Oracle Information Rights Management 11g Deborah Assayag [email_address]
Oracle Security Inside Out Oracle Confidential Information Rights Management Encryption and Masking Privileged User Controls Multi-Factor Authorization Activity Monitoring and Audit Secure Configuration Identity Management Database Security User Provisioning  Role Management Entitlements Management  Risk-Based Access Control  Virtual Directories Document-level Access Control All copies, regardless of location (even beyond the firewall) Auditing and Revocation Databases Applications Content Infrastructure Information
Risks of not controlling sensitive data High costs when losing control of… Financial documents Mergers & acquisition information Intellectual property Personally identifiable information Reduced share price due to lack of market confidence Regulatory fines due to non-compliance High legal expenses Compensation costs Impact to company brand Reduced competitive advantage
Examples
How does the loss happen and by who? Over 70% of data loss from lost devices and negligence Only 12% from malicious activity Only 18% of loss happens internally Increasing data loss from partner collaboration The Business Impact of Data Breach . Ponemon Institute LLC. May 15, 2007 Causes of security breaches Trends in Data Breach Sources 2008 Data Breach Investigations Report . Verizon Business. June 10, 2008
You have secured the perimeters… … but digital information is no respecter of perimeters! SharePoint Email File system Content Management Intranet/ Extranet
Which perimeter are we talking about? Many business processes involve external parties SharePoint Email File system Content Management Intranet/ Extranet
Typical methods for securing desktops Encrypt disk Prevent use of  external devices Monitor information flow (DLP) OS access control Encrypt content (PGP) Prevent use of  external services Buying all these solutions is expensive What about partners, customers, suppliers? Massively restrict end users ability to work Protect the content instead of location!
Security – Usability - Manageability An enterprise-class solution must balance all three aspects Secure Usable Manageable
Imagine if you could… Control  content access  beyond your network? Prove  regulatory controls  are in place? Audit  every single access to secured content? Revoke access  even after delivery, to every single copied ever made? Restrict  print, copy, view formulae even enforce change tracking? Easily deploy and manage a solution
The Solution:  Information Rights Management Persistent protection, control and tracking of… What Single documents or groups of documents Who Single people or groups of people When Flexible start and stop times, revoke after delivery Where Single device or roaming across internet, on or offline How Open, Print, Edit, Annotate, Interact, Reply, Pause…
Oracle Information Rights Management Securing all copies of your sensitive information Everywhere IRM-encrypted content is stored, transmitted or used NO ACCESS FOR UNAUTHORIZED USERS  Transparent, revocable access for authorized users Centralized policy and auditing for widely distributed content Content security beyond the database, application and firewall ECM Email File systems Intranet/ extranet Databases Oracle IRM Server Enterprise perimeters Customer Partner Supplier
With Oracle Information Rights Mgmt Flexible & comprehensive information protection Oracle IRM Server Oracle IRM Server Application Export Saved in Content Management Secured from the Desktop
Sealed documents & emails Sealing documents and emails protects them wherever they go A central server manages rules - even for copies of documents that leave your network The central server audits usage – even for copies of documents that leave your network The rules apply even when users are offline and the server is unreachable Local secure cache refreshes automatically upon network connection
Benefits  Secure and track information beyond the repository Encryption places an access-controlled perimeter around the information itself ‏ Authorized Access, Audited, Revokable Consistent security: one “virtual” perimeter to manage Control and monitoring does not stop at the firewall Storage Area Network Email Web Collaborative Workspace Content Management Oracle IRM Server
<Insert Picture Here> Oracle  Information Rights Management DEMO
Content Author Seals Content Could be… Intellectual property, research, supplier communications,  manuals, BI reports… Content Author Chooses Content Classification Confidential Highly Restricted  (Board, Legal, M&A, Project, etc.) Confidential Restricted Confidential Internal Public
This User Doesn’t Have Rights to View Even if stored on a local file system or external drive Access can be revoked at any time
This User Only Has Read Access No printing, editing or screen captures… User can view document in MS Word, but take screenshot and paste…. Partner
Oracle Information Rights Management Enterprise-class security within & beyond your firewall Different users have  different access  to a single, secured document
Why customers choose Oracle IRM Oracle Information Rights Management reduces  Costs  and delivers the right balance of  Security ,  Usability , and  Manageability Reduce Costs Avoid expensive legal costs, regulatory fines Protect company brand and market share price Increase Security Documents and emails remain secure regardless of location Usage is audited and access can always be revoked Maintain Usability As easy to use as unprotected documents and emails Mature product supports existing document workflows Overall Manageability Intuitive, policy-based control at enterprise scale Rapidly deployable, out-of-the-box packages for point solutions
Headline Oracle IRM Differentiators Offline use Oracle IRM synchronization gives seamless offline working Microsoft does not allow revocation Adobe & EMC require offline leases Search No competitor has iFilters or server-side search APIs Policy-driven & manageable Oracle IRM is classification-based Microsoft burns ACLs into the document Adobe & EMC require integration with another product at scale  Format support Platforms, formats, versions
Oracle IRM 11g Release Highlights Broader Enterprise Reach Built on Fusion Middleware and Java EE Broad platform certifications Standard 27 Oracle languages SSO authentication: OAM, Windows auth, Basic auth to LDAP Extensible, First-Class Security Extensible classification model for application integrations FIPS 140-2 certification Hardware Security Module for key storage Usability and Templates New Web-based management console Best practice rights model: global roles and templates
Oracle IRM + ECM Suite Out of the box integration with Oracle  Universal Content Management Automatically ensure managed documents are protected – wherever it’s shared and used IRM extends key features of content management  “beyond the repository” Security – share information with more confidence  (that it will be secure outside the repository)  Auditing – invaluable business intelligence as you track all remote access to information Version management – revoke obsolete versions and route users to current versions Records management – delete decryption keys to dispose all copies of records
Oracle Information Rights Management Customer Success
Use case: Renault F1 Renault F1 sought to protect its technological specifications against competitive espionage.  Oracle IRM is delivering:   Secure access to documents for partners, suppliers and manufacturers The ability to revoke users’ rights Remote access to data for track-side technicians Centrally managed access rights across  the globe All applications directly store files within  the central repository
Case Study : Beckman Coulter Industry:  Life Sciences Annual revenue:  US$2.76 billion  Employees:  10,000  Key benefits:  Bespoke content management and portal integrations Enabled the company to connect the sales force Prevented redistribution of valuable information  Eliminated the need to maintain similar data  Confidence that information is only provided to intended recipients  Ability to revoke access to incorrect or out-of-date documents
Basic IRM Deployment Architecture IRM Server WebLogic External User DMZ (or Intranet) Internet / External Networks Corporate Network F I R E W A L L F I R E W A L L Load balancer Eg OHS F I R E W A L L Web Services LDAP Server  Database Server
Classification-based rights management Manageable security at enterprise scale Oracle IRM manages access to information in terms of Existing business processes, such as  “Board Communications” Existing information classifications, such as  “Highly Restricted” Existing employee roles, such as  “Reviewer” Existing users/groups in enterprise directories, such as  “Sales” Oracle IRM’s classification-based rights management is the key breakthrough that enables management of encryption at enterprise scale Because end users, business process owners and IT admins can all understand and manage it! Classification:  “Board Communications” Classification:  “Company Announcements” CFO All Employees Documents Health+Safety Issues.sdoc HR procedures.spdf Sales pipeline.sxls New customers Roles Contributor Reader Reviewer Print Edit Comment Open Open Open Documents Roles Contributor Reader Reviewer Print Edit Comment Open Open Open Sales strategy Q3 Figures.sxls 2008 Business Plan.sppt ACME competitive review.sdoc HR Director

More Related Content

PPT
Microsoft Rights Management
PPTX
Digital Rights Management One For Sharepoint
PPTX
Primend praktiline konverents - Office 365 turvalisus
PPT
Enterprise Digital Rights Management (Persistent Security)
PDF
Empower Enterprise Mobility- Maximize Mobile Control- Presented by Atidan
PDF
Get Ahead of Cyber Attacks with Microsoft Enterprise Mobility + Security
PDF
AccessPaaS by SafePaaS
PDF
AccessPaaS (SafePaaS)
Microsoft Rights Management
Digital Rights Management One For Sharepoint
Primend praktiline konverents - Office 365 turvalisus
Enterprise Digital Rights Management (Persistent Security)
Empower Enterprise Mobility- Maximize Mobile Control- Presented by Atidan
Get Ahead of Cyber Attacks with Microsoft Enterprise Mobility + Security
AccessPaaS by SafePaaS
AccessPaaS (SafePaaS)

What's hot (20)

PPTX
Gartner Security & Risk Management Summit 2014 - Defending the Enterprise Aga...
PDF
Brochure Imperva Securesphere Vormetric Encryption
PDF
Windows 10 Enterprise E3 - Best in Class Security and Control - Presented by ...
PPTX
Cloud Audit and Compliance
PDF
Brochure Imperva Vormetric
PPTX
Intel IT's Identity and Access Management Journey
PPTX
In data security
PPTX
Identity & Access Management - Securing Your Data in the 21st Century Enterprise
PPTX
IBM Security Portfolio - 2015
PPTX
B2 - The History of Content Security: Part 2 - Adam Levithan
PPTX
IDENTITY IS THE FIRST STEP TO TRUE NETWORK SECURITY
PDF
Blbs prod-bloombase-store safe-product-brochure-uslet-en-r3
PPTX
Microsoft Azure Information Protection
PDF
Emma Aubert | Information Protection
PPTX
Wave 14 - Winodws 7 Security Story Core by MVP Azra Rizal
PDF
18 Tips for Data Classification - Data Sheet by Secure Islands
PDF
HIPAA_CheatSheet
PDF
IBM - IAM Security and Trends
PPTX
5 reasons your iam solution will fail
PPTX
Identity and Access Management Introduction
Gartner Security & Risk Management Summit 2014 - Defending the Enterprise Aga...
Brochure Imperva Securesphere Vormetric Encryption
Windows 10 Enterprise E3 - Best in Class Security and Control - Presented by ...
Cloud Audit and Compliance
Brochure Imperva Vormetric
Intel IT's Identity and Access Management Journey
In data security
Identity & Access Management - Securing Your Data in the 21st Century Enterprise
IBM Security Portfolio - 2015
B2 - The History of Content Security: Part 2 - Adam Levithan
IDENTITY IS THE FIRST STEP TO TRUE NETWORK SECURITY
Blbs prod-bloombase-store safe-product-brochure-uslet-en-r3
Microsoft Azure Information Protection
Emma Aubert | Information Protection
Wave 14 - Winodws 7 Security Story Core by MVP Azra Rizal
18 Tips for Data Classification - Data Sheet by Secure Islands
HIPAA_CheatSheet
IBM - IAM Security and Trends
5 reasons your iam solution will fail
Identity and Access Management Introduction
Ad

Viewers also liked (6)

PPTX
Mekanisme pasar modal
PDF
Learn BEM: CSS Naming Convention
PPTX
How to Build a Dynamic Social Media Plan
PDF
SEO: Getting Personal
PDF
Lightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika Aldaba
PDF
Succession “Losers”: What Happens to Executives Passed Over for the CEO Job?
Mekanisme pasar modal
Learn BEM: CSS Naming Convention
How to Build a Dynamic Social Media Plan
SEO: Getting Personal
Lightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika Aldaba
Succession “Losers”: What Happens to Executives Passed Over for the CEO Job?
Ad

Similar to Irm11g overview (20)

PDF
Microsoft Azure Rights Management
PPTX
Understanding Database Encryption & Protecting Against the Insider Threat wit...
PPTX
e-Safe Compliance - Product Sales Deck - 2.0.PPTX
PDF
Office 365 Security, Privacy and Compliance - SMB Nation 2015
PPTX
Lab Datareach Presentation V5
PDF
CIO Forum June Microsoft.pdf
PPT
Apani Ov V9
PPTX
Webinar: Endpoint Backup is not Enough - You Need an End-user Data Strategy
PPSX
Value Microsoft 365 E5 English
PPT
Share Point Server Security with Joel Oleson
PDF
Oracle-Security_Executive-Presentation
PPTX
Secure File Sharing Basics - What Every File Sharing Provider Should Have
PPT
Dstca
PDF
Azure Information Protection
PDF
VISULOX-Summary-SN
PPTX
[IGNITE2018] [BRK2495] What’s new in Microsoft Information Protection solutio...
PDF
Information protection & classification
PPTX
Security and Compliance with SharePoint and Office 365
PPTX
Importance of Identity Management in Security - Microsoft Tech Tour @Towson
PPT
Information Security
Microsoft Azure Rights Management
Understanding Database Encryption & Protecting Against the Insider Threat wit...
e-Safe Compliance - Product Sales Deck - 2.0.PPTX
Office 365 Security, Privacy and Compliance - SMB Nation 2015
Lab Datareach Presentation V5
CIO Forum June Microsoft.pdf
Apani Ov V9
Webinar: Endpoint Backup is not Enough - You Need an End-user Data Strategy
Value Microsoft 365 E5 English
Share Point Server Security with Joel Oleson
Oracle-Security_Executive-Presentation
Secure File Sharing Basics - What Every File Sharing Provider Should Have
Dstca
Azure Information Protection
VISULOX-Summary-SN
[IGNITE2018] [BRK2495] What’s new in Microsoft Information Protection solutio...
Information protection & classification
Security and Compliance with SharePoint and Office 365
Importance of Identity Management in Security - Microsoft Tech Tour @Towson
Information Security

Recently uploaded (20)

PDF
A contest of sentiment analysis: k-nearest neighbor versus neural network
PPTX
Web Crawler for Trend Tracking Gen Z Insights.pptx
PDF
Developing a website for English-speaking practice to English as a foreign la...
PDF
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
PPTX
Modernising the Digital Integration Hub
PDF
Hybrid model detection and classification of lung cancer
PPTX
The various Industrial Revolutions .pptx
PDF
NewMind AI Weekly Chronicles – August ’25 Week III
PPTX
Chapter 5: Probability Theory and Statistics
PDF
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
PDF
A review of recent deep learning applications in wood surface defect identifi...
PDF
Five Habits of High-Impact Board Members
PDF
A comparative study of natural language inference in Swahili using monolingua...
PDF
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf
PDF
Hybrid horned lizard optimization algorithm-aquila optimizer for DC motor
PDF
Unlock new opportunities with location data.pdf
PPTX
O2C Customer Invoices to Receipt V15A.pptx
PPT
What is a Computer? Input Devices /output devices
PDF
Hindi spoken digit analysis for native and non-native speakers
PDF
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
A contest of sentiment analysis: k-nearest neighbor versus neural network
Web Crawler for Trend Tracking Gen Z Insights.pptx
Developing a website for English-speaking practice to English as a foreign la...
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
Modernising the Digital Integration Hub
Hybrid model detection and classification of lung cancer
The various Industrial Revolutions .pptx
NewMind AI Weekly Chronicles – August ’25 Week III
Chapter 5: Probability Theory and Statistics
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
A review of recent deep learning applications in wood surface defect identifi...
Five Habits of High-Impact Board Members
A comparative study of natural language inference in Swahili using monolingua...
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf
Hybrid horned lizard optimization algorithm-aquila optimizer for DC motor
Unlock new opportunities with location data.pdf
O2C Customer Invoices to Receipt V15A.pptx
What is a Computer? Input Devices /output devices
Hindi spoken digit analysis for native and non-native speakers
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf

Irm11g overview

  • 1. Oracle Information Rights Management 11g Deborah Assayag [email_address]
  • 2. Oracle Security Inside Out Oracle Confidential Information Rights Management Encryption and Masking Privileged User Controls Multi-Factor Authorization Activity Monitoring and Audit Secure Configuration Identity Management Database Security User Provisioning Role Management Entitlements Management Risk-Based Access Control Virtual Directories Document-level Access Control All copies, regardless of location (even beyond the firewall) Auditing and Revocation Databases Applications Content Infrastructure Information
  • 3. Risks of not controlling sensitive data High costs when losing control of… Financial documents Mergers & acquisition information Intellectual property Personally identifiable information Reduced share price due to lack of market confidence Regulatory fines due to non-compliance High legal expenses Compensation costs Impact to company brand Reduced competitive advantage
  • 5. How does the loss happen and by who? Over 70% of data loss from lost devices and negligence Only 12% from malicious activity Only 18% of loss happens internally Increasing data loss from partner collaboration The Business Impact of Data Breach . Ponemon Institute LLC. May 15, 2007 Causes of security breaches Trends in Data Breach Sources 2008 Data Breach Investigations Report . Verizon Business. June 10, 2008
  • 6. You have secured the perimeters… … but digital information is no respecter of perimeters! SharePoint Email File system Content Management Intranet/ Extranet
  • 7. Which perimeter are we talking about? Many business processes involve external parties SharePoint Email File system Content Management Intranet/ Extranet
  • 8. Typical methods for securing desktops Encrypt disk Prevent use of external devices Monitor information flow (DLP) OS access control Encrypt content (PGP) Prevent use of external services Buying all these solutions is expensive What about partners, customers, suppliers? Massively restrict end users ability to work Protect the content instead of location!
  • 9. Security – Usability - Manageability An enterprise-class solution must balance all three aspects Secure Usable Manageable
  • 10. Imagine if you could… Control content access beyond your network? Prove regulatory controls are in place? Audit every single access to secured content? Revoke access even after delivery, to every single copied ever made? Restrict print, copy, view formulae even enforce change tracking? Easily deploy and manage a solution
  • 11. The Solution: Information Rights Management Persistent protection, control and tracking of… What Single documents or groups of documents Who Single people or groups of people When Flexible start and stop times, revoke after delivery Where Single device or roaming across internet, on or offline How Open, Print, Edit, Annotate, Interact, Reply, Pause…
  • 12. Oracle Information Rights Management Securing all copies of your sensitive information Everywhere IRM-encrypted content is stored, transmitted or used NO ACCESS FOR UNAUTHORIZED USERS Transparent, revocable access for authorized users Centralized policy and auditing for widely distributed content Content security beyond the database, application and firewall ECM Email File systems Intranet/ extranet Databases Oracle IRM Server Enterprise perimeters Customer Partner Supplier
  • 13. With Oracle Information Rights Mgmt Flexible & comprehensive information protection Oracle IRM Server Oracle IRM Server Application Export Saved in Content Management Secured from the Desktop
  • 14. Sealed documents & emails Sealing documents and emails protects them wherever they go A central server manages rules - even for copies of documents that leave your network The central server audits usage – even for copies of documents that leave your network The rules apply even when users are offline and the server is unreachable Local secure cache refreshes automatically upon network connection
  • 15. Benefits Secure and track information beyond the repository Encryption places an access-controlled perimeter around the information itself ‏ Authorized Access, Audited, Revokable Consistent security: one “virtual” perimeter to manage Control and monitoring does not stop at the firewall Storage Area Network Email Web Collaborative Workspace Content Management Oracle IRM Server
  • 16. <Insert Picture Here> Oracle Information Rights Management DEMO
  • 17. Content Author Seals Content Could be… Intellectual property, research, supplier communications, manuals, BI reports… Content Author Chooses Content Classification Confidential Highly Restricted (Board, Legal, M&A, Project, etc.) Confidential Restricted Confidential Internal Public
  • 18. This User Doesn’t Have Rights to View Even if stored on a local file system or external drive Access can be revoked at any time
  • 19. This User Only Has Read Access No printing, editing or screen captures… User can view document in MS Word, but take screenshot and paste…. Partner
  • 20. Oracle Information Rights Management Enterprise-class security within & beyond your firewall Different users have different access to a single, secured document
  • 21. Why customers choose Oracle IRM Oracle Information Rights Management reduces Costs and delivers the right balance of Security , Usability , and Manageability Reduce Costs Avoid expensive legal costs, regulatory fines Protect company brand and market share price Increase Security Documents and emails remain secure regardless of location Usage is audited and access can always be revoked Maintain Usability As easy to use as unprotected documents and emails Mature product supports existing document workflows Overall Manageability Intuitive, policy-based control at enterprise scale Rapidly deployable, out-of-the-box packages for point solutions
  • 22. Headline Oracle IRM Differentiators Offline use Oracle IRM synchronization gives seamless offline working Microsoft does not allow revocation Adobe & EMC require offline leases Search No competitor has iFilters or server-side search APIs Policy-driven & manageable Oracle IRM is classification-based Microsoft burns ACLs into the document Adobe & EMC require integration with another product at scale Format support Platforms, formats, versions
  • 23. Oracle IRM 11g Release Highlights Broader Enterprise Reach Built on Fusion Middleware and Java EE Broad platform certifications Standard 27 Oracle languages SSO authentication: OAM, Windows auth, Basic auth to LDAP Extensible, First-Class Security Extensible classification model for application integrations FIPS 140-2 certification Hardware Security Module for key storage Usability and Templates New Web-based management console Best practice rights model: global roles and templates
  • 24. Oracle IRM + ECM Suite Out of the box integration with Oracle Universal Content Management Automatically ensure managed documents are protected – wherever it’s shared and used IRM extends key features of content management “beyond the repository” Security – share information with more confidence (that it will be secure outside the repository) Auditing – invaluable business intelligence as you track all remote access to information Version management – revoke obsolete versions and route users to current versions Records management – delete decryption keys to dispose all copies of records
  • 25. Oracle Information Rights Management Customer Success
  • 26. Use case: Renault F1 Renault F1 sought to protect its technological specifications against competitive espionage. Oracle IRM is delivering:   Secure access to documents for partners, suppliers and manufacturers The ability to revoke users’ rights Remote access to data for track-side technicians Centrally managed access rights across the globe All applications directly store files within the central repository
  • 27. Case Study : Beckman Coulter Industry: Life Sciences Annual revenue: US$2.76 billion Employees: 10,000 Key benefits: Bespoke content management and portal integrations Enabled the company to connect the sales force Prevented redistribution of valuable information Eliminated the need to maintain similar data Confidence that information is only provided to intended recipients Ability to revoke access to incorrect or out-of-date documents
  • 28. Basic IRM Deployment Architecture IRM Server WebLogic External User DMZ (or Intranet) Internet / External Networks Corporate Network F I R E W A L L F I R E W A L L Load balancer Eg OHS F I R E W A L L Web Services LDAP Server Database Server
  • 29. Classification-based rights management Manageable security at enterprise scale Oracle IRM manages access to information in terms of Existing business processes, such as “Board Communications” Existing information classifications, such as “Highly Restricted” Existing employee roles, such as “Reviewer” Existing users/groups in enterprise directories, such as “Sales” Oracle IRM’s classification-based rights management is the key breakthrough that enables management of encryption at enterprise scale Because end users, business process owners and IT admins can all understand and manage it! Classification: “Board Communications” Classification: “Company Announcements” CFO All Employees Documents Health+Safety Issues.sdoc HR procedures.spdf Sales pipeline.sxls New customers Roles Contributor Reader Reviewer Print Edit Comment Open Open Open Documents Roles Contributor Reader Reviewer Print Edit Comment Open Open Open Sales strategy Q3 Figures.sxls 2008 Business Plan.sppt ACME competitive review.sdoc HR Director

Editor's Notes

  • #3: 05/08/10 Oracle Confidential Most regulated information originates and concentrates in databases. Oracle offers industry-leading database security options for its database. Worth starting to secure information at source (losing a database is worse than losing a file). Myriad end users access regulated information in databases via business applications (HR self-service, CRM, etc.). Oracle Identity Management offers industry-leading identity and access management governing end user/application access to regulated information. Centralised and consistent policy control and auditing across Oracle and non-Oracle applications. Industry leadership in this area extended by Sun acquisition. End users copy information beyond databases and applications, generally in the form of documents (e.g. sensitive reports). These copies proliferate hugely in number and location (e.g. to unmanaged servers and web sites and corporate and home computers, inside and outside the firewall). Oracle IRM uses encryption to retain control over all copies of these sensitive documents, regardless of where they are located, inside and outside the firewall. Oracle is doing more than just reorganising its security sales forces to sell database security, IAM and IRM together. It is engineering the product suites to work together so that enterprises can consistently and cost-effectively manage the security of their most sensitive and regulated information – in the database and application layers and beyond.
  • #4: Many organizations today are exposed to the risk of losing valuable information which resides in emails and documents. Financial information, mergers and acquisition activity, engineering and research data, often resides in Word, Excel or PDF documents and when lost can have significant impact to your business. Regulations specify controls must be in place when handling classified content, failing to comply with these regulations can result in fines. Losing your intellectual property to competitors reduces your effectiveness in the market place. Often such incidents are reported by the popular press which has a severe impact to your company brand and your customers lose confidence in your ability to protect their information.
  • #5: Over the past few years we have seen many examples of organizations losing important information. This is exposure you do not desire.
  • #6: 6/ 10 Research also reveals that a high percentage of data loss happens by mistake or through pure negligence and only a small amount of incidents happen internally where your existing security infrastructure is implemented. These risks are increasing as more and more business use cases involve the collaboration of sensitive content with external parties, parties who don’t employ the same importance on protecting your information and accidently lose it.
  • #7: Database security not enough Select / report / applications API Web service Your business has of course deployed security solutions for content that resides internally. Take SharePoint for instance, different folders provide different access controls to documents. Yet when these documents are taken out of SharePoint, say by emailing to someone, the security doesn’t travel with them. Instead security is applied at each location the content could reside. But this is a constant struggle when the digital information doesn’t respect your security perimeters, they can be stored on USB devices, external hard drives, CDs etc. Information proliferates. Between share filed systems, email, intranets, extranets and thousands of desktops inside and outside the firewall. Red boxes: If you are looking for conventional information security to provide with compliance, records management &amp; content management. Today, at best you are really only managing a small subset of your information within these systems.
  • #8: But the problem doesn’t stop there. Your business requires that information is shared beyond your enterprise, to customer, partners and suppliers. Yet you cannot enforce the same level of security on their firewalls and content repositories. The previous slide shows the perimeters of existing systems, but which perimeters are we talking about? Many business processes, for example with Oracle acquiring other companies, information is shared with external parties such as customers, partners and people working at home.
  • #9: Your business has of course deployed security solutions for content that resides internally. Take SharePoint for instance, different folders provide different access controls to documents. Yet when these documents are taken out of SharePoint, say by emailing to someone, the security doesn’t travel with them. Instead security is applied at each location the content could reside. But this is a constant struggle when the digital information doesn’t respect your security perimeters, they can be stored on USB devices, external hard drives, CDs etc. Information proliferates. Between share filed systems, email, intranets, extranets and thousands of desktops inside and outside the firewall. Red boxes: If you are looking for conventional information security to provide with compliance, records management &amp; content management. Today, at best you are really only managing a small subset of your information within these systems.
  • #11: Wouldn’t it be nice if you could solve this problem? Have control over content no matter where it exists, beyond your networks. Imagine if you could produce evidence that regulatory controls had been put in place by showing every single access to controlled content by authorized users.
  • #22: In summary, Oracle IRM is the leading document rights management technology and our customers have chosen it for the immediate reduction in costs and increase in security it brings. But as important as security is, Oracle IRM delivers unprecedented ease of use and the ability to scale to very large numbers of users and documents. This balance of security, usability and manageability means your business can deploy an IRM solution without interrupting existing workflows and meet the desired security and regulatory requirements.
  • #23: Offline Use Oracle IRM stores a copy of a user’s rights locally on their PC.  These rights are refreshed every day via invisible synchronization with the IRM Server.  This means that a user can be given an offline working period of, say, 3 days.  This enables them to work with sealed documents, just as easily as if they were unsealed, without needing to connect to the internet for 3 days.  However, whenever they do connect their rights are refreshed and they are given another 5 days from that point in time.  Thus in reality users are never aware of refreshing their rights, all of their documents just open, regardless of when the last time they opened any given document was or even if they have never opened it before  Oracle IRM daily synchronization also allows remote users to have their rights revoked at short notice.  So partners at the end of a project, or employees leaving the organization, can have their access denied to all of their sealed documents the next time they synchronize.  Highly sensitive data can be given shorter offline periods, or even only have access whilst online, to enable faster revocation of rights. Microsoft, Adobe, EMC, Liquid Machines All other IRM products issue a fixed length offline lease to a document only when that document is opened.  If that offline period is 5 days, then it cannot be refreshed until that 5 day lease has expired.  Thus it is common for offline leases to expire whilst a user is offline and unable to refresh their rights, thus being denied access to their document.  Also if a user does not obtain leases for their documents before going offline (because they have never opened them before, or they haven’t opened them for some time) then again they will be denied access whilst offline. Microsoft: Revocation of rights can only be performed by a system administrator editing an XML file, the ‘revocation list’.  This is effectively impractical and clearly does not scale. EMC, Adobe: Rights can only be revoked at the end of the offline lease, not during as with Oracle IRM synchronization. Search Only Oracle IRM has out-of-the-box integrations with Windows Explorer Search, Windows Indexing Service, Windows Desktop Search (on Vista) and SharePoint 2007 Indexing Search. Oracle IRM also has easy to deploy Search APIs which for example have been integrated with: Autonomy, Oracle SES, LiveLink Search, Oracle Text Microsoft, Adobe, EMC, Liquid Machines No other IRM solutions have out-of-the-box search integrations nor easy to integrate APIs enabling searching of sealed documents Thus not even Microsoft can search its own sealed documents within SharePoint, their answer is to store unprotected documents in SharePoint, which does not scale Cont..
  • #27: Renault F1 wanted to be able to replicate documents when shared between 2 factories, 2 mobile teams, suppliers, sub-contractors and partners Security of documents containing technical specifications, including the “Bible” which contains all the information relating to the racing car. The solution needed to convert 80TB of documents stored in multiple repositories and with no global search functionality Necessary? See http://www.theregister.co.uk/2007/04/30/f*****i_espionage_conviction Sophisticated deployment, illustrating several key Oracle IRM differentiators Rapid (hosted) evaluation, rapid deployment Active Directory integration Windows authentication Transparent offline working (track-side) Citrix deployment (design office, Linux, Citrix) Silent MSI rollout
  • #29: To recap…
  • #30: A key differentiator of Oracle IRM - the key to moving from initial pilot IRM deployments to successful, large-scale enterprise IRM deployments - is its unique classification-based rights model. Ignoring the text for a moment … The picture shows 8 documents: 4 sealed to one classification “Board Communications”, and 4 sealed to “Company Announcements”. The CFO is assigned a “Contributor” role, which means he can open, print and edit documents sealed to “Board Communications”. The HR Director has a similar “Contributor” role for “Company Announcements” but only has a “Reader” role for “Board Communications”. The group “All Employees” which like the users comes from an enterprise directory, are “Readers” for “Company Announcements” but cannot access documents sealed to “Board Communications”. The point of the picture is that for 8 documents there are 4 role assignments – the black dotted lines to the right of the picture. But if there were 80,000 documents – 40,000 sealed to “Board Communications” and 40,000 sealed to “Company Announcements” there would still only be 4 role assignments. This is a subtle but huge advantage for Oracle IRM, with both technical and business benefits. From the business perspective end users and business and IT administrators are presented with a simple model governing access to their information that they can understand and communicate, even at enterprise scale, because it is implemented in terms of things they already understand – classifications based on existing information classifications, or business processes or projects; their roles within these business processes; and existing organizational groupings in enterprise directories. From a technical perspective the per-classification Oracle IRM system has to manage orders of magnitude fewer rights than systems which clone per-user and per-file rights from policy templates. Far fewer rights enables the automated synchronization of rights to the desktop that provides Oracle IRM with its unique “hands free” offline working, while retaining timely revocation and up-to-date audit trails. This is not at the expense of making real-world exceptions. While Oracle IRM manages rights primarily at the level of classifications and roles it can easily make per-user and per-file exceptions – when they are needed – as compared to competing solutions which attempt to build enterprise policy on the quicksand of millions of per-user and per-file exceptions.