doctrackr presents at defcamp 2013 - november 29-30

Post on 30-Jun-2015

129 Views

Category:

Technology

0 Downloads

Preview:

Click to see full reader

DESCRIPTION

DefCamp is one of the most important conferences on hacking & information security in South-East Europe. DefCamp takes place every year November 29-30th docTrackr was excited to present at DefCamp this year on a timely subject: how to keep the NSA off your back, and out of your data. Have a look at our slides for the event. You might get some ideas for protecting your own data If you'd like to learn more about docTrackr, you can head over to www.docTrackr.com and try our free document security tools for yourself!

TRANSCRIPT

DRM to p0wn NSA in a few easy steps

Dan Gheorghe, Software EngineerdocTrackr.com

ARE YOU IN CONTROL OF YOUR DATA?

ARE YOU IN CONTROL OF YOUR DATA?

Today’s Trend/Reality in the Cloud

UsersUsag

e

Email

Download Documents

SYNC WITH OTHER SYSTEMS

DLP – an answer ?

CATEGORIES OF DLP

• NETWORK AKA DATA IN MOTION

• STORAGE AKA DATA AT REST

• ENDPOINT AKA DATA IN USE

… NOT REALLY

1. IT’S CUMBERSOME FOR END USERS

2. NOT DESIGNED FOR COLLABORATION

3. COMPLEX ENTERPRISE-WIDE DEPLOYMENT

4. NOT 100% RELIABLE (FALSE POSITIVES)

DLP IS TRANSMISSION CONTROL

NOT DESIGNED TO ALLOW SECURE DATA SHARING AND COLLABORATION WHILE PREVENTING

DOCUMENT LEAKAGE

WHAT HAPPENS BEYOND ENTREPRISE BOUNDARIES?

Passwords ?

•Password security which uses RC4 128bit encryption or 128-bit AES Adobe 8 Generation technology•Public Key Infrastructure (PKI) encryption

WE NEED A NEW APPROACH

“How can we assure that only authorized people read classified data?”

“How can we assure the recipients do not share unauthorized data”

“How can we guarantee that data is not manipulated, unintentionally or fraudulently?”

DATA CENTRIC PROTECTION

If we cannot protect the data, why not let the data protect itself?

Information RightsInformation RightsManagement Management

Security

Control

as aas aServiceService

Information RightsInformation RightsManagement Management

1/ You create your document as usual

2/ Send it through a protection

engine

3/ The server monitors who can access the file and how.

And in 3 clicks you’ve got a doc ready to share securely!

How does it work?

Once your recipient gets it

Adobe PDF

Reader

MicrosoftOffice

Once your recipient gets it

He opens it with his or her usual

tools

Adobe PDF

Reader

MicrosoftOffice

1/ Checks if it’s the right version

Adobe PDF

Reader

MicrosoftOffice

1/ Checks if it’s the right version2/ If the recipient has permission

Adobe PDF

Reader

MicrosoftOffice

1/ Checks if it’s the right version2/ If the recipient has permission3/ And if yes, what he can do.

‣Revocation‣Cut/Paste‣Edit‣Print‣...

Adobe PDF

Reader

MicrosoftOffice

1/ Checks if it’s the right version2/ If the recipient has permission3/ And if yes, what he can do.

‣Revocation‣Cut/Paste‣Edit‣Print‣...

Adobe PDF

Reader

MicrosoftOffice

1/ Checks if it’s the right version2/ If the recipient has permission3/ And if yes, what he can do.

‣Revocation‣Cut/Paste‣Edit‣Print‣...

docTrackrA new approach to IRM

No installBridge on-premise

privacy & cloud needs

SecurityAdobe & Microsoftbased encryption

Automatic

Mirroringof changes

Analytics Extended audit

trail & files statistics

docTrackr+

docTrackr for Gmail

Secure your document attachments on the fly

http://bit.ly/1bJceQp

dan@doctrackr.comdan@doctrackr.com

top related