Seclore Overview Dec2014.pdf

Embed Size (px)

Citation preview

  • 8/16/2019 Seclore Overview Dec2014.pdf

    1/30

    Securing Info

    Most of us can keep a secret.

    It is the people we tell it to, who cannot.

    - A

  • 8/16/2019 Seclore Overview Dec2014.pdf

    2/30

  • 8/16/2019 Seclore Overview Dec2014.pdf

    3/30

    Securing Info

    High-growth Document Rights & Access Management softw

    product company

    India Headquarters - Mumbai, India

    Global Headquarters – Mumbai, India

    Who We Are

    • Incubated and promoted by IIT Bombay (2006-08)

    o Technology commercialization program “SINE” (www.sineiitb.org)

    • 250 clients, 22 countries, 3.5 millions users

    • Geographic coverage

    o Direct – South Asia, Europe, North America, Middle East

    o Indirect – Africa, South America, North Asia

  • 8/16/2019 Seclore Overview Dec2014.pdf

    4/30

    Securing Info

    Awards & Recognition

    2012 Gartner Cool Vendor for 2012

    2009 Marico Innovation for India 2010 Awards

    Kuppinger Cole Global list of "Hidden Gems" in IAM in 2012010

    Top 10 finalists in the Innovations Ideas in Practice 2010 by IIT, Bom

    Alumni Association, Pune2010

    TR35 award for innovators, whose inventions and research,

    Massachusetts Institute of Technology (MIT) finds exciting2009

    2012

    Deloitte Technology Fast 50 for 2012, and again in 20132013

  • 8/16/2019 Seclore Overview Dec2014.pdf

    5/30Securing Info

    MARQUEE CUSTOMERS

  • 8/16/2019 Seclore Overview Dec2014.pdf

    6/30Securing Info

    Marquee Customers - India

  • 8/16/2019 Seclore Overview Dec2014.pdf

    7/30

    Securing Info

    Marquee Customers - ROW

  • 8/16/2019 Seclore Overview Dec2014.pdf

    8/30

    Securing Info

    THE PRO LEMS…

    Seclore FileSecure

  • 8/16/2019 Seclore Overview Dec2014.pdf

    9/30

    Securing Info

    StructuredDatabases

    Digital

    Information

    ApplicationsERP, CRM, DW 

    MIS / Reports / Data ExtractsC

    File

    U

    I

    Gartner 2013

    Big Content: The Unstructured Side of Big Data

    “Unstructured data represents as much as 80% of

    an organization’s total information assets” 

    Enterprise Information Universe

  • 8/16/2019 Seclore Overview Dec2014.pdf

    10/30

    Securing Info

    Internal: Perimeter Definition Challenges

    End Points Locations

    People Applications

    Bring Your Own Device

    iPads in BoardroomMobile Employees

    External Collaboration

    Lawyers, Auditors, Partners,

    Service Providers, Joint

    Ventures, Customers, …

    Cloud Applications:

    SalesForce…

    Cloud Services: DropBox…

  • 8/16/2019 Seclore Overview Dec2014.pdf

    11/30

    Securing Info

    Very often, information needs to travel outside the enterprise

    Every enterprise needs External Collaborat

    External: Information Going Out

  • 8/16/2019 Seclore Overview Dec2014.pdf

    12/30

    Securing Info12 Seclore Company Confidential

    Legacy Handling of Information Loss 1

    Non-Disclosure Agreement

  • 8/16/2019 Seclore Overview Dec2014.pdf

    13/30

    Securing Info13 Seclore Company Confidential

    Legacy Handling of Information Loss 2

  • 8/16/2019 Seclore Overview Dec2014.pdf

    14/30

    Securing Info

    Legacy Handling of Information Loss 3

    14 Seclore Company Confidential

  • 8/16/2019 Seclore Overview Dec2014.pdf

    15/30

    Securing Info

    Information

    sent

    out(side)

    is

    IMPOSSIBLEto control

    The Problem…

    http://images.google.com/imgres?imgurl=http://jasonmarshall.net/wp-content/uploads/2009/05/email_automation.gif&imgrefurl=http://jasonmarshall.net/&usg=__1sFUL-yUk18c9-_79OQ0ISwPzko=&h=350&w=315&sz=85&hl=en&start=3&um=1&tbnid=-z2A-JbUsqleuM:&tbnh=120&tbnw=108&prev=/images?q=email&hl=en&rls=com.microsoft:en-us:IE-SearchBox&um=1

  • 8/16/2019 Seclore Overview Dec2014.pdf

    16/30

    Securing Info

    THE SOLUTION…

    Seclore FileSecure

  • 8/16/2019 Seclore Overview Dec2014.pdf

    17/30

    Securing Info

    Holistic information loss prevention

    Data

    Classification

    Content In(aka Data Leakag

    DC

    CIRMRights

    Management

  • 8/16/2019 Seclore Overview Dec2014.pdf

    18/30

    Securing Info

    TOP SECRET

    CONFIDENTIAL

    INTERNAL

    PUBLIC

    PRO

    POLICY 1

    POLICY 2

    POLICY 4

    POLICY 3

    Ensure information is used without be

    What FileSecure Controls

  • 8/16/2019 Seclore Overview Dec2014.pdf

    19/30

    Securing Info

    PermanenceProtection will always persist with the file

    Remote-ControlChange your protection policy,

    sitting anywhere in the world

    Audit TrailAll activities on file tracked:

    Users, Activity type, Date/Tim

    Policy Attributes

  • 8/16/2019 Seclore Overview Dec2014.pdf

    20/30

    Securing Info

    Use in native application (DC)• File extension in maintained

    • File opens in native application

    (e.g. MS-Office, Acrobat Reader, AutoCAD, OpenOffice)

    No authentication overheadFor internal users, integrate with AD and other IAM / SSO tools

    Smart devices supportiOS and Android viewers, for smartpho

    BYOD

    Easy for Users (Recipients)

  • 8/16/2019 Seclore Overview Dec2014.pdf

    21/30

    Securing Info

    APIIntegrationERP, CRM,DW, etc.

    Data LossPrevention

    Content /Document

    Management

    Mail &Messaging* Recipient can use any

    mail client 

    Ease of protection (Automatic Protection)

  • 8/16/2019 Seclore Overview Dec2014.pdf

    22/30

    Securing Info

    Securing Information Wherever It Goes

  • 8/16/2019 Seclore Overview Dec2014.pdf

    23/30

    Securing Info

    Thank You!www.seclore.com | [email protected] | http://blog.seclore.com

  • 8/16/2019 Seclore Overview Dec2014.pdf

    24/30

    Securing Info

    AUDIT TRAIL

    Seclore FileSecure

  • 8/16/2019 Seclore Overview Dec2014.pdf

    25/30

    Securing Info

    WHO accessed thefile, WHAT did theuser do, WHEN &

    WHERE, is all capturedfrom distributedusage environmentsand reported centrally

    Audit reports can beused in compliance

    reporting forframeworks like ISO27001, Sarbanes-Oxley, GLBA, PCI-DSS,HIPAA, etc.

    Audit Usage of Information

    …not just Information ystems

  • 8/16/2019 Seclore Overview Dec2014.pdf

    26/30

    Securing Info

    DLP INTEGRATION

    Seclore FileSecure

  • 8/16/2019 Seclore Overview Dec2014.pdf

    27/30

    Securing Info

    DLP processes monitoring “Data at Rest” can invoke FileSecure API to protect fil

     A document gets protected as soon as it is “discovered” or “tagged”

    Content Discovery (DLP) Based Protection

  • 8/16/2019 Seclore Overview Dec2014.pdf

    28/30

    Securing Info

    ECM INTEGRATION

    Seclore FileSecure

  • 8/16/2019 Seclore Overview Dec2014.pdf

    29/30

    Securing Info

    DOWNLOAD

    UPLOAD

    Checkout

    Protection & Download

    Check in

    Versioning

    Ensuring File Security is Present outside SharePoint 

    Ensuring SharePoint features are not Aff

    Document Management Systems like

  • 8/16/2019 Seclore Overview Dec2014.pdf

    30/30

    Securing Info

    Integration Option in MS SharePoint 

    Document Management System Protection