Upload
doctrackr
View
128
Download
0
Embed Size (px)
DESCRIPTION
DefCamp is one of the most important conferences on hacking & information security in South-East Europe. DefCamp takes place every year November 29-30th docTrackr was excited to present at DefCamp this year on a timely subject: how to keep the NSA off your back, and out of your data. Have a look at our slides for the event. You might get some ideas for protecting your own data If you'd like to learn more about docTrackr, you can head over to www.docTrackr.com and try our free document security tools for yourself!
Citation preview
DRM to p0wn NSA in a few easy steps
Dan Gheorghe, Software EngineerdocTrackr.com
ARE YOU IN CONTROL OF YOUR DATA?
ARE YOU IN CONTROL OF YOUR DATA?
Today’s Trend/Reality in the Cloud
UsersUsag
e
Download Documents
SYNC WITH OTHER SYSTEMS
DLP – an answer ?
CATEGORIES OF DLP
• NETWORK AKA DATA IN MOTION
• STORAGE AKA DATA AT REST
• ENDPOINT AKA DATA IN USE
… NOT REALLY
1. IT’S CUMBERSOME FOR END USERS
2. NOT DESIGNED FOR COLLABORATION
3. COMPLEX ENTERPRISE-WIDE DEPLOYMENT
4. NOT 100% RELIABLE (FALSE POSITIVES)
DLP IS TRANSMISSION CONTROL
NOT DESIGNED TO ALLOW SECURE DATA SHARING AND COLLABORATION WHILE PREVENTING
DOCUMENT LEAKAGE
WHAT HAPPENS BEYOND ENTREPRISE BOUNDARIES?
Passwords ?
•Password security which uses RC4 128bit encryption or 128-bit AES Adobe 8 Generation technology•Public Key Infrastructure (PKI) encryption
WE NEED A NEW APPROACH
“How can we assure that only authorized people read classified data?”
“How can we assure the recipients do not share unauthorized data”
“How can we guarantee that data is not manipulated, unintentionally or fraudulently?”
DATA CENTRIC PROTECTION
If we cannot protect the data, why not let the data protect itself?
Information RightsInformation RightsManagement Management
Security
Control
as aas aServiceService
Information RightsInformation RightsManagement Management
1/ You create your document as usual
2/ Send it through a protection
engine
3/ The server monitors who can access the file and how.
And in 3 clicks you’ve got a doc ready to share securely!
How does it work?
Once your recipient gets it
Adobe PDF
Reader
MicrosoftOffice
Once your recipient gets it
He opens it with his or her usual
tools
Adobe PDF
Reader
MicrosoftOffice
1/ Checks if it’s the right version
Adobe PDF
Reader
MicrosoftOffice
1/ Checks if it’s the right version2/ If the recipient has permission
Adobe PDF
Reader
MicrosoftOffice
1/ Checks if it’s the right version2/ If the recipient has permission3/ And if yes, what he can do.
‣Revocation‣Cut/Paste‣Edit‣Print‣...
Adobe PDF
Reader
MicrosoftOffice
1/ Checks if it’s the right version2/ If the recipient has permission3/ And if yes, what he can do.
‣Revocation‣Cut/Paste‣Edit‣Print‣...
Adobe PDF
Reader
MicrosoftOffice
1/ Checks if it’s the right version2/ If the recipient has permission3/ And if yes, what he can do.
‣Revocation‣Cut/Paste‣Edit‣Print‣...
docTrackrA new approach to IRM
No installBridge on-premise
privacy & cloud needs
SecurityAdobe & Microsoftbased encryption
Automatic
Mirroringof changes
Analytics Extended audit
trail & files statistics
docTrackr+
docTrackr for Gmail
Secure your document attachments on the fly
http://bit.ly/1bJceQp
[email protected]@doctrackr.com