GARTNER IT EXPO - Protecting Content in a Mobile & Cloud World
-
Upload
sri-chilukuri -
Category
Documents
-
view
63 -
download
0
Transcript of GARTNER IT EXPO - Protecting Content in a Mobile & Cloud World
© Intralinks 2014 1
Sri Chilukuri, VP Product Marketing
© Intralinks 2014 2
Intralinks – Secure cloud content collaboration leader
Company • Founded in 1996 by banks; currently 780 employees • 8 year leader in Gartner Collaboration Suites Category*
• Publically traded (NYSE:IL) • $234.5M revenue (2013)
• Has been used by 99% of the Fortune 1000 • Over $23.5T of financial transactions completed
• 3.1M paid users across 90K organizations since launch • 35K new users per month, 68K logins per day
*Sources: Gartner, Inc., ‘Market Share: All Software Markets, Worldwide, 2013,’ March 2014, G00260918 Gartner Magic Quadrant for Enterprise File Synchronization and Sharing, 2014; July 2014, G00261766
Financials
Customer footprint
Technology platform
© Intralinks 2014 3
Business needs and new technologies are upending traditional protection models
Historical view: The firewall is the perimeter
Common view: Identity is the new perimeter
Current reality: Content is the new perimeter
wherever it exists
© Intralinks 2014
How do I protect content that is with my cloud vendor? How do I protect content that leaves my cloud?
© Intralinks 2014
Intralinks Customer Managed Keys (CMK) We give enterprises sole control of their data encryption keys so that even Intralinks can’t retrieve file contents and provide it to a third party (e.g. subpoena)
© Intralinks 2014
“The first step of encryption is ensuring that files are encrypted in transit, the next is that they’re encrypted at rest. But even at that level, there’s a problem…The traditional approach is to have the vendor manage the decryption keys. This works fine, but is a major source of stress for those enterprises with a particular focus on security. For those organizations, only fully customer-managed keys will suffice. Customer Managed Keys are an important addition…to the multi-layer key management system Intralinks has been using with customers for years.”
6
- Ben Kepes, Contributor Forbes.com
http://www.forbes.com/sites/benkepes/2014/09/29/intralinks-rolls-out-customer-managed-encryption-keys/
© Intralinks 2014 7
Customer Managed Keys (CMK) is a core service required for a secure cloud content services platform infrastructure
Encryption
Secure Data Centers
Fault Tolerant Architecture
Intrusion Detection
Personnel Security
Multi-Factor Authentication
Customer Managed Keys
Single Sign-On
Certifications (SAS 70, SOC 2)
Secure Multi-Tenant SaaS Infrastructure
© Intralinks 2014 8
Intralinks Customer Managed Keys (CMK) Overview
Technology will give enterprises: • Complete control over the
encryption key lifecycle • Ability to revoke content access
without relying on Intralinks
• Ability to rotate encryption keys without requiring re-encryption of existing content
• Certainty that Intralinks is not storing encryption keys anywhere else
• Auditability of the entire key management process
ILP CMK Service HSM Cluster
User uploads And downloads Files to ILP
Client services turns on CMK for client
services.intralinks.com
End User Laura
Intralinks Client Services Chris
Create, disable, and enable keys directly connected to HSM
Customer Key Manager Kevin
SSH Commands PED
HTTPS VPN
© Intralinks 2014
Intralinks Information Rights Management (IRM) is a subset of digital rights management (DRM), technologies that protect sensitive information from unauthorized access.
9
© Intralinks 2014 10
Information Rights Management (IRM) is a core service required for cloud content lifecycle management
Information Rights Management
Secure Multi-Tenant SaaS Infrastructure
Content Management
File Sync & Share
Workflow Metadata
Search
Compliance Reporting
Secure Distribution
Core Content Services
© Intralinks 2014 11
Granular control of content at rest and in use
• Plug-in free: Share outside of enterprise • Seamless to use: No training required • UNshare™ that works: Apply IRM everywhere • One key for each single file downloaded from
Intralinks platform (or API) • Content Analytics and Audit: Visibility into how
content is used, shared, copied, printed, edited, etc. • Control of data in use: Granular content-level
permissions including view, edit, annotate, print, open locations (IP) and device pinning
Information Rights Management
© Intralinks 2014
Intralinks IRM as implemented within the Intralinks VIATM Pro collaboration solution.
12
“A day in the life…” Scenario
© Intralinks 2014
Visual indicator of IRM protection
13
Bill Jones
Sally Smith
Ted Walters
Bill Jones
Bill Jones
Bill Jones
Bill Jones
Bill Jones
Once inside an Intralinks VIA Pro Workspace users can quickly determine whether or not IRM protection is enabled.
© Intralinks 2014 14
Bill Jones
Bill Jones
Bill Jones
Bill Jones
Ted Walters
Sally Smith
Jones
© Intralinks 2014 15
Bill Jones
Bill Jones
Bill Jones
Jones
Ted Walters
With just two clicks users can quickly enable IRM for all documents in the Workspace.
© Intralinks 2014
Bill Jones
Sally Smith
Bill Jones
Ted Walters
Bill Jones
Bill Jones
Bill Jones
Bill Jones
16
Visual indicator of IRM protection
Visual indicators now extend to the documents themselves highlighting the enhanced protection for users.
© Intralinks 2014 17
Bill Jones
Bill Jones
Jones
With the Workspace and its documents now secure, and the added confidence that the protection travel with the file itself, the user can invite external collaborators.
© Intralinks 2014 18
Bill Jones
Sally Smith
Ted Walters Bill Jones
Bill Jones
Bill Jones
Bill Jones
Bill Jones
When a user opens an IRM protected document Intralinks VIA Pro will simply download and open it in its native authoring application.
© Intralinks 2014
Indication of Intralinks protected document within the native authoring application.
No cumbersome plug-in’s or configuration is required by the end user, the document is opened and the user notified that it is protected.
19
© Intralinks 2014 20
Intralinks IRM can display the permissions set for the document; permissions that will travel with the file wherever it may go.
© Intralinks 2014 21
CMK and IRM now available with Intralinks VIATM: Securely sync, share, collaborate … and manage your business content
With Intralinks VIA™, users can sync, share, and collaborate on business content to get work done while enterprises can manage that content to protect IP and meet compliance
© Intralinks 2014
For more information: Sri Chilukuri VP Product Marketing [email protected]
Intralinks.com