Secure Information Sharing: Microsoft Azure RMS enabling your organization to securely share any document with anyone

  • LANGUAGE: English DATE: Tuesday, March 11, 2014 TIME: 6:00pm CET, 1:00pm EDT, 10:00am PDT
Upcoming Webinars

The challenge of all organizations in these days of connected businesses and their need for agility in changing markets – the new ABC: Agile Business, Connected – is creating new challenges for IT. One of these challenges is securely sharing information.

Secure Information Sharing with business partners is a long-lasting challenge for organizations. There have been some solutions out for a longer term, including on-premise Information Rights Management (IRM) solutions. Unfortunately, until now these solutions struggled with support for heterogeneous environments, document formats, and onboarding of external users. This is changing now.

Martin Kuppinger, Principal Analyst at KuppingerCole, will give an overview of the requirements and current solutions for Secure Information Sharing, from various types of IRM approaches to secure data rooms, indicating the strengths and weaknesses of such approaches. He then will look at more detail into requirements of Secure Information Sharing on enterprise-scale, to cover all various requirements.

In the second part of the session, Dan Plastina of Microsoft will explain the Microsoft strategy on their IRM and look at their partner ecosystem. This will give more detailed information on how to do that. He will also have a look at specific requirements and security concerns especially Non-US customers are raising in this “post snowden era”.


Platinum Sponsors

Speakers

Dan Plastina leads the information protection team at Microsoft, with the Microsoft Rights Management suite of products being one of his core responsibilities. RMS includes an on-premises Active Directory RMS offering, an Azure hosted offering called Azure RMS, as well as the many PC/Mobile RMS...


Platinum Sponsor

Every day, Microsoft practices security operations at a global scale to protect our customers, in the process analyzing more than 6.5 trillion signals to generate intelligence that we share with our customers and partners through technology solutions spanning identity and access management, threat protection, information protection, security management, and infrastructure security. We drive a broad set of industry and policy partnerships in support of our unique responsibility to make the world a safer place.

Watch the video Enable a remote workforce by embracing Zero Trust security

Watch now

Downloads

Popular Videos

Next Webinar

Webinar

Zero Trust Through Dynamic Authorization and Policy Driven Access

As workers become more mobile and workloads move into the cloud, the traditional model of enforcing security at the network perimeter becomes ineffective. A Zero Trust model of strict access control for every user or device protects your organization from advanced security threats enabling you to stay connected, productive and secure.

Become a Sponsor

Call

+49 211 23707710
Mo – Fr 8:00 – 17:00