SBRM Is Here, and Why You Should Care
Download
1 / 11

Ray Zambroski - PowerPoint PPT Presentation


  • 304 Views
  • Uploaded on

SBRM Is Here, and Why You Should Care ( Even If You Work For A Fortune 100) April 25, 2006. Ray Zambroski President & CEO Essential Security Software [email protected] Small Business Rights Management: (SBRM) Defined.

loader
I am the owner, or an agent authorized to act on behalf of the owner, of the copyrighted work described.
capcha
Download Presentation

PowerPoint Slideshow about 'Ray Zambroski' - flora


An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript
Slide1 l.jpg

SBRM Is Here, and Why You Should Care

(Even If You Work For A Fortune 100)

April 25, 2006

Ray Zambroski

President & CEO

Essential Security Software

[email protected]


Slide2 l.jpg

Small Business Rights Management: (SBRM) Defined

Content is constantly traversing perimeters - Security structures must focus on perimeters and content

Security should be a subset of content/document management - Embed the security in the document or email

Lets businesses dynamically control access and use of document and email content, both inside and outside the enterprise

Prevent printing, forwarding cut/copy or screen capture, set expiration times/dates on email and files

Works with popular file formats, including Microsoft Office documents and PDFs


Slide3 l.jpg

BUSINESS SECURITY COMPROMISES2

Unauthorized Access to Employee Data

Unauthorized Access to Corporate Data

Network or System Penetration

Unauthorized Internal Access to Sensitive Material

Loss of Digital Assets

Email Piracy

Password Compromise

Loss of Mobile Devices

Unintended Forwarding of Email

Virus Infection

1

2

Email: The Weak Link

In 2005, unauthorized distribution of digital information cost the average company $355,552, a two-fold increase from the 2004 rate of $168,529.1

Businesses expressed the most concern about confidential memos (75.7%) and intellectual property (71.4%) leaving their organizations via email.

More than 50% of those surveyed point out the need for control over sensitive financial information i.e. pricing lists, customer proposals, etc.

Theft of proprietary information was the third most costly security breach after virus & denial of service attacks.


Slide4 l.jpg

The Enterprise Ecosystem

1. Courtesy of Microsoft Corp, 2005


Slide5 l.jpg

Expert Anecdote: Email-centric

Security Software Adoption


Slide6 l.jpg

SBRM Use Case Scenarios ‘06

KEY REQUIREMENTS:

Very, very, very easy to use

High price to performance ratio

Document and email content

Embeds security information in the actual document or e-mail

Persists over time, across multiple networks and applications

Works in concert with existing IT initiatives, systems and applications

Reunifies authentication protocols with the specific information assets they govern

Permits secure migration & back-up of encrypted data

BUSINESS CRITICAL DIGITAL ASSETS1

Personal Electronic Address Books

Price Lists

Engineering Drawings/Blueprints

Customer Proposals

Customer Invoice/Bills

Email Attachments

Contractual Documents

AP / AR

Private Corp. Email Messages

HR Documents (Salaries)

Customer Records

Sensitive Financial Info.

1


Slide7 l.jpg

Key SBRM Driver: Legal Service ‘06

*ABA STANDING COMMITTEE ON ETHICS AND PROFESSIONAL RESPONSIBILITY

Formal Opinion No. 99-413; March 10, 1999; “Protecting the Confidentiality of Unencrypted E-Mail”



Slide9 l.jpg

Ray Zambroski ‘06

President & CEO

Essential Security Software

[email protected]



Slide11 l.jpg

SBRM Challenges: Behind the Scenes ‘06

Multiple users and domains

Must make assertions about themselves

Various formats

Various authorities for validation of those assertions

Allowing rapid travel to various systems and domains

Translation of rights

Complex negotiations between systems and users


ad