Upload
dean-hart
View
42
Download
0
Embed Size (px)
DESCRIPTION
EMC Documentum Information Rights Management. EMC Content Management and Archiving. IRM Policy Server. IRM Server Key and Policy Management. Desktop Integration. Content is always encrypted The keys are always separated from the content The local key is destroyed after use. - PowerPoint PPT Presentation
Citation preview
1© Copyright 2007 EMC Corporation. All rights reserved.
EMC Documentum Information Rights Management
EMC Content Management and Archiving
2© Copyright 2007 EMC Corporation. All rights reserved.
IRM Server Key and Policy Management
Content is always encrypted The keys are always separated from the
content The local key is destroyed after use
Workflow Integrations
Desktop Integration
IRM PolicyServer
EMC Documentum eRoom
EMC Documentum Repository
File Share Content Owner
+Policy
+Policy
3© Copyright 2007 EMC Corporation. All rights reserved.
Partner
Hacker
Network
IRM PolicyServer
ContentServer
EMC Documentum IRM WorkflowSecure Data Sharing
Corporate VPN
PartnerNetwork
Internet
Author
Review
4© Copyright 2007 EMC Corporation. All rights reserved.
Industry Use Examples for IRM
Manufacturing – Sharing of new product specifications,
planning, R&D, and pricing documents
Government – Share information on a need-to-know basis
within intelligence community
Healthcare– Communications with business associates– Control of PHI dissemination
Financial and Legal Services– On-line mergers and acquisitions– Protect customer data– High value research circulation control– Secure distribution of bills of lading
4
5© Copyright 2007 EMC Corporation. All rights reserved.
Large Global Energy Supplier
Requirements Protect highly valuable financial information shared as PDF and Office files Leverage existing SharePoint and Documentum systems wherever possible Prevent external access to documents that might be emailed or otherwise
distributed outside of collaboration system or repository
IRM Solution IRM policies were specified and mapped to existing corporate policies for
information distribution. These policies govern which after-delivery controls (e.g. print, copy/paste, offline access rights) apply to which documents.
Initially, confidential documents were protected using a manual batch process and uploaded to internal SharePoint sites
Now, end users can manually add files to a Documentum cabinet or folder and have IRM policies applied automatically
A single access control list (ACL) governs who can access a document A single retention policy governs expiration and deletion
Customer Case Study
6© Copyright 2007 EMC Corporation. All rights reserved.
Global Energy Infrastructure & Construction Firm
Requirements Prevent unauthorized access to project documents distributed via email Require multiple level of access and rights depending on group membership Must be easy to mechanical engineers and project managers to use
IRM Solution Document owners protect documents directly from Adobe Acrobat and
distributes through portal No access outside of current insider list Username watermark raises the bar on re-distribution of printed copies
Customer Case Study
7© Copyright 2007 EMC Corporation. All rights reserved.
Global Shipping Firm
Requirements Provide a web-based mechanism for authorized global customers to
download and print Bills of Lading Prevent users from saving copies of files locally or printing additional
copies
IRM Solution PDF files generated from database queries IRM Server Management API protects PDF and applies the IRM policy
to the file automatically without end-user intervention IRM Server Extension API reports on print operations; the permission
to toggled in business database based on document state
8© Copyright 2007 EMC Corporation. All rights reserved.
Questions