1 / 9

EMC Documentum Information Rights Management

EMC Documentum Information Rights Management. EMC Content Management and Archiving. IRM Policy Server. IRM Server Key and Policy Management. Desktop Integration. Content is always encrypted The keys are always separated from the content The local key is destroyed after use.

dean-hart
Download Presentation

EMC Documentum Information Rights Management

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. EMC Documentum Information Rights Management EMC Content Management and Archiving

  2. IRM Policy Server IRM Server Key and Policy Management Desktop Integration • Content is always encrypted • The keys are always separated from the content • The local key is destroyed after use Workflow Integrations Content Owner File Share + Policy + Policy EMC Documentum Repository EMC Documentum eRoom

  3. Partner Network Hacker EMC Documentum IRM Workflow Secure Data Sharing Partner Network Author Corporate VPN Internet Review IRM Policy Server Content Server

  4. Industry Use Examples for IRM • Manufacturing • Sharing of new product specifications, planning, R&D, and pricing documents • Government • Share information on a need-to-know basis within intelligence community • Healthcare • Communications with business associates • Control of PHI dissemination • Financial and Legal Services • On-line mergers and acquisitions • Protect customer data • High value research circulation control • Secure distribution of bills of lading 4

  5. Customer Case Study Large Global Energy Supplier Requirements • Protect highly valuable financial information shared as PDF and Office files • Leverage existing SharePoint and Documentum systems wherever possible • Prevent external access to documents that might be emailed or otherwise distributed outside of collaboration system or repository IRM Solution • IRM policies were specified and mapped to existing corporate policies for information distribution. These policies govern which after-delivery controls (e.g. print, copy/paste, offline access rights) apply to which documents. • Initially, confidential documents were protected using a manual batch process and uploaded to internal SharePoint sites • Now, end users can manually add files to a Documentum cabinet or folder and have IRM policies applied automatically • A single access control list (ACL) governs who can access a document • A single retention policy governs expiration and deletion

  6. Customer Case Study Global Energy Infrastructure & Construction Firm Requirements • Prevent unauthorized access to project documents distributed via email • Require multiple level of access and rights depending on group membership • Must be easy to mechanical engineers and project managers to use IRM Solution • Document owners protect documents directly from Adobe Acrobat and distributes through portal • No access outside of current insider list • Username watermark raises the bar on re-distribution of printed copies

  7. Global Shipping Firm Requirements • Provide a web-based mechanism for authorized global customers to download and print Bills of Lading • Prevent users from saving copies of files locally or printing additional copies IRM Solution • PDF files generated from database queries • IRM Server Management API protects PDF and applies the IRM policy to the file automatically without end-user intervention • IRM Server Extension API reports on print operations; the permission to toggled in business database based on document state

  8. Questions

More Related