Secure Information Sharing: Microsoft Azure RMS enabling your organization to securely share any document with anyone

  • LANGUAGE: English DATE: Tuesday, March 11, 2014 TIME: 6:00pm CET, 1:00pm EDT, 10:00am PDT
Upcoming Webinars

The challenge of all organizations in these days of connected businesses and their need for agility in changing markets – the new ABC: Agile Business, Connected – is creating new challenges for IT. One of these challenges is securely sharing information.

Secure Information Sharing with business partners is a long-lasting challenge for organizations. There have been some solutions out for a longer term, including on-premise Information Rights Management (IRM) solutions. Unfortunately, until now these solutions struggled with support for heterogeneous environments, document formats, and onboarding of external users. This is changing now.

Martin Kuppinger, Principal Analyst at KuppingerCole, will give an overview of the requirements and current solutions for Secure Information Sharing, from various types of IRM approaches to secure data rooms, indicating the strengths and weaknesses of such approaches. He then will look at more detail into requirements of Secure Information Sharing on enterprise-scale, to cover all various requirements.

In the second part of the session, Dan Plastina of Microsoft will explain the Microsoft strategy on their IRM and look at their partner ecosystem. This will give more detailed information on how to do that. He will also have a look at specific requirements and security concerns especially Non-US customers are raising in this “post snowden era”.

Platinum Sponsors


Dan Plastina leads the information protection team at Microsoft, with the Microsoft Rights Management suite of products being one of his core responsibilities. RMS includes an on-premises Active Directory RMS offering, an Azure hosted offering called Azure RMS, as well as the many PC/Mobile RMS...

Platinum Sponsor

Every day, Microsoft practices security operations at a global scale to protect our customers, in the process analyzing more than 6.5 trillion signals to generate intelligence that we share with our customers and partners through technology solutions spanning identity and access management, threat protection, information protection, security management, and infrastructure security.

We drive a broad set of industry and policy partnerships in support of our unique responsibility to make the world a safer place.

Watch now


Trending Videos

Next Webinar


Secure DevOps: Key to Software Supply Chain Security

In the modern world of flexible and remote working, it is useful for software engineers to be able to access and update source code from anywhere using any device, but the SolarWinds supply chain attack showed that it is essential to track every change for security and compliance reasons.

Become a Sponsor


+49 211 23707710
Mo – Fr 8:00 – 17:00