We think you have liked this presentation. If you wish to download it, please recommend it to your friends in any social system. Share buttons are a little bit lower. Thank you!
Presentation is loading. Please wait.
Published byTrevor Bryan
Modified over 5 years ago
1 © Copyright 2007 EMC Corporation. All rights reserved. EMC Documentum Information Rights Management EMC Content Management and Archiving
2 © Copyright 2007 EMC Corporation. All rights reserved. IRM Server Key and Policy Management Content is always encrypted The keys are always separated from the content The local key is destroyed after use Workflow Integrations Desktop Integration IRM Policy Server EMC Documentum eRoom EMC Documentum Repository File Share Content Owner + Policy + Policy
3 © Copyright 2007 EMC Corporation. All rights reserved. Partner Hacker Network IRM Policy Server Content Server EMC Documentum IRM Workflow Secure Data Sharing Corporate VPN Partner Network Internet Author Review
4 © Copyright 2007 EMC Corporation. All rights reserved. Industry Use Examples for IRM Manufacturing –Sharing of new product specifications, planning, R&D, and pricing documents Government –Share information on a need-to-know basis within intelligence community Healthcare –Communications with business associates –Control of PHI dissemination Financial and Legal Services –On-line mergers and acquisitions –Protect customer data –High value research circulation control –Secure distribution of bills of lading 4
5 © Copyright 2007 EMC Corporation. All rights reserved. Large Global Energy Supplier Requirements Protect highly valuable financial information shared as PDF and Office files Leverage existing SharePoint and Documentum systems wherever possible Prevent external access to documents that might be emailed or otherwise distributed outside of collaboration system or repository IRM Solution IRM policies were specified and mapped to existing corporate policies for information distribution. These policies govern which after-delivery controls (e.g. print, copy/paste, offline access rights) apply to which documents. Initially, confidential documents were protected using a manual batch process and uploaded to internal SharePoint sites Now, end users can manually add files to a Documentum cabinet or folder and have IRM policies applied automatically A single access control list (ACL) governs who can access a document A single retention policy governs expiration and deletion Customer Case Study
6 © Copyright 2007 EMC Corporation. All rights reserved. Global Energy Infrastructure & Construction Firm Requirements Prevent unauthorized access to project documents distributed via email Require multiple level of access and rights depending on group membership Must be easy to mechanical engineers and project managers to use IRM Solution Document owners protect documents directly from Adobe Acrobat and distributes through portal No access outside of current insider list Username watermark raises the bar on re-distribution of printed copies Customer Case Study
7 © Copyright 2007 EMC Corporation. All rights reserved. Global Shipping Firm Requirements Provide a web-based mechanism for authorized global customers to download and print Bills of Lading Prevent users from saving copies of files locally or printing additional copies IRM Solution PDF files generated from database queries IRM Server Management API protects PDF and applies the IRM policy to the file automatically without end-user intervention IRM Server Extension API reports on print operations; the permission to toggled in business database based on document state
8 © Copyright 2007 EMC Corporation. All rights reserved. Questions
2011 NetIS Presentation The Complete ePublishing Platform Designed for the 21 st Century.
Unified Communications Bill Palmer ADNET Technologies, Inc.
Compliance storyboard: Classifying & controlling content at the input device.
Copyright Hub Software Engineering Ltd 2010All rights reserved Hub Workflow Product Overview.
Rights Management Services (RMS) Paul Cullimore Graham Calladine Security Solutions Team, MCS, UK.
| Copyright© 2010 Microsoft Corporation Quick Start into Activating and Selling Office 365.
Enterprise Content Management Departmental Solutions Enterprisewide Document/Content Management at half the cost of competitive systems ImageSite is:
1 © Copyright 2013 EMC Corporation. All rights reserved. Online File Synchronization and Sharing for the Enterprise.
Using Autodesk® Vault for Collaboration Between Purchaser and Suppliers Driss Yammouri Senior Consultant / MFG / Autodesk Consulting.
Microsoft Confidential Solution Overview: Foxit Software Corporation’s PDF Security Suite.
ISecurity Complete Product Series For System i. About Raz-Lee Internationally renowned System i solutions provider Founded in 1983; 100% focused on System.
Persistent Protection Using E-DRM Technology Jason Fasoo 06/18/2008.
SOFTWARE PRESENTATION ODMS (OPEN SOURCE DOCUMENT MANAGEMENT SYSTEM)
Document Solutions Document Solutions Confidential Property of FileMark Corporation Document Solutions Document Solutions October 2009 Document Submission.
2005 Adobe Systems Incorporated. All Rights Reserved. 1 LiveCycle Assembler 7.2.
Microsoft ® Office Groove ® 2007 IW/Groove Microsoft Corporation.
1 of 4 This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. © 2007 Microsoft Corporation.
Microsoft Office Access 2007 A rich client for Windows SharePoint Services 3.0 Mark Bower Senior Consultant Microsoft UK
Live Meeting APIs Robert Devine Program Manager Microsoft Corporation.
| Copyright© 2010 Microsoft Corporation What’s New in Office New user interface Role based access Identity federation (eliminate sign-in client)
© 2021 SlidePlayer.com Inc. All rights reserved.