Presentation is loading. Please wait.

Presentation is loading. Please wait.

Key learnings from our customers Data privacy is important and is often mandated Regulatory requirements are on the rise IT must ‘reason over data’

Similar presentations


Presentation on theme: "Key learnings from our customers Data privacy is important and is often mandated Regulatory requirements are on the rise IT must ‘reason over data’"— Presentation transcript:

1

2

3

4 Key learnings from our customers Data privacy is important and is often mandated Regulatory requirements are on the rise IT must ‘reason over data’ as they do high value services Point to point encryption fails them today Peer to Peer federation is not practical or scalable There has to be a better way The perimeter is fading… Mobile workforces, BYOD, outsourcing, virtual orgs Many models of data protection polices are more reactive We need data to be born encrypted and to maintain a persistent protection Waiting for the “ultimate data protection solution” is tempting … yet data is leaking now

5

6

7 Secret Cola Formula Water HFCS Brown #16 Secret Cola Formula Water HFCS Brown #16 #!@#!#!@#! ()&)(*&)(@#! Use Rights + ProtectUnprotect Rights Management 101 Usage rights + symmetric key stored in file as ‘license’ License protected by customer owned RSA key File is protected by its own, unique AES symmetric key.

8 PC/DEVICE LOCAL PROCESSING #!@#!#!@#! ()&)(*&)(@#! Use Rights + Rights Management 101 File content is never sent to the RMS server/service. RMS-enlightened apps enforce rights Apps use the SDK to communicate with the RMS service/servers File content is never sent to the RMS server/service. Use Rights +

9

10 Activate RMS in Office 365 admin console

11 Office apps integrates with RMS

12 Office 365 (Exchange) integrates with RMS Powerful rules-based policies can enforce the automatic application of RMS to email and documents that include sensitive information. Protect SharePoint document libraries with on- exit protection of documents Enforce Data Loss Protection policies in e-mail with content scanning including attachments

13 Office 365 (Exchange) integrates with RMS A simple yet powerful rules generation experience with pre-canned templates makes it easy to quickly implement and provision data protection policies

14 Office 365 (SharePoint) integrates with RMS

15

16

17 Traditional Collaboration via P2P Trust

18 Using Azure AD as the Trust Fabric

19 Cn (common name)jdoe displayNameJohn Doe Mailjohn.doe@contoso.com proxyAddressesSMTP:john.doe@contoso.com userPrincipalNamejohn.doe@contoso.com accountEnabledTrue objectSID (sync ID) 01 05 00 00 00 00 00 05 15 00 00 00 E2 DB 08 EA EE 82 60 CC 4F CF A1 29 71 04 00 00 pwdLastSet20141013171110.0Z sourceAnchor (for Licensing)NyWoidInKk2S4xtxK+GsbQ== usageLocation (for Licensing)DE

20

21 Overview: Cloud Ready, Accepting, & Reluctant Azure RMS topologies Available Now CY16+ Available Now Limited O365 Integration Sync only 3 PII properties

22

23 Brad uses Share Protected

24 The document is sent with instant revocation

25 Bob receives an email with the document

26 Bob opens the document

27 Brad wants to track the document

28 Looks like Bob shared the document with Mary, but she couldn’t open it. Brad sends the document to Mary himself. Brad wants to track a document he sends to his staff Brad reaches the Document Tracking site

29 29 Brad tracks a document he sends to his staff

30 Summary View

31 31 Timeline View

32 32 Map View

33 33 Brad wants to revoke the document

34 Microsoft Confidential - EU RMS User Group / Oct 2014 34

35

36

37

38 Brad picks up a file for redaction

39 Marks the relevant text for Redaction

40 Chooses the right template

41 Saves the file as a PDF file, and sends it.

42 John’s view (redacted copy)

43 Kayla’s view (after authentication)

44

45

46 http://www.microsoft.com/enterprise/industry/manufacturing-and-resources/discrete-manufacturing/articles/jt2go-for-windows-8-facilities-mobility-processes-for-leading-enterprises.aspx

47

48

49

50

51 INTRODUCING Enterprise Data Protection A DIFFERENT APPROACH Corporate vs personal data identifiable wherever it rests on the device Protects data at rest, and wherever it rests or may roam to Seamless integration into the platform, No mode switching and use any app Prevents unauthorized apps from accessing business data IT has fully control of keys and data and can remote wipe data on demand Common experience across all Windows devices with cross platform support

52 Roam and share Enterprise data

53

54 For more information visit: microsoft.com/rms For latest updates follow on Twitter: @thermsguy


Download ppt "Key learnings from our customers Data privacy is important and is often mandated Regulatory requirements are on the rise IT must ‘reason over data’"

Similar presentations


Ads by Google