28
DRM to p0wn NSA in a few easy steps Dan Gheorghe, Software Engineer docTrackr.com

DefCamp 2013 - DRM To Pown NSA in Few Easy Steps

  • Upload
    defcamp

  • View
    283

  • Download
    0

Embed Size (px)

DESCRIPTION

 

Citation preview

Page 1: DefCamp 2013 - DRM To Pown NSA in Few Easy Steps

DRM to p0wn NSA in a few easy steps Dan Gheorghe, Software Engineer

docTrackr.com

Page 2: DefCamp 2013 - DRM To Pown NSA in Few Easy Steps

ARE YOU IN CONTROL OF YOUR DATA?

Page 3: DefCamp 2013 - DRM To Pown NSA in Few Easy Steps
Page 4: DefCamp 2013 - DRM To Pown NSA in Few Easy Steps
Page 5: DefCamp 2013 - DRM To Pown NSA in Few Easy Steps

Today’s Trend/Reality in the Cloud

Users Usage

Page 6: DefCamp 2013 - DRM To Pown NSA in Few Easy Steps

Email

Download Documents

SYNC WITH OTHER SYSTEMS

Page 7: DefCamp 2013 - DRM To Pown NSA in Few Easy Steps

DLP – an answer ?

CATEGORIES OF DLP •  NETWORK AKA DATA IN MOTION •  STORAGE AKA DATA AT REST •  ENDPOINT AKA DATA IN USE

Page 8: DefCamp 2013 - DRM To Pown NSA in Few Easy Steps

… NOT REALLY

1.  IT’S CUMBERSOME FOR END USERS

2. NOT DESIGNED FOR COLABORATION

3. COMPLEX ENTREPRISE-WIDE DEPLOYMENT

4. NOT 100% RELIABLE (FALSE POSITIVES)

Page 9: DefCamp 2013 - DRM To Pown NSA in Few Easy Steps

DLP IS TRANSMISSION CONTROL

NOT DESIGNED TO ALLOW SECURED DATA SHARING AND COLLABORATION WHILE PREVENTING DOCUMENT LEAKAGE

WHAT HAPPENS BEYOND ENTREPRISE BOUNDARIES?

Page 10: DefCamp 2013 - DRM To Pown NSA in Few Easy Steps

Passwords ?

•  Password security which uses RC4 128bit encryption or 128-bit AES Adobe 8 Generation technology

•  Public Key Infrastructure (PKI) encryption

Page 11: DefCamp 2013 - DRM To Pown NSA in Few Easy Steps

WE NEED A NEW APPROACH

“How can we assure that only authorized people read classified data?”

“How can we assure the recipients do not share unauthorized data ”

“How can we guarantee that data is not manipulated, unintentionally or fraudulently?”

Page 12: DefCamp 2013 - DRM To Pown NSA in Few Easy Steps

DATA CENTRIC PROTECTION

If we cannot protect the data, why not let the data protect

itself?

Page 13: DefCamp 2013 - DRM To Pown NSA in Few Easy Steps

Information Rights Management

Security Control

Page 14: DefCamp 2013 - DRM To Pown NSA in Few Easy Steps

as a Service

Information Rights Management

Page 15: DefCamp 2013 - DRM To Pown NSA in Few Easy Steps

1/ You create your document

as usual"

2/ Send it through a protection engine"

3/ The server monitors who can access the file and how."

And in 3 clicks you’ve got a doc ready to share securely!"

How does it work?

Page 16: DefCamp 2013 - DRM To Pown NSA in Few Easy Steps

Once your recipient gets it"

Page 17: DefCamp 2013 - DRM To Pown NSA in Few Easy Steps

Adobe PDF Reader"

Microsoft Office"

Once your recipient gets it"

He opens it with his or her

usual tools"

Page 18: DefCamp 2013 - DRM To Pown NSA in Few Easy Steps

Adobe PDF Reader"

Microsoft Office"

1/ Checks if it’s the right version"

Page 19: DefCamp 2013 - DRM To Pown NSA in Few Easy Steps

Adobe PDF Reader"

Microsoft Office"

1/ Checks if it’s the right version"

2/ If the recipient has permission"

Page 20: DefCamp 2013 - DRM To Pown NSA in Few Easy Steps

Adobe PDF Reader"

Microsoft Office"

1/ Checks if it’s the right version"

2/ If the recipient has permission"

3/ And if yes, what he can do."

‣ Revocation ‣ Cut/Paste ‣ Edit ‣ Print ‣ ..."

Page 21: DefCamp 2013 - DRM To Pown NSA in Few Easy Steps

Adobe PDF Reader"

Microsoft Office"

1/ Checks if it’s the right version"

2/ If the recipient has permission"

3/ And if yes, what he can do."

‣ Revocation ‣ Cut/Paste ‣ Edit ‣ Print ‣ ..."

Page 22: DefCamp 2013 - DRM To Pown NSA in Few Easy Steps

Adobe PDF Reader"

Microsoft Office"

1/ Checks if it’s the right version"

2/ If the recipient has permission"

3/ And if yes, what he can do."

‣ Revocation ‣ Cut/Paste ‣ Edit ‣ Print ‣ ..."

Page 23: DefCamp 2013 - DRM To Pown NSA in Few Easy Steps

docTrackr A new approach to IRM

Page 24: DefCamp 2013 - DRM To Pown NSA in Few Easy Steps

No install Bridge on-premise

privacy & cloud needs

Security Adobe & Microsoft based encryption

Automatic Mirroring"

of changes

Analytics Extended audit trail

& files statistics

docTrackr

+"

Page 25: DefCamp 2013 - DRM To Pown NSA in Few Easy Steps
Page 26: DefCamp 2013 - DRM To Pown NSA in Few Easy Steps
Page 27: DefCamp 2013 - DRM To Pown NSA in Few Easy Steps

docTrackr for Gmail

Secure your document attachments on the fly

http://bit.ly/1bJceQp