Secure Information Sharing: Microsoft Azure RMS enabling your organization to securely share any document with anyone
- LANGUAGE: English DATE: Tuesday, March 11, 2014 TIME: 6:00pm CET, 1:00pm EDT, 10:00am PDT
The challenge of all organizations in these days of connected businesses and their need for agility in changing markets – the new ABC: Agile Business, Connected – is creating new challenges for IT. One of these challenges is securely sharing information.
Secure Information Sharing with business partners is a long-lasting challenge for organizations. There have been some solutions out for a longer term, including on-premise Information Rights Management (IRM) solutions. Unfortunately, until now these solutions struggled with support for heterogeneous environments, document formats, and onboarding of external users. This is changing now.
Martin Kuppinger, Principal Analyst at KuppingerCole, will give an overview of the requirements and current solutions for Secure Information Sharing, from various types of IRM approaches to secure data rooms, indicating the strengths and weaknesses of such approaches. He then will look at more detail into requirements of Secure Information Sharing on enterprise-scale, to cover all various requirements.
In the second part of the session, Dan Plastina of Microsoft will explain the Microsoft strategy on their IRM and look at their partner ecosystem. This will give more detailed information on how to do that. He will also have a look at specific requirements and security concerns especially Non-US customers are raising in this “post snowden era”.
One Microsoft Way • WA 98052-6 Redmond • USA
Every day, Microsoft practices security operations at a global scale to protect our customers, in the process analyzing more than 6.5 trillion signals to generate intelligence that we share with our customers and partners through technology solutions spanning identity and access management, threat protection, information protection, security management, and infrastructure security. We drive a broad set of industry and policy partnerships in support of our unique responsibility to make the world a safer place.
As users, devices and application workloads move outside the corporate network, the traditional model of enforcing security at the network perimeter is no longer effective. A Zero Trust model offers an alternative that secures data while ensuring it is accessible to employees, regardless of where they are working. But the path to achieving Zero Trust is unclear for many organizations.