI DSS) Compliance.
1 GP Confidential © GlobalPlatform’s Value Proposition for Mobile Point of Sale (mPOS)
1 Chapter 8 Fundamentals of System Security. 2 Objectives In this chapter, you will: Understand the trade-offs among security, performance, and ease of.
2 Language of Computer Crime Investigation
© Vendor Safe Technologies 2008 B REACHES BY M ERCHANT T YPE 70% 1% 9% 20% Data provided by Visa Approved QIRA November 2008 from 475 Forensic Audits.
11© 2011 Hitachi Data Systems. All rights reserved. HITACHI DATA DISCOVERY FOR MICROSOFT® SHAREPOINT ® SOLUTION SCALING YOUR SHAREPOINT ENVIRONMENT PRESENTER.
DESIGNING A PUBLIC KEY INFRASTRUCTURE
EMC Documentum Compliance Manager
Secure Electronic Data Communications and Transactions.
Introduction to PKI Seminar What is PKI? Robert Brentrup July 13, 2004.
Wireless Encryption By: Kara Dolansky Network Management Spring 2009.
Chapter 9 Information Systems Controls for System Reliability— Part 2: Confidentiality and Privacy Copyright © 2012 Pearson Education, Inc. publishing.
Netop Remote Control Trusted. Secure. Experienced.
Security & PCI Compliance The Future of Electronic Payments Security & PCI Compliance Greg Grant Vice President – Managed Security Services.
1 for Real Estate An easy, fast, and cost effective way to organize documents associated to listings & client correspondence Real Estate Real Estate offices.
8/10/2015Windows 71 George South. 8/10/2015Windows Windows Vista Windows Vista was released in January 2007 some five years after Windows XP Vista.
Information Resources and Communications University of California, Office of the President System-Wide Strategies for Achieving IT Security at the University.
Chapter 10 Information Systems Controls for System Reliability—Part 3: Processing Integrity and Availability Copyright © 2012 Pearson Education, Inc.
Electronic Customer Portal System. Reducing Risks – Increasing Efficiency – Lowering Costs Secure Internet based Communication Gateway direct to your.
New Data Regulation Law 201 CMR TJX Video.
Section Eight: Communication Security (COMSEC) Note: All classified markings contained within this presentation are for.
Effectively Integrating Information Technology (IT) Security into the Acquisition Process Section 5: Security Controls.
1 Card Scanning Solutions SigniShell CSSN – Card Scanning Solutions THE ULTIMATE SIGNATURE CAPTURE & AUTHENTICATION SOLUTION.
1 © Copyright 2008 EMC Corporation. All rights reserved. David Mendel Sr. Product Marketing Manager EMC Corporation June 2008 EMC Documentum Information.
Computers Are Your Future Tenth Edition Chapter 12: Databases & Information Systems Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall1.
1. Windows Vista Enterprise And Mid-Market User Scenarios 2. Customer Profiling And Segmentation Tools 3. Windows Vista Business Value And Infrastructure.
Vulnerabilities in peer to peer communications Web Security Sravan Kunnuri.
Module 9 Configuring Messaging Policy and Compliance.
Ecords Management Records Management Paul Smallcombe Records & Information Compliance Manager.
Electronic Records Management: A Checklist for Success Jesse Wilkins April 15, 2009.
State Agencies’ Records Retention Schedule S6: Information Systems Records S6 Retention Schedules.
What is MediaCAST. MediaCAST is an on-demand learning platform purchased by the CCSD to enhance the delivery of lessons in the classroom. The system provides.
Efficiency and Compliance Voice Documentation for Financial Services.
LeToia Crozier, Esq., CHC Vice President, Compliance & Regulatory Affairs Corey Wilson Director of Technical Services & Security Officer Interactive Think.
Lesson 9-Information Security Best Practices. Overview Understanding administrative security. Security project plans. Understanding technical security.
Government Online Copyright © 2007 Credentica Inc. All Rights Reserved. February 15th - 16th, 2007 Mobile Showcase.
Cryptography and Network Security (CS435) Part One (Introduction)
2.0 Blockchain Storage & Discovery. GROOVIX Introduction GROOVIX Compliant Cloud Service is a secure, data management and eDiscovery solution, designed.
Guide to MCSE , Second Edition, Enhanced1 The Windows XP Security Model User must logon with: Valid user ID Password User receives access token Access.
Module 7 Planning and Deploying Messaging Compliance.
Records Management: The Public Records Act, the Library of Virginia, and You Glenn Smith Records Management Analyst.
BEST Guard – Information Logging. bEST Guard Records all actions executed on an MFP Produkt type: Server based application (software only) Development.
Create Content Capture Content Review Content Edit Content Version Content Version Content Translate Content Translate Content Format Content Transform.
SAR Enterprises Syed Ahmed Abdullah Alsubaiei Ramakrishna G.
Digital recordkeeping strategy for mobile work processes Joel Smith HPRM System Administrator.
1Copyright Jordan Lawrence. All rights reserved. U. S. Privacy and Security Laws DELVACCA INAUGURAL INHOUSE COUNSEL CONFERENCE April 1, 2009 Marty.
Preserving Electronic Mailing Lists as Scholarly Resources: The H-Net Archives Lisa M. Schmidt
SAR Enterprises Syed Ahmed Abdullah Alsubaiei Ramakrishna G.
Personal data protection in research projects
Cryptography and Network Security Chapter 1. Background  Information Security requirements have changed in recent times  traditionally provided by physical.
The world leader in serving science OMNIC DS & Thermo Security Administration 21 CFR Part 11 Tools for FT-IR and Raman Spectroscopy.
©2014 Cleo. All rights reserved. Company confidential. Managing Chaos: Andy Moir Director, Product Marketing 2 Data Movement in 2015.
Security Policy and Key Management Centrally Manage Encryption Keys - Oracle TDE, SQL Server TDE and Vormetric. Tina Stewart, Vice President.
Portal Content Management (PCM) & Portal Site Management (PSM)
Proactive Information Management and eDiscovery
Online password manager By: Anthony diveronica
Breaches by Merchant Type
ICT meeting Business needs
11/16/2018 © 2014 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks.
IIA District Conference Seminar Presenter David Cole, CPA, CISA, CRISC
EDRMS Rollout – Steps to Implementation
NATIONAL TRANSACTION CORPORATION
Introduction to the PACS Security
Presentation transcript:

1 © Copyright 2008 EMC Corporation. All rights reserved. EMC Documentum Trusted Content Services

2 © Copyright 2008 EMC Corporation. All rights reserved. EMC Documentum Trusted Content Services Risk Minimization Information security breaches exposing personal data, classified documents, credit card information, and financial documents can cost a company millions of dollars. Regulation Compliance Increased regulation around the capture, storage, and retention of information has increased the demands on IT departments to ensure companies are in compliance. EMC Documentum offers unparalleled protection for the most security-conscious organizations. Trusted Content Services extends the already robust security features of the content server with enhanced access controls and encryption. 2

3 © Copyright 2008 EMC Corporation. All rights reserved. EMC Documentum Trusted Content Services Encrypted File Stores Documentum products encrypt all data traffic. With Documentum Trusted Content Services (TCS), the content files can be encrypted as well. Electronic Signatures Documentum Trusted Content Services provides the capability to sign documents electronically. Logic-Based and Dynamic Access Controls The additional access controls in TCS give organizations the ability to define entitlements at a more granular level. Digital Shredding Trusted Content Services’ digital shredding irrevocably destroys content at an operating system level by overwriting the data on the storage device.

4 © Copyright 2008 EMC Corporation. All rights reserved. Data Encryption: Content and Communications  Encryption of content files –Algorithm used = 3DES-CBC, Key length = 192-bit (168-bit effective) –Selective by file store –Full-text search still enabled –Accessed by users and applications as if unencrypted  Benefits –Ensures content security even if OS security is compromised –Protects against “rogue” administrators –Secure backups –Secure storage media disposal Encrypted File Stores Documentum products encrypt all data traffic. With Documentum Trusted Content Services (TCS), the content files can be encrypted as well.

5 © Copyright 2008 EMC Corporation. All rights reserved. Digital Shredding  Permanently destroys file data as a result of issuing OS delete/unlink command  Shreds content on both file systems and content addressed storage (EMC Centera)  Supports record management applications  Number of overwrites is configurable (default is 3X) Digital Shredding Trusted Content Services’ digital shredding irrevocably destroys content at an operating system level by overwriting the data on the storage device.

6 © Copyright 2008 EMC Corporation. All rights reserved. Logic-Based and Dynamic Access Control TOP SECRET  Dynamic access based on variable parameters such as time, geographic location, and login connection  Multi-dimension groupings –“Top Secret” AND “U.S. Citizens” –“In U.S.” OR “in Japan”  Configurable default to highest or lowest access designation 6 Logic-Based and Dynamic Access Controls The additional access controls in TCS give organizations the ability to define entitlements at a more granular level.

7 © Copyright 2008 EMC Corporation. All rights reserved. Logic-Based Access Control Example M&A Project Sales OR Services Vice Presidents Operations Staff Executive VPs or Officers  Executive VPs or Officers  Not in Sales and not in Services  VPs who are also members of Operations Staff Invite all users who are:

8 © Copyright 2008 EMC Corporation. All rights reserved. Electronic Signatures  Approval signatures securely linked to document  Modification attempts invalidate signature  Display signature information when viewed: –Full name –The date and time of the signing –The justification for the signature  Define valid signatories for document types  Compliant with regulatory requirements such as FDA’s 21 CFR Part 11 Electronic Signatures Documentum Trusted Content Services provides the capability to sign documents electronically.