Right Management Services

Introducing RMS in the Windows Platform
RMS has been introduced in response to that need and combines features of the Windows Server 2003/2008 operating system with developer tools, and industry security technologies–including encryption, Extensible Rights Markup Language (XrML)-based certificates and authentication–to help create reliable information protection solutions.

RMS is information protection technology that works with RMS-enabled applications to help safeguard digital information from unauthorized use–both online and offline, inside and outside of the firewall. Information workers can define exactly how the recipient can use the information, such as who can open, modify, print, forward, and/or take other actions with the information. Organizations can create custom usage rights templates such as “Confidential - Read Only” that can be applied directly to information such as financial reports, product specifications, customer data, and e-mail messages. For example, RMS can help protect information in a wide range of situations, including the following:
Intranet content :
A manager within a large multinational pharmaceuticals company has been granted access to the online sales system. She navigates to the year-over-year sales information on the enterprise information portal, and the information is displayed on-screen within her RMS-enabled browser. Because the information is sensitive, specific usage restrictions have been applied to the report she sees. The manager gets the information she needs, conveniently, but because she does not have rights to print, copy, or paste the information on screen, the company’s sensitive sales data is better protected from inadvertent or deliberate sharing with an unauthorized individual.
E-mail communications :
A CEO needs to send an e-mail message that contains confidential information about an upcoming reorganization to his executive staff. In his RMS-enabled e-mail application, he selects a template to specify that recipients can only read the e-mail message, and that they cannot copy, paste, edit, or forward the information. The recipients receive the e-mail message and view it in an RMS-enabled e-mail application or browser, which transparently enforces the permissions. The CEO has a new level of confidence that this sensitive information will not be shared beyond his executive staff.
Documents :
Using a simple on-screen toolbar button or menu prompt built into her RMS-enabled word processor, a research manager at a manufacturing company rights-protects a new product research report to allow selected members of the product development team to preview and comment on the information for exactly one week. She sends the rights-protected document to multiple people via e-mail. When each person opens the document, their RMS-enabled word processor or browser enforces the rights assigned to the document, including the time-based conditions; after a week, the rights expire and these individuals can no longer open the document. The research manager then rights-protects and distributes the final version as company confidential read-only to the entire product development team. The research manager feels confident that the product development team only has access to the final information and that it is protected from unauthorized individuals, such as a competitor, viewing this information.

RMS protects through persistent usage policies that remain with information no matter where it goes. This helps organizations prevent sensitive information from intentionally or accidentally getting into the wrong hands.
Features :
Protect viewing and usage
  1. Encryption restricts viewing to authorized users.
  2. Usage policies control use of information.
  3. Information author applies the policy with an RMS-enabled application.
Persistent usage policies
  1. Usage rights are stored in the document itself – at the file level.
  2. Policies remain with information – even in transport – rather than on network.
  3. Protection works online and offline, inside and outside of the firewall.
Reliable solutions
  1. Windows Server 2003/2008 features and tools
  2. Industry security technologies – encryption, XrML – based certificates, authentication.
Flexible, customized technology
  1. RMS SDK contains an integrated RMS client and server SDK
  2. Safeguard sensitive information with any RMS-enabled application
  3. Allows other information technology vendors to integrate information protection for a comprehensive platform solution.
Benefits :
  1. Safeguards sensitive information from unauthorized use
  2. Provides persistent protection of information, no matter where it goes
  3. Augments perimeter-based security
  4. Low-overhead administration and ease of use
  5. Centrally defines and manages usage policies that are digitally enforced
  6. Creates an audit trail of rights-protected information
  7. Provides flexible technology that is easy to administer and easy to extend
  8. Implements industry standards: XrML and AES 128-bit encryption
  9. Enables out-of-the-box experience with Microsoft Office Editions
  10. IE is RMS-enabled with Rights Management Add-on (RMA) and serves as a down-level viewer