Presentation is loading. Please wait.

Presentation is loading. Please wait.

Azure Rights Management

Similar presentations


Presentation on theme: "Azure Rights Management"— Presentation transcript:

1 Azure Rights Management
10/11/ :33 AM Azure Rights Management Name Date © 2014 Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

2 What’s driving change? IT Users Devices Apps Data Employees Customers
Business partners

3 Why do you seek to protect information?
10/11/ :33 AM Why do you seek to protect information? Reduce leakage of data shared with others (B2B collaboration) 96% Partitioning of sensitive data from unauthorized users 94% Prevent malicious employees from leaking of secrets 89% Survey conducted with: 313 organizations 17,000,000 users 54,000 users on average Meet compliance requirements 87% © 2013 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

4 10/11/2017 Other concerns… My existing DLP protection is too reactive. Can data be ‘born encrypted’? IT must ‘reason over data’ to stay compliant, yet we need our sensitive data to be encrypted. How do I prepare for a fading perimeter? We want small steps to protect data now! We’re don’t want to slowly implement the ‘perfect grand solution’. Data privacy is mandated! Peer-to-peer federation is not practical or scalable. How do we establish ‘trust’? © 2014 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

5 Secured data Company external
10/11/ :33 AM Another New Challenge Secured data Company external You have a perimeter Managed devices Company internal You have managed devices within a broader perimeter Your business requires you to share sensitive data outside of your control for B2B/B2C Your perimeter Company internal © 2013 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

6 10/11/ :33 AM Our promise <you> need to share <file types> between yourself and partners, suppliers, dealers, representatives, etc. Persistent protection Storage independent solution Permit all companies to authenticate Authorization policies are enforced Powerful logging for reporting End user use/abuse tracking Ability to remote kill documents Enable IT to reason over data Tracking and Compliance Works across all platforms Free content consumption Consistent user experience Integrated into common apps/services Ease of Use © 2013 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

7 Complementary Microsoft offers
10/11/ :33 AM Complementary Microsoft offers Encryption of data at rest, in known data stores Windows Bitlocker and ‘Bitlocker for files’ (aka EDP) in Windows 10 Azure Key Vault protected workloads such as SQL, VMs, VHDs, HD Insights, etc. Office 365 encryption at rest Protecting access to data Office Lockbox coupled with strong data center compliance (Azure & Office 365) Encryption of travelling data, with ‘use rights’ (policy) Azure and AD Rights Management (RMS) Intune MDM/MAM protection of data on mobile devices Office Data Loss Prevention (DLP) and Adallom (Cloud Access Security Broker) © 2013 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

8 10/11/ :33 AM Demos © 2013 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

9 Demos Some of: Internal sharing of sensitive information
10/11/ :33 AM Demos Some of: Internal sharing of sensitive information B2B sharing of sensitive information B2C sharing of sensitive information Document Tracking and Revocation Exchange and SharePoint DLP Protection on download; location based protection Specialized use cases Protection of document leaving SAP CAD – Siemens JT2GO and AutoDesk AutoCAD Redaction Microsoft roadmap sharing portal © 2013 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

10 Vision: Azure Rights Management
Build 2012 10/11/2017 Vision: Azure Rights Management Policy enforcement Document revocation Document tracking Access control Encryption Classification and labeling LOB apps Files Share internally Share externally (B2C) Share externally (B2B) On any device In any part of the world US China EU Germany APAC

11 10/11/ :33 AM Gartner Study The Role of EDRM in Data-Centric Security Gartner #G In this June 2015 report Mario Boer says: "EDRM is a mature technology for enterprise wide persistent protection of data". Enterprise digital rights management has long been in Gartner's famed 'Trough of Disillusionment'. He offered other points in the 'Key Finding' section that made us smile. Be sure to look them up! "A broader data-centric security strategy requires a combination of EDRM with other technologies such as classification, DLP and data-­centric audit and protection.“ He’s right… and Microsoft is active on all of these. "Many vendors offer a cloud solution to replace on­-premises servers. This means cloud and the DMZ are not that different for EDRM offers. Moreover, the server does not see the body of the document, which makes cloud EDRM deployments interesting for even cloud-reluctant organizations." We strongly support the view that a cloud EDRM offer makes this much better, even if in the cloud. Disclaimer: Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner's research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose."  © 2013 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

12 Frost and Sullivan study
10/11/ :33 AM Frost and Sullivan study © 2013 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

13 KuppingerCole study 10/11/2017 10:33 AM
© 2013 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

14 10/11/ :33 AM Customer Story © 2013 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

15 Secure company-wide collaboration Unified data protection campaign
Increased awareness and accountability for data loss Security needs aligned with business goals The average cost of a security breach for a large company, according to independent researchers at the Ponemon Institute, is $3.8 million. And, while many data breaches are due to cyberattacks, experts agree that many more are the result of human error, otherwise known as “oops” moments that happen when employees inadvertently leak sensitive business data. With the right security information and data loss prevention protocols in place, nearly all of these kinds of breaches are avoidable. When a breach does take place, it effects thousands of documents. But businesses can’t afford to lock up sensitive information at the expense of collaboration and growth. This is the challenge faced by one large consumer packaged goods with more than 75,000 employees working across six different divisions around the world. As a complex global organization with offices on every continent, it has invested millions of dollars in state-of-the-art manufacturing equipment and a top-notch global workforce. Still, data is one of its most valuable assets. It needs to strike an increasingly delicate balance between protection and productivity. This large enterprise wants to protect all of its business data—whether personal identification customer data, proprietary information, or intellectual property—in a holistic way across all of the business divisions. By first rolling out Active Directory Rights Management Services to its top executives, including the board of directors, vice presidents, and other business decision makers across divisions—it put into place both very clear protocols and hard controls to protect the “crown jewels” of business information. The executives can now securely access and transmit the confidential information they need to both internal across traditional data silos and external third-party vendors. The process of deploying AD RMS globally to all 50,000 employees across all segments of the enterprise has spurred the company to create universal security policies and procedures that influence end-user behavior in data classification and protection processes beyond password protection and file zipping. With hopes of moving to Azure RMS in the future, the company is actively aligning security protocols to the needs of the business. Tightening security is a top priority for many companies, but clamping down on productivity is not. And collaboration is more important than ever. By deploying Active Directory RMS and integrating data protection policies and protocols throughout the organization, this company can both protect and make accessible the sensitive data employees need. As a part of its data protection campaign, this global company is redefining information security so that it is no longer merely an IT problem but a critical part of business strategy and an enabler of collaboration and growth. Benefits include: Enables employees to edit and transfer highly confidential business information Identifies, monitors and reports metrics pertaining to sensitive data Protects s against unauthorized access Keeps information safe online or offline by protecting the file itself Increases awareness and educates employees on enterprise-wide data loss prevention policies Informs and reminds end-users about policies as they are authoring or sharing content so they can make sound decisions Helps prevent violation of data protection policies Increases security without inhibiting productivity Products Microsoft Windows Active Directory Rights Management Services Data Loss Prevention (in Microsoft Office 365?) The world has changed. We need tools to create a secure environment, but we also need to facilitate collaboration, growth, and the appropriate relationships that drive business forward. We are putting security and IT on the forefront as an enabler and a right-hand man to the business. Information Security Services Area Leader Global consumer packaged goods company

16 Increasing data security, enterprise-wide collaboration, and productivity
CHALLENGE SOLUTION BENEFITS A global consumer packaged goods company with 75,000 employees wanted to protect its business data, including personal identification customer data, proprietary information, and intellectual property, from the possibility of cyberattack and the avoidable “oops” moment when an employee inadvertently breaches security. To allow employees to collaborate internally across data silos and externally with third- party vendors, it needed to align security protocols to the business and influence end-user behavior in data classification and protection processes. The company began using Active Directory Rights Management Services to allow its top executives to securely create, share, and store confidential business information. It is actively looking to move to Azure RMS to be able to use some of the advanced capabilities. Employees will be able to securely access and transmit sensitive business information to both internal and external colleagues, remaining productive while they keep valuable business data safe. As security protocols align with business needs, IT facilitates enterprise-wide collaboration in support of business goals. Increases security without inhibiting productivity Protects s against unauthorized access Keeps information safe on or offline by protecting the file itself Informs and reminds end users about policies as they are authoring or sharing content so they can make sound decisions Increases awareness and educates employees on enterprise-wide data loss prevention policies Aligns security needs with business goals The average cost of a security breach for a large company, according to independent researchers at the Ponemon Institute, is $3.8 million. And, while many data breaches are due to cyberattacks, experts agree that many more are the result of human error, otherwise known as “oops” moments that happen when employees inadvertently leak sensitive business data. With the right security information and data loss prevention protocols in place, nearly all of these kinds of breaches are avoidable. When a breach does take place, it effects thousands of documents. But businesses can’t afford to lock up sensitive information at the expense of collaboration and growth. This is the challenge faced by one large consumer packaged goods with more than 75,000 employees working across six different divisions around the world. As a complex global organization with offices on every continent, it has invested millions of dollars in state-of-the-art manufacturing equipment and a top-notch global workforce. Still, data is one of its most valuable assets. It needs to strike an increasingly delicate balance between protection and productivity. This large enterprise wants to protect all of its business data—whether personal identification customer data, proprietary information, or intellectual property—in a holistic way across all of the business divisions. By first rolling out Active Directory Rights Management Services to its top executives, including the board of directors, vice presidents, and other business decision makers across divisions—it put into place both very clear protocols and hard controls to protect the “crown jewels” of business information. The executives can now securely access and transmit the confidential information they need to both internal across traditional data silos and external third-party vendors. The process of deploying AD RMS globally to all 50,000 employees across all segments of the enterprise has spurred the company to create universal security policies and procedures that influence end-user behavior in data classification and protection processes beyond password protection and file zipping. With hopes of moving to Azure RMS in the future, the company is actively aligning security protocols to the needs of the business. Tightening security is a top priority for many companies, but clamping down on productivity is not. And collaboration is more important than ever. By deploying Active Directory RMS and integrating data protection policies and protocols throughout the organization, this company can both protect and make accessible the sensitive data employees need. As a part of its data protection campaign, this global company is redefining information security so that it is no longer merely an IT problem but a critical part of business strategy and an enabler of collaboration and growth. Benefits include: Enables employees to edit and transfer highly confidential business information Identifies, monitors and reports metrics pertaining to sensitive data Protects s against unauthorized access Keeps information safe online or offline by protecting the file itself Increases awareness and educates employees on enterprise-wide data loss prevention policies Informs and reminds end-users about policies as they are authoring or sharing content so they can make sound decisions Helps prevent violation of data protection policies Increases security without inhibiting productivity Products Microsoft Windows Active Directory Rights Management Services Data Loss Prevention (in Microsoft Office 365?) The world has changed. We need tools to create a secure environment, but we also need to facilitate collaboration, growth, and the appropriate relationships that drive business forward. We are putting security and IT on the forefront as an enabler and a right-hand man to the business. Information Security Service Area Leader Global Consumer Packaged Goods Company

17 10/11/ :33 AM Architecture © 2013 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

18 10/11/2017 Rights management 101 Usage rights and symmetric key stored in file as ‘license’ License protected by customer-owned RSA key Protect Use Rights + Unprotect Water Sugar Brown #16 Water Sugar Brown #16 ()&(*7812(*: Each file is protected by a unique AES symmetric Secret cola formula © 2014 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

19 Rights management 101 Local processing on PCs/devices SDK
10/11/2017 Rights management 101 Local processing on PCs/devices Use Rights + Azure RMS never sees the file content, only the license. ()&(*7812(*: Use Rights + Apps protected with RMS enforce rights SDK Apps use the SDK to communicate with the RMS service/servers File content is never sent to the RMS server/service. Rights Management Active Directory Key Vault © 2014 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

20 Topology optional Data protection for organizations at different stages of cloud adoption Ensures security because sensitive data is never sent to the RMS server Integration with on-premises assets with minimal effort Azure AD Azure Rights Management Azure Key Management Authentication & collaboration BYO Key Authorization requests go to a federation service RMS connector AAD Connect ADFS

21 Use Azure AD as the trusted fabric
10/11/ :33 AM Use Azure AD as the trusted fabric Azure Active Directory On-premises organizations doing full sync On-premises organizations doing partial sync Organizations completely in cloud Organizations created through adhoc sign up ADFS …and all of these organizations can interact with each other. © 2013 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

22 Minimum sync profile for Azure RMS
10/11/ :33 AM Minimum sync profile for Azure RMS Only PII data is first name, last name, and address Cn (common name) jdoe displayName John Doe Mail proxyAddresses userPrincipalName accountEnabled True objectSID (sync ID) E2 DB … CF A pwdLastSet Z sourceAnchor (for Licensing) NyWoidInKk2S4xtxK+GsbQ== usageLocation (for Licensing) DE © 2013 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

23 10/11/ :33 AM Take action now Every day you share sensitive items with no form of protection. Act now to protect your information — even if only with small steps. Defend your information against internal leakages and outside cyber-attacks. Protect information with identity-based viewing privileges. © 2013 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

24 Step by step: 1,2,3… Start Small; Learn Quickly You’re not alone!
10/11/ :33 AM Step by step: 1,2,3… Start Small; Learn Quickly Don’t wait, you’re already exposed. It’s only a matter of time before your day in the news (too). You’re not alone! Find resources in our TechNet, Blogs, and Yammer Forum. Hire a professional near you MCS, Oxford Computing, Synergy, Expert Circle, OneVinn, etc… Next Steps RMS included in popular Office365 business-focused SKUs RMS available as a premium offer: document tracking, revocation, … © 2013 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

25 Examples of step-wise approaches
Start with IT-controlled, DLP-performed protection Users experience RMS protected data but don’t have to initiate the protection e.g.: DLP in Exchange Online, in Office apps*, and SharePoint online** e.g.: FCI protection of data on a file share, MyDocs folder, or Work Folder. Teach the critical few user initiating B2B to ‘share protected’ A small percentage of users do most of the sensitive B2B sharing e.g: Automotive dealership price lists / sales incentives e.g: Vendor bid manager e.g: SAP reporting Enable broader RMS where users initiate themselves Let users opt-in initially. Tracking, remote kill, Do-not-forward are strong benefits © 2013 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

26 10/11/ :33 AM Top RMS Use Cases Control sensitive flow, internally, across all devices Share an Office file with external users Board of Directors communications Document use tracking, abuse detection, and revocation Business-to-Customer secure (and replies) Control the download of files stored in SharePoint Securing reports generated from SAP Protecting files on a user’s ‘Documents’ folder, file share Share CAD drawings, Redacted PDFs, and analyst reports. © 2013 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

27 We’re on a journey… Ready Now Up Next
10/11/ :33 AM We’re on a journey… Ready Now Windows Word, Excel, PowerPoint, Outlook 2010/2013/ Consumption, Protection Mac Word, Excel, PowerPoint, Outlook Consumption, Protection Windows Universal Word, Excel, PowerPoint, Outlook – Consumption only Office 365 Web Word, Excel, PowerPoint, Outlook - Consumption, Protection iOS Outlook – Consumption and Reply iOS Word, Excel, PowerPoint – Consumption and Protection Android Outlook – Consumption and Reply Up Next iOS Outlook – Protection, then native SDK usage Android Word, Excel, PowerPoint, Outlook – Consumption, then Protection Exchange Online – addition of HSM support via Azure RMS ‘BYOK’ SharePoint Online – improved “Maintain permission on download” behavior © 2013 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

28 Vision: Azure Rights Management
Build 2012 10/11/2017 Vision: Azure Rights Management Policy enforcement Document revocation Document tracking Access control Encryption Classification and labeling LOB apps Files Share internally Share externally (B2C) Share externally (B2B) On any device In any part of the world US China EU Germany APAC

29 Next steps Follow @ https://twitter.com/TheRMSGuy
10/11/ :33 AM Next steps Learn For questions IT Pro Get Sign © 2013 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

30 10/11/ :33 AM © 2015 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION. © 2013 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

31 Resources – RMS Azure RMS Quick activation, B2B trust –enabled
10/11/ :33 AM Resources – RMS Azure RMS Quick activation, B2B trust –enabled RMS App RMS task assistant and viewer on all platforms RMS App (Mobile) RMS task assistant and viewer on all platforms Doc Tracking Permits viewing file usage / remote revocation Templates Global and departmental policies Onboarding Easier pilots, partial deployments Migration Toolkit AD RMS to Azure RMS phased migration BYOK Bring your own HSM-backed key to the cloud Cmdlets Power Shell commands for task automation RMS SDK Enable your own applications (LOB) © 2013 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

32 Resources – Office and Windows
10/11/ :33 AM Resources – Office and Windows Apps (Word, etc) Word, Excel, PowerPoint on all platforms. Outlook / OWA Outlook on all platforms; Web Exchange Mail service with an RMS-aware pipeline SharePoint Doc Library Office DLP Office 365 Data Loss Prevention OME Office Message Encryption enables B2C EDP Windows10 Enterprise Data Protection w/RMS File Classification DLP over file servers, My Docs, & Work Folder OneDrive Protection of data on OneDrive © 2013 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

33 Resources – Partner ISVs
10/11/ :33 AM Resources – Partner ISVs Secude Protection of reports leaving SAP Secure Island Classification and RMS ‘enhancer’ Titus Classification and RMS ‘enhancer’ Watchful Software Classification and RMS ‘enhancer’ Foxit PDF Reader with built-in RMS Foxit Redaction Redacted PDF with ‘view all content ’ mode Gigatrust Adobe Reader PDF extension for RMS © 2013 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.


Download ppt "Azure Rights Management"

Similar presentations


Ads by Google