IRM SECURE

Technical Overview

Normally, security and collaboration are considered mutually conflicting goals. i.e., The more secure you become, the more "uptight" you need to be about sharing information. In addition, the more collaborative you need to become the more you need to "let down your guards". This problem is more obvious when information is unstructured and in the form of documents, reports, emails, images and drawings.

Traditionally, information security is implemented by constraining computers, networks and people to whom information can flow. This is done by creating "perimeters" and constraining information to only flow freely within this perimeter and not-so-freely across the perimeter. The perimeter could be a computer, as in the case of a port control system or a whole network as in the case of a firewall.

IRM Secure FileSecure allows enterprises to achieve the "mutually conflicting" goals of security and collaboration by breaking down traditional tenets of information security via distribution control.

IRM Secure FILESECURE IS A FRAMEWORK TO

  1. Define Information Usage Policies A usage policy defines:
    • WHO can use the information i.e. people / groups within or outside of the enterprise
    • WHAT can each person do with the information i.e. read / edit / print / distribute / copy...
    • WHEN can each person access the information i.e. within certain dates, within a specific timespan…
    • WHERE can the information be accessed from i.e. specific computers, within the office…
  2. Attach Policies To Individual Pieces Of Information There are various events which can "attach" policies to information and thereby protect it. Information can be protected in the following scenarios:
    • As soon as it is created based on a user driven prompt or predefined settings
    • As soon as it is placed in a certain location e.g. folders / file shares
    • As soon as it is attached to an email
    • As soon as it is uploaded to a document / content management system
    • As soon as it is created (e.g. reports ) within a transactional system
    • As soon as it is "discovered" or "tagged" by a content discovery or a DLP system
    • Just before the information leaves your network (via email / web)
  3. Control Usage Of The Policy Governed Information

    Information which is protected using IRM Secure FileSecure can be controlled for usage independent of its location or mode of transport.

    Using the policies attached to the information IRM Secure FileSecure ensures that usage of the information is in compliance to the policies.

    The policy attached to the information can be even changed post distribution i.e. the "owner" can change WHO/WHAT/WHEN/WHERE without requesting or resending the information to the recipients.

  4. Audit The Usage Of The Information.

    Information protected with IRM Secure FileSecure can not only be controlled for usage, it can also be audited.

    WHO used the information, WHAT did he/she do, WHEN & WHERE is captured from distributed usage environments and reported centrally.

    These audit reports can be sliced and diced using a report builder and can be used in compliance reporting for frameworks like ISO 27001, Sarbanes Oxley, GLBA, PCI DSS & HIPA.