{"id":21753,"date":"2023-04-17T09:01:14","date_gmt":"2023-04-17T17:01:14","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2023\/04\/17\/news-15484\/"},"modified":"2023-04-17T09:01:14","modified_gmt":"2023-04-17T17:01:14","slug":"news-15484","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2023\/04\/17\/news-15484\/","title":{"rendered":"Protect intellectual property with Govern 365 and Microsoft Purview"},"content":{"rendered":"<p><strong>Credit to Author: Christine Barrett| Date: Mon, 17 Apr 2023 17:00:00 +0000<\/strong><\/p>\n<p><em>This blog post is part of the Microsoft Intelligent Security Association&nbsp;<\/em><a href=\"https:\/\/aka.ms\/MISAguestblog\"><em>guest blog series<\/em><\/a><em>.&nbsp;<\/em><a href=\"https:\/\/aka.ms\/MISA\"><em>Learn more about MISA<\/em><\/a><em>.<\/em>&nbsp;<\/p>\n<p>Global supply chains face a broad range of risks, from physical threats to cybersecurity threats. Sharing information with suppliers is essential for the supply chain to function effectively, but it creates significant risks simultaneously with a potential loss of intellectual property (IP).&nbsp;Security is only as strong as the weakest link in the supply chain. Data compromised in the supply chain can be as damaging as that from within the organization.&nbsp;Digital rights management (DRM) is used by many industries, such as the music industry, to protect intellectual property.&nbsp;Organizations are beginning to look at this technology to protect their corporate IP.&nbsp;<a href=\"https:\/\/azuremarketplace.microsoft.com\/en-us\/marketplace\/apps\/netwoven.netwoven_office365governance_app?exp=ubp8&amp;tab=Overview\" target=\"_blank\" rel=\"noreferrer noopener\">Netwoven Govern 365<\/a> and <a href=\"https:\/\/www.microsoft.com\/security\/business\/information-protection\/microsoft-purview-information-protection\">Microsoft Purview Information Protection<\/a> provide a robust solution for managing your IP.&nbsp;<\/p>\n<h2 class=\"wp-block-heading\">Nine must-haves to implement a resilient supply chain information protection framework&nbsp;<\/h2>\n<p>The following items are essential for a robust supply chain framework:&nbsp;<\/p>\n<ol>\n<li>Keep an updated database of leading suppliers and their sub-tiers. This hierarchy can be very fluid, so it must be maintained and used carefully.&nbsp;&nbsp;<\/li>\n<li>Deploy Microsoft Purview Information Protection to automatically discover, classify, label, and protect sensitive data found in files and documents within your organization.&nbsp;&nbsp;<\/li>\n<li>Ensure all IP-related files emanating from applications such as computer-aided design software, productivity software, and other types of software are protected using the labels for the appropriate suppliers.&nbsp;&nbsp;<\/li>\n<li>Ensure that all information is protected appropriately based on the current hierarchy of leading suppliers and their sub-tiers.&nbsp;&nbsp;<\/li>\n<li>Establish that all data egress points from the company where sharing of files can occur with suppliers are protected.&nbsp;<\/li>\n<li>Put in place all appropriate legal contracts with the leading suppliers.&nbsp;<\/li>\n<li>Confirm that external users are registered appropriately in your identity management system to have access to the files.&nbsp;&nbsp;<\/li>\n<li>Limit trade restricted individuals from accessing critical information as a violation could lead to fines by the government.&nbsp;<\/li>\n<li>Create a solution that is easy to use by all users for adoption.&nbsp;<\/li>\n<\/ol>\n<h2 class=\"wp-block-heading\">Using Govern 365 for managing your supply chain&nbsp;<\/h2>\n<p>Govern 365 with Microsoft Purview Information Protection provides an automated and frictionless solution to protect your company\u2019s sensitive information and limit litigation and compliance exposure, without burdening productivity.&nbsp;<\/p>\n<p>The key features of Govern 365 that help improve supply chain protection are:<\/p>\n<ul>\n<li>Supply chain hierarchy management.<\/li>\n<li>Content Protection across the supply chain hierarchy.<\/li>\n<li>Easy to use self-service provisioning with Microsoft Teams.<\/li>\n<li>Ability to add and remove users easily using the workspace manager.<\/li>\n<li>Ability to restrict restricted individuals from accessing the workspace.<\/li>\n<li>Visibility and auditing capabilities for tracking usage.<\/li>\n<li>Dynamic Watermarking capabilities for additional protection.<\/li>\n<\/ul>\n<p>Govern 365 provides these features by leveraging your investments in <a href=\"https:\/\/www.microsoft.com\/security\/business\/microsoft-purview\">Microsoft Purview<\/a>. Microsoft Purview comes with information protection and <a href=\"https:\/\/www.microsoft.com\/security\/business\/information-protection\/microsoft-purview-data-loss-prevention\">data loss prevention<\/a> capabilities leveraged by Govern 365.&nbsp;<\/p>\n<p>A particular use case of Intellectual Property Management is a Virtual Data Room (VDR).&nbsp;Historically, VDR platforms were primarily used in specific industries that required enhanced protection of sensitive information. Consequently, the emphasis of these solutions has always been on the secure sharing of said information rather than secure collaboration during its ideation and creation.&nbsp;&nbsp;<\/p>\n<p>Govern 365 provides the ability to create VDRs.&nbsp;Here are some of the key features of Govern 365 VDR that organizations can use for supply chain IP protection.&nbsp;<\/p>\n<h3 class=\"wp-block-heading\">Unified Dashboard&nbsp;<\/h3>\n<p>The Unified Dashboard is a simple interface available in <a href=\"https:\/\/www.microsoft.com\/microsoft-teams\/group-chat-software\">Microsoft Teams<\/a> and the web that provides access to your existing VDRs and creates new ones easily.&nbsp;<\/p>\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"763\" height=\"459\" src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/04\/Picture1.png\" alt=\"Screenshot of the Netwoven Govern 365 virtual data room dashboard.\" class=\"wp-image-127068\" srcset=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/04\/Picture1.png 763w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/04\/Picture1-300x180.png 300w\" sizes=\"auto, (max-width: 763px) 100vw, 763px\" \/><\/figure>\n<p><em>Figure 1. Govern 365 Unified Dashboard<\/em>.<\/p>\n<p>The icons in the dashboard cards provide easy-to-navigate features for the user.&nbsp;<\/p>\n<h3 class=\"wp-block-heading\">Self-Service Workspace Provisioning&nbsp;<\/h3>\n<p>The provisioning wizard provides a self-service mechanism to create VDR workspaces easily. The choices below are examples that can be configured differently for your organization at the time of deployment.&nbsp;<\/p>\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" loading=\"lazy\" width=\"944\" height=\"1024\" src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/04\/Picture6-944x1024.png\" alt=\"Screenshot of the new Netwoven Govern 365 virtual data room workspace.\" class=\"wp-image-127071\" srcset=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/04\/Picture6-944x1024.png 944w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/04\/Picture6-277x300.png 277w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/04\/Picture6-768x833.png 768w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/04\/Picture6.png 1203w\" sizes=\"auto, (max-width: 944px) 100vw, 944px\" \/><\/figure>\n<p><em>Figure 2. Govern 365 New Workspace Request<\/em>.<\/p>\n<h3 class=\"wp-block-heading\">User Permissions Management&nbsp;<\/h3>\n<p>Using Govern 365 Access Manager, the workspace owner can easily add or remove users from the workspace or manage permissions at the workspace level.&nbsp;This automatically adjusts the permissions of the content in the workspace for the users.&nbsp;&nbsp;<\/p>\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" loading=\"lazy\" width=\"835\" height=\"1024\" src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/04\/Picture8-835x1024.png\" alt=\"Screenshot of the Netwoven Govern 365 virtual data room workspace manager.\" class=\"wp-image-127073\" srcset=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/04\/Picture8-835x1024.png 835w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/04\/Picture8-244x300.png 244w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/04\/Picture8-768x942.png 768w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/04\/Picture8.png 859w\" sizes=\"auto, (max-width: 835px) 100vw, 835px\" \/><\/figure>\n<p><em>Figure 3. Govern 365 Workspace Manager<\/em>.<\/p>\n<p>The workspace manager allows for access management at the workspace level.&nbsp;<\/p>\n<h3 class=\"wp-block-heading\">Use of Corporate Sensitivity Labels&nbsp;<\/h3>\n<p>Govern 365 leverages your corporate sensitivity labels to protect content in VDRs for internal and external use. It allows for encryption and content marking including dynamic watermarking.&nbsp;<\/p>\n<h3 class=\"wp-block-heading\">Analytics&nbsp;<\/h3>\n<p>The solution should automatically collect the necessary information about the user\u2019s actions within a given workspace in the form of an audit log that you can extract as a CSV file format at any time, better monitoring your security.&nbsp;<\/p>\n<p>The workspace analytics integrates with <a href=\"https:\/\/powerbi.microsoft.com\" target=\"_blank\" rel=\"noreferrer noopener\">Microsoft Power BI<\/a> to offer an exhaustive content inventory report of the workspace utilization.&nbsp;<\/p>\n<h2 class=\"wp-block-heading\">Doing more with less&nbsp;<\/h2>\n<p>Choosing a VDR provider for your organization takes work. Govern 365\u2019s VDRs are built to work with Microsoft Teams and SharePoint to protect your sensitive information while ensuring data sovereignty. Built on Information Protection, external and internal recipients can safely and securely take advantage of secure collaboration while having data stored in their repository, having an intuitive user experience that allows you to customize the product to suit your organizational needs. All in all, Govern 365 enables you to do more with less by utilizing your existing Microsoft 365 estate to its fullest, keeping your return on investment calculator ticking.&nbsp;<\/p>\n<h2 class=\"wp-block-heading\">About Netwoven<\/h2>\n<p>Netwoven is a Microsoft Solutions Partner focused on unraveling complex business problems leveraging Microsoft technologies. They work with their clients to create and execute digital transformation strategies around secure collaboration, modern software applications, more profound insights from data, advanced infrastructure, and security. Explore <a href=\"https:\/\/www.govern365.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">Govern 365<\/a> and visit the <a href=\"https:\/\/azuremarketplace.microsoft.com\/en-us\/marketplace\/apps\/netwoven.netwoven_office365governance_app?tab=overview\" target=\"_blank\" rel=\"noreferrer noopener\">Microsoft Azure Marketplace<\/a> for a free trial.&nbsp;<\/p>\n<h2 class=\"wp-block-heading\">Learn more<\/h2>\n<p>Learn more about <a href=\"https:\/\/www.microsoft.com\/security\/business\/information-protection\/microsoft-purview-information-protection\">Microsoft Purview Information Protection<\/a>.&nbsp;<\/p>\n<p>To learn more about the Microsoft Intelligent Security Association (MISA),&nbsp;<a href=\"https:\/\/aka.ms\/MISA\">visit the website<\/a>&nbsp;where you can learn about the MISA program, product integrations, and find MISA members. Visit the\u202f<a href=\"https:\/\/www.youtube.com\/playlist?list=PL3ZTgFEc7LyuEBQ_f-hBZXpbKHItlAd5-\" target=\"_blank\" rel=\"noreferrer noopener\">video playlist<\/a>\u202fto learn about the strength of member\u202fintegrations\u202fwith Microsoft products.\u202f&nbsp;<\/p>\n<p>To learn more about Microsoft Security solutions,&nbsp;<a href=\"https:\/\/www.microsoft.com\/security\/\">visit our&nbsp;website<\/a>.&nbsp;Bookmark the&nbsp;<a href=\"https:\/\/www.microsoft.com\/security\/blog\/\">Security blog<\/a>&nbsp;to keep up with our expert coverage on security matters. Also, follow us on LinkedIn (<a href=\"https:\/\/www.linkedin.com\/showcase\/microsoft-security\/\" target=\"_blank\" rel=\"noreferrer noopener\">Microsoft Security<\/a>) and Twitter (<a href=\"https:\/\/twitter.com\/@MSFTSecurity\" target=\"_blank\" rel=\"noreferrer noopener\">@MSFTSecurity<\/a>)&nbsp;for the latest news and updates on cybersecurity.<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2023\/04\/17\/protect-intellectual-property-with-govern-365-and-microsoft-purview\/\">Protect intellectual property with Govern 365 and Microsoft Purview<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\">Microsoft Security Blog<\/a>.<\/p>\n<p><a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2023\/04\/17\/protect-intellectual-property-with-govern-365-and-microsoft-purview\/\" target=\"bwo\" >https:\/\/blogs.technet.microsoft.com\/mmpc\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Christine Barrett| Date: Mon, 17 Apr 2023 17:00:00 +0000<\/strong><\/p>\n<p>Learn how to secure sensitive information within your global supply chain with Netwoven Govern 365 and Microsoft Purview Information Protection.<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2023\/04\/17\/protect-intellectual-property-with-govern-365-and-microsoft-purview\/\">Protect intellectual property with Govern 365 and Microsoft Purview<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\">Microsoft Security Blog<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10759,10378],"tags":[4500,22745],"class_list":["post-21753","post","type-post","status-publish","format-standard","hentry","category-microsoft","category-security","tag-cybersecurity","tag-microsoft-intelligent-security-association-misa"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/21753","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=21753"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/21753\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=21753"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=21753"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=21753"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}