35
Seclore Filesecure Hot Folder server Enhancing security of fileshares

Seclore FileSecure HotFolder Walkthrough

  • View
    608

  • Download
    12

Embed Size (px)

DESCRIPTION

Seclore FileSecure IRM & FileShare System

Citation preview

Page 1: Seclore FileSecure HotFolder Walkthrough

Seclore FilesecureHot Folder server

Enhancing security of fileshares

Page 2: Seclore FileSecure HotFolder Walkthrough

Contents

• The Problem with Fileshare security

• The Solution ..• What is Seclore FileSecure• What is Hot Folder Server• Policy definition• Assigning policies to folders• Protecting a file• Accessing a protected file• Audit trails

• About Seclore2

Page 3: Seclore FileSecure HotFolder Walkthrough

A Process Flow of Product PlanFileshares and security

File Share FolderUserUser

Edited

Copied

Printed

ViewedUn-protected File

Distributed

Fileshare accessed by users

Fileshare security is not persistent . Once the file is copied locally, it can be edited, copied & distributed.

Page 4: Seclore FileSecure HotFolder Walkthrough

Contents

• The Problem with Fileshare security

• The Solution ..• What is Seclore FileSecure• What is Hot Folder Server• Policy definition• Assigning policies to folders• Protecting a file• Accessing a protected file• Audit trails

• About Seclore4

Page 5: Seclore FileSecure HotFolder Walkthrough

5

• WHO can use the information

People & groups within and outside of the organization can be defined as rightful users of the information

• WHAT can each person doIndividual actions like reading, editing, printing,

distributing, copy-pasting, screen grabbing etc. can be controlled

• WHEN can he use itInformation usage can be time based e.g. can

only be used by Mr. A till 28th Sept OR only for the 2 days

• WHERE can he use it fromInformation can be linked to locations e.g. only

3rd floor office by private/public IP addresses

Seclore FileSecure allow enterprises to define, implement & audit information usage “policies”. A “policy” defines :

Seclore FileSecure

Page 6: Seclore FileSecure HotFolder Walkthrough

• Policies are– Persistent: Implemented on information and all its copies

wherever it is transmitted or stored– Dynamic: Policies can be changed after distributing

information without having access to or redistributing the information

• Policies can be attached to information on– Creation– Placement in a certain location e.g. shared folder– Attachment to email– Uploading to a document management / ECM system– …

Seclore FileSecure

Page 7: Seclore FileSecure HotFolder Walkthrough

Contents

• The Problem with Fileshare security

• The Solution ..• What is Seclore FileSecure• What is Hot Folder Server• Policy definition• Assigning policies to folders• Protecting a file• Accessing a protected file• Audit trails

• About Seclore7

Page 8: Seclore FileSecure HotFolder Walkthrough

A Process Flow of Product PlanHot Folder enabled Fileshare

UserUser

Hot Folder accessed by users

Files copied out of “Hot Folders” are persistently protected. Rights to edit, copy, print and distribute are restricted based

on Seclore FileSecure policies

File Share+ Seclore FileSecure

Edited

Copied

Printed

ViewedProtected File

Distributed

Page 9: Seclore FileSecure HotFolder Walkthrough

Contents

• The Problem with Fileshare security

• The Solution ..• What is Seclore FileSecure• What is Hot Folder Server• Policy definition• Assigning policies to folders• Protecting a file• Accessing a protected file• Audit trails

• About Seclore9

Page 10: Seclore FileSecure HotFolder Walkthrough

10

Policy definition–WHO, WHAT

Policy Admin

People / groups, within / outside the enterprise can be dis-allowed to edit, print, copy, forward etc. via a policy

Page 11: Seclore FileSecure HotFolder Walkthrough

11

Policy definition–WHEN, WHERE

Policy Admin

A policy can expire information beyond a date / timespan and also restrict its usage to certain computers / networks

Page 12: Seclore FileSecure HotFolder Walkthrough

Contents

• The Problem with Fileshare security

• The Solution ..• What is Seclore FileSecure• What is Hot Folder Server• Policy definition• Assigning policies to folders• Protecting a file• Accessing a protected file• Audit trails

• About Seclore12

Page 13: Seclore FileSecure HotFolder Walkthrough

13

Defining Hot Folders …

FileshareAdmin

Policies can be attached to folders by the Fileshare admin. The admin chooses the folder …

Page 14: Seclore FileSecure HotFolder Walkthrough

14

… Defining Hot Folders

FileshareAdmin

… and the policy to be applied to files in the folder

Page 15: Seclore FileSecure HotFolder Walkthrough

Contents

• The Problem with Fileshare security

• The Solution ..• What is Seclore FileSecure• What is Hot Folder Server• Policy definition• Assigning policies to folders• Protecting a file• Accessing a protected file• Audit trails

• About Seclore15

Page 16: Seclore FileSecure HotFolder Walkthrough

16

Protecting files

File creator’s computer

The creator of the file drags-and-drops the file into the Hot Folder. The file is instantly protected.

Page 17: Seclore FileSecure HotFolder Walkthrough

Contents

• The Problem with Fileshare security

• The Solution ..• What is Seclore FileSecure• What is Hot Folder Server• Policy definition• Assigning policies to folders• Protecting a file• Accessing a protected file• Audit trails

• About Seclore17

Page 18: Seclore FileSecure HotFolder Walkthrough

18

Rights display

User’s Computer

On clicking a rights display makes the recipient explicitly aware of his rights to the document

Page 19: Seclore FileSecure HotFolder Walkthrough

19

Unauthorized print

User’s Computer Unauthorized activities like attempts to print …

Page 20: Seclore FileSecure HotFolder Walkthrough

20User’s

Computer … are disallowed

Unauthorized print

Page 21: Seclore FileSecure HotFolder Walkthrough

21User’s

Computer Unauthorized activities like attempts to edit & save…

Unauthorized edit & save

Page 22: Seclore FileSecure HotFolder Walkthrough

22User’s

Computer … are disallowed

Unauthorized edit & save

Page 23: Seclore FileSecure HotFolder Walkthrough

23User’s

Computer

Unauthorized copy

Attempts to copy parts / whole of the document …

Page 24: Seclore FileSecure HotFolder Walkthrough

24User’s

Computer … are disallowed

Unauthorized copy

Page 25: Seclore FileSecure HotFolder Walkthrough

25User’s

ComputerScreen capture by the Prt Scr key, screen grabbing tools like

Camtasia and screen sharing tools like Webex is blocked

Unauthorized screen grab

Page 26: Seclore FileSecure HotFolder Walkthrough

Contents

• The Problem with Fileshare security

• The Solution ..• What is Seclore FileSecure• What is Hot Folder Server• Policy definition• Assigning policies to folders• Protecting a file• Accessing a protected file• Audit trails

• About Seclore26

Page 27: Seclore FileSecure HotFolder Walkthrough

27User’s

Computer

The audit captures the WHO, WHAT, WHEN and WHERE of the access attempt. Authorized and unauthorized attempts

are captured and reported

Information audit

Page 28: Seclore FileSecure HotFolder Walkthrough

Contents

• The Problem with Fileshare security

• The Solution ..• What is Seclore FileSecure• What is Hot Folder Server• Policy definition• Assigning policies to folders• Protecting a file• Accessing a protected file• Audit trails

• About Seclore28

Page 29: Seclore FileSecure HotFolder Walkthrough

29

Corporate Background …

“Seclore is a high growth software product company. Seclore’s technology helps mitigate the risks arising out of information breaches whilst

enhancing collaboration”

6 years old, Headquartered in Mumbai, India

Promoted by IIT Bombay under the SINE program - www.sineiitb.org

Geographical and customer presence in Middle East, ASEAN, SAARC & Europe

Offerings focused on Information Rights Management and Secure Outsourcing

Stake holders including

IIT Bombay – www.iitb.ac.in

ICICI Bank – www.icicibank.com

Ventureast – www.ventureast.net

Technology and service differentiators focusing on minimally intrusive technology, value based pricing and usage without training

Page 30: Seclore FileSecure HotFolder Walkthrough

30

About …Value to customers

Security without compromising on collaborationCustomers across

….Diversified business groups

….Large financial services groups

….Engineering and manufacturing organizations

….Defence, Software, BPO, Consulting, Services, ….

Page 31: Seclore FileSecure HotFolder Walkthrough

31

What customers say about us …

“We chose Seclore FileSecure due to the flexibility provided by Seclore in terms of solution capabilities and customization. Implementation of Seclore FileSecure has reduced the exposure of critical data for potential misuse or frauds. The business benefits are tremendous.” - Murli Nambiar, Head of Information Security

"Financial services companies like banks, insurance carriers & broking are ‘opening up’ their information systems and processes for participation by customers, partners and vendors. This of course brings in a lot of value chain integration and lowers costs but comes with information security needs which cannot be solved by present day systems. Seclore’s technology for securing documents as they flow within and outside enterprises as well as securing data shared with outsourcing partners is extremely relevant. - C N Ram. Group CIO, Essar group

Page 32: Seclore FileSecure HotFolder Walkthrough

32

What industry experts say …

“Information breaches normally result in intellectual property violation which is a serious problem affecting industry today. Seclore’s combination of preventive and corrective methods of handling information breaches is invaluable to any industry” - Haigreve Khaitan (Managing partner – Khaitan and Co)

“Collaboration, security and privacy appear as mutually conflicting goals with most present day technologies. Seclore has resolved this conflict in a very elegant manner with its technology.” - Animesh Parihar (Global Delivery Head – SAP)

Seclore’s approach is different in that they not mandatory rely on such plug-ins but mainly act “below” the application. The client component (which is required to access protected, e.g. encrypted, documents) tries to analyze the activities off the application like access to the file system. One impact of that approach is that a document might be opened with different applications supporting the specific document format.

- Martin Kuppinger, One of the fore-most information security analysts

Page 33: Seclore FileSecure HotFolder Walkthrough

33

Deloitte Technology Fast 50 is a ranking compiled every year based on percentage of growth of fiscal year revenue over three years. The companies must also fulfil other criterion of technology orientation.

‘Hidden Gems’ 2010 by Kuppinger Cole, Europe’s leading information security analyst firm is a report

which lists vendors, which have a significantly differentiated offering and are market leaders in a

particular segment.

Awards and recognition …

Page 34: Seclore FileSecure HotFolder Walkthrough

34

… Awards and recognition

The TR35 award is for innovators whose inventions and research, Massachusetts Institute of Technology (MIT) finds exciting. Technology Review, owned and published by MIT, is the world’s oldest technology magazine.

“Innovations – ideas in practice” is an annual event honoring researchers and innovators for creative and innovative work in the sphere of science and technology. The innovation needs to have a high

degree of practical relevance to change everyday life.

Page 35: Seclore FileSecure HotFolder Walkthrough

35

More Info?

www.seclore.com+91-22-4015-5252