12.07.2015 Views

IRM - EMC Community Network

IRM - EMC Community Network

IRM - EMC Community Network

SHOW MORE
SHOW LESS
  • No tags were found...

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

ConclusionThe objective of the <strong>EMC</strong> Documentum <strong>IRM</strong> architecture is to extend the security and control of sensitiveinformation beyond delivery to and access by authorized users. As such, it faces unique challenges. The <strong>IRM</strong> systemuses strong industry-standard cryptography, combined with unique client-server architecture, to address thosechallenges. Great care has been taken to ensure the security of communications between the client and server, toprevent direct access to the encryption keys and plain text, and to control what can be done with the informationonce it is decrypted and displayed to the user. The resulting persistent control opens entirely new opportunitiesregarding the way sensitive information can be shared.<strong>EMC</strong> Documentum <strong>IRM</strong> should be considered a critical piece of the overall security solution an organizationdeploys. This includes the physical security of the computer, control over what users can install on their computer,control over who has access to the data based on access control lists, forcing users to authenticate to the content. Thevalue added by <strong>EMC</strong> Documentum <strong>IRM</strong> is that of an additional layer of dynamic protection and auditing ofinformation after it is opened. <strong>IRM</strong> provides object level protection of the information itself, regardless of wherethat information is located – inside or outside your secure environment.Overview of Technical Architecture Page 22

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!