Introduction and presentation to CEVA Logistics &
About … Seclore is a high growth information security product company focused on providing  Security without compromising collaboration Seclore’s flagship product Seclore FileSecure is used by  More than 1.5 million users  & some of the largest enterprises
Information exchange in the collaborative world Information is exchanged between Employees of the organisation Enterprise CUSTOMERS VENDORS Information is exchanged between employees & vendors & employees & customers What happens if an employee with privileged access leaves to join a competitor ? What happens if information shared with a vendor is lost by the vendor ? VPN SSL UTM Firewall … TELEMARKETER Competitors Firewalls
Underlying Issues Share it = It becomes his (also) Ownership and usage cannot be separated Shared once = Shared forever Impossible to “recall” information Out of the enterprise = Free for all Technology & processes are only applicable within
The Result Information lands up in public websites !
Information lifecycle … Create Store Transmit & collaborate Use Archive & Backup Delete DLP Anti-virus Anti-… Hard disk encryption SSL UTM Application security IDM DLP Vaults Digital shredders Heterogeneous policies … Heterogeneous infrastructure Security Desktops Laptops Mobile devices Removable media Email Content Management Online workspaces Remote desktops Shared folders Removable media Instant Messaging Desktops Laptops Mobile devices Archive Backup Document retention
Options for securing unstructured information Option 1 : Control Distribution . . .  Security Collaboration
Options for securing unstructured information Option 2 : Control Usage . . .  Security Collaboration Right Location Right Time Right Action Right Person
Seclore FileSecure WHO  can use the information People & groups  within and outside  of the organization can be defined as rightful users of the information WHAT  can each person do Individual actions like reading, editing, printing, distributing, copy-pasting, screen grabbing etc. can be controlled WHEN  can he use it Information usage can be time based e.g.  can only be used by Mr. A till 28th Sept  OR  only for the 2 days WHERE  can he use it from Information can be linked to locations e.g.  only 3rd floor office  by private/public IP addresses Seclore FileSecure allow enterprises to  define ,  implement  &  audit  information usage “policies”. A “policy” defines :
Information Rights Management Policies are Persistent : Policies are implemented on information and all its copies wherever they are transmitted or stored Dynamic : Policies can be changed without having access to or redistributing the information Monitored : Policy changes can be monitored  User actions are Monitored : Individual actions ( authorized  AND  unauthorized ) like viewing, editing, printing etc. are monitored and centrally available in a reporting tool
Information creation Maya’s Computer
Manual policy assignment Maya’s Computer
Policy definition – WHO, WHAT
Policy definition – WHEN, WHERE
Manual protection Owner of Document protects the file Maya’s Computer
Manual policy assignment Maya’s Computer
Hot Folder protection
Sharepoint upload
FileNet upload
Email send
Email send
Other options of applying policies Download of reports from transactional systems like ERP systems Extraction from business intelligence and reporting tools “ Discovery” by E-discovery and content aware DLP systems Pattern recognition Owner and format recognition ...
Policy controlled information
Collaboration Right Location Right Time Right Action Right Person organization
Collaboration - within Research  Dept. Maya Research Associate Neal Research Associate Head  Research
Recipient – within the enterprise Neal’s Computer
Rights display Neal’s Computer
Unauthorized print After a user “accepts” the policy is when the actual content is shown to him/her Neal’s Computer
Unauthorized print Neal’s Computer
Unauthorized copy Neal’s Computer
Unauthorized copy Neal’s Computer
Unauthorized screen grab Neal’s Computer
Recipient – within the enterprise One more users receives File Head Research Computer
Rights display This user has full control of document Head Research Computer
Collaboration - outside Policy admin Head Research Distributes files to other Internal Employees and External Users Research  Dept. Maya Research Associate Neal Research Associate Head  Research Head - Marketing Head - Finance Head - Legal External reviewer
External user identity management
Recipient - outside External Reviewer's  Computer
Explicit authentication External Reviewer's  Computer
Unauthorized save External Reviewer's  Computer
Unauthorized save External Reviewer's  Computer
Information audit Maya's  Computer
Information audit Maya's  Computer
Forensics Maya's  Computer
Owner (Maya) Redistributes the File with New Policy   Maya’s Computer
Old policy Old Policy Definition Maya's  Computer
Old policy Old Policy Definition Internal Users External Users
New policy New Policy definition Maya's  Computer
New policy Internal Users
Orphaned copies of information External Reviewer Still has a file on his desktop External Reviewer's  Computer
Policy control message External Reviewer's  Computer
The default disclaimer External Reviewer's  Computer
Key criteria in evaluating IRM for Ceva Format and application support Integration-friendliness around existing IT infrastructure Identity systems Transactions systems Reporting and BI tools ECM systems Auditing capabilities External user identity management Mature policy management and consulting services Licensing model User based / Protector based
Thank You Website : www.seclore.com Blog : blog.seclore.com  Phone : +91-22-4015-5252

More Related Content

PPT
Intro to Amazon S3
PPTX
Web scraping
PPTX
Serverless computing
PPTX
Azure Migration .pptx
PDF
AI in cloud
PPTX
Seclore: Information Rights Management
PDF
20 Latest Computer Science Seminar Topics on Emerging Technologies
Intro to Amazon S3
Web scraping
Serverless computing
Azure Migration .pptx
AI in cloud
Seclore: Information Rights Management
20 Latest Computer Science Seminar Topics on Emerging Technologies

What's hot (20)

PPTX
Hashiconf Israel 2022 - Terraform Pull Request Automation.pptx
PPTX
SplunkLive! Customer Presentation--ServiceNow
PPTX
Cloud computing: cost reduction
PDF
Business Models_Internet of Things (Part 02)
PPTX
Live Demo: Introducing the Spark Connector for MongoDB
PPTX
IoT
PDF
Scraping data from the web and documents
PPTX
Fog computing technology
PPTX
IAM Cloud
PDF
Unmasking the Dark Art of Vectored Exception Handling: Bypassing XDR and EDR ...
PPTX
PPT on web development & SEO
PPTX
WEB DEVELOPMENT
PPT
Web Servers (ppt)
PDF
Introduction to AIoT & TinyML - with Arduino
PDF
Intro to web scraping with Python
PPTX
Azure Migrate
PDF
MATS stack (MLFlow, Airflow, Tensorflow, Spark) for Cross-system Orchestratio...
PPTX
Manufacturing and the Industrial Internet of Things (IIoT)
PPTX
How to Move from Monitoring to Observability, On-Premises and in a Multi-Clou...
PDF
Event-Driven Transformation in Banking and FSI
Hashiconf Israel 2022 - Terraform Pull Request Automation.pptx
SplunkLive! Customer Presentation--ServiceNow
Cloud computing: cost reduction
Business Models_Internet of Things (Part 02)
Live Demo: Introducing the Spark Connector for MongoDB
IoT
Scraping data from the web and documents
Fog computing technology
IAM Cloud
Unmasking the Dark Art of Vectored Exception Handling: Bypassing XDR and EDR ...
PPT on web development & SEO
WEB DEVELOPMENT
Web Servers (ppt)
Introduction to AIoT & TinyML - with Arduino
Intro to web scraping with Python
Azure Migrate
MATS stack (MLFlow, Airflow, Tensorflow, Spark) for Cross-system Orchestratio...
Manufacturing and the Industrial Internet of Things (IIoT)
How to Move from Monitoring to Observability, On-Premises and in a Multi-Clou...
Event-Driven Transformation in Banking and FSI
Ad

Similar to Seclore File Secure Introduction Brief (20)

PPT
What Is Irm
PPT
What is IRM? bright talk
PPT
Vishal Seclore TR35
PDF
Ch06 Policy
PPTX
Cyber Security and Healthcare
PPTX
Presentation by Seclore Technologies at Zensar #TechShowcase. An iSPIRT Produ...
PPTX
Security Policy
PPTX
Seclore FileSecure HotFolder Walkthrough
PPT
nullcon 2011 - Protect infrastructure of protect information – Lessons from W...
PDF
Security Policy Checklist
PPTX
Information Security
PPTX
ISBB_Chapter6.pptx
PPTX
Information Security User Awareness Training.pptx
PDF
Don't Diligence Information Security for Lawyers
PPT
IT Security for the Physical Security Professional
PPTX
Network Security - What Every Business Needs to Know
PPTX
Ch15 power point
PPT
Network security, change control, outsourcing
PPT
Network Security, Change Control, Outsourcing
PPT
Information Security
What Is Irm
What is IRM? bright talk
Vishal Seclore TR35
Ch06 Policy
Cyber Security and Healthcare
Presentation by Seclore Technologies at Zensar #TechShowcase. An iSPIRT Produ...
Security Policy
Seclore FileSecure HotFolder Walkthrough
nullcon 2011 - Protect infrastructure of protect information – Lessons from W...
Security Policy Checklist
Information Security
ISBB_Chapter6.pptx
Information Security User Awareness Training.pptx
Don't Diligence Information Security for Lawyers
IT Security for the Physical Security Professional
Network Security - What Every Business Needs to Know
Ch15 power point
Network security, change control, outsourcing
Network Security, Change Control, Outsourcing
Information Security
Ad

Seclore File Secure Introduction Brief