Protecting Electronic Information - AD RMS & IRM

Secure Collaboration and Data Loss Prevention

Ensuring the privacy and confidentiality of electronic information is a difficult task. As information becomes increasingly fluid, it also becomes increasingly subject to access by multiple applications and people, including many that are outside of the organization. It is crucial to ensure that only the right personnel have access to the intended data, and to enforce strict limits on their ability to share the data outside the organization.

Complying with Privacy Regulations

Increasingly, governments are passing legislation to ensure the privacy of information. Examples of these regulations include the Health Insurance Portability and Accountability Act (HIPAA), the Economic Espionage Act (EEA), the Fair and Accurate Credit Transaction Act (FACTA), and the Gramm-Leach-Bliley Act.

What is AD RMS and IRM?

Active Directory Rights Management Services (AD RMS) - is information protection technology that works with AD RMS-enabled applications to help safeguard digital information from unauthorized use, both online and offline, and inside and outside of a firewall. AD RMS is designed for organizations that need to protect sensitive and proprietary information such as financial reports, patient records, product specifications, customer data, and confidential e-mail messages.

Information Rights Management (IRM) - is a persistent file-level technology from Microsoft. It uses permissions and authorization to help prevent sensitive information from being printed, forwarded, or copied by unauthorized people. After permission for a document or message is restricted by using this technology, the usage restrictions travel with the document or email message as part of the contents of the file. IRM integrates with AD RMS.

How it works?

What can we help you with?

InfoToad Consulting will help by performing a Risk/Gap Analysis and developing a Threat Model as part of your Information Lifecycle Management design. The Risk/Gap Analysis provides a means to evaluate gaps in the measures that have taken to protect data against privacy, confidentiality, and compliance threats and to manage residual risks in the context of a specific data flow. The Threat Model will determine the requirements for data privacy, confidentiality and compliance.

Our Team of Experts will design, integrate and implement your new Active Directory Rights Management and Information Rights Management solution. This would include integration between SharePoint, Microsoft Office/O365, Exchange Server and AD RMS enabled custom solutions.

AD RMS & IRM Key Benefits (On-premise and Cloud)

  • Automated protection/classification approach and product roadmap
    • SharePoint
    • Exchange Server
    • Office & O365
    • Microsoft Project
    • File Classification Infrastructure (FCI)

  • High-level Extensibility
    • Automatic Protection and Classification
    • Additional File Formats