seclore file secure introduction brief
DESCRIPTION
Basis presentatie van Seclore filesecureTRANSCRIPT
![Page 1: Seclore File Secure Introduction Brief](https://reader035.vdocuments.site/reader035/viewer/2022062418/55669718d8b42a51558b53db/html5/thumbnails/1.jpg)
Introduction and presentation to CEVA Logistics
&
![Page 2: Seclore File Secure Introduction Brief](https://reader035.vdocuments.site/reader035/viewer/2022062418/55669718d8b42a51558b53db/html5/thumbnails/2.jpg)
About …About …
Seclore is a high growth information security product company focused on providing Security without compromising collaboration
Seclore’s flagship product Seclore FileSecure is used by More than 1.5 million users & some of the largest enterprises
![Page 3: Seclore File Secure Introduction Brief](https://reader035.vdocuments.site/reader035/viewer/2022062418/55669718d8b42a51558b53db/html5/thumbnails/3.jpg)
TELEMARKETER
Information exchange in the collaborative world
Information is exchanged between Employees of the organisation
Enterprise
CUSTOMERS
VENDORS
Information is exchanged between employees & vendors & employees & customers
Competitors
What happens if an employee with privileged access leaves to join a competitor ?What happens if information shared with a vendor is lost by the vendor ?
VPN
SSL
UTM
Firewall
…
Firewalls
![Page 4: Seclore File Secure Introduction Brief](https://reader035.vdocuments.site/reader035/viewer/2022062418/55669718d8b42a51558b53db/html5/thumbnails/4.jpg)
Underlying Issues
Share it = It becomes his (also)Ownership and usage cannot be separated
Shared once = Shared foreverImpossible to “recall” information
Out of the enterprise = Free for allTechnology & processes are only applicable within
![Page 5: Seclore File Secure Introduction Brief](https://reader035.vdocuments.site/reader035/viewer/2022062418/55669718d8b42a51558b53db/html5/thumbnails/5.jpg)
Options for securing unstructured information
Option 1 : Control Distribution
. . .
Security Collaboration
![Page 6: Seclore File Secure Introduction Brief](https://reader035.vdocuments.site/reader035/viewer/2022062418/55669718d8b42a51558b53db/html5/thumbnails/6.jpg)
Options for securing unstructured information
Option 2 : Control Usage
. . .
Security Collaboration
RightLocation
RightTime
RightAction
RightPerson
![Page 7: Seclore File Secure Introduction Brief](https://reader035.vdocuments.site/reader035/viewer/2022062418/55669718d8b42a51558b53db/html5/thumbnails/7.jpg)
• WHO can use the information
People & groups within and outside of the organization can be defined as rightful users of the information
• WHAT can each person doIndividual actions like reading, editing, printing,
distributing, copy-pasting, screen grabbing etc. can be controlled
• WHEN can he use itInformation usage can be time based e.g. can
only be used by Mr. A till 28th Sept OR only for the 2 days
• WHERE can he use it fromInformation can be linked to locations e.g. only
3rd floor office by private/public IP addresses
Seclore FileSecure allow enterprises to define, implement & audit information usage “policies”. A “policy” defines :
Seclore FileSecure
![Page 8: Seclore File Secure Introduction Brief](https://reader035.vdocuments.site/reader035/viewer/2022062418/55669718d8b42a51558b53db/html5/thumbnails/8.jpg)
Information Rights Management
Policies are• Persistent : Policies are implemented on information and all
its copies wherever they are transmitted or stored• Dynamic : Policies can be changed without having access to
or redistributing the information• Monitored : Policy changes can be monitored
User actions are• Monitored : Individual actions ( authorized AND
unauthorized ) like viewing, editing, printing etc. are monitored and centrally available in a reporting tool
![Page 9: Seclore File Secure Introduction Brief](https://reader035.vdocuments.site/reader035/viewer/2022062418/55669718d8b42a51558b53db/html5/thumbnails/9.jpg)
Maya’sComputer
Information creation
![Page 10: Seclore File Secure Introduction Brief](https://reader035.vdocuments.site/reader035/viewer/2022062418/55669718d8b42a51558b53db/html5/thumbnails/10.jpg)
Maya’sComputer
Manual policy assignment
![Page 11: Seclore File Secure Introduction Brief](https://reader035.vdocuments.site/reader035/viewer/2022062418/55669718d8b42a51558b53db/html5/thumbnails/11.jpg)
Policy definition – WHO, WHAT
![Page 12: Seclore File Secure Introduction Brief](https://reader035.vdocuments.site/reader035/viewer/2022062418/55669718d8b42a51558b53db/html5/thumbnails/12.jpg)
Policy definition – WHEN, WHERE
![Page 13: Seclore File Secure Introduction Brief](https://reader035.vdocuments.site/reader035/viewer/2022062418/55669718d8b42a51558b53db/html5/thumbnails/13.jpg)
Owner of Document protects the file
Maya’sComputer
Manual protection
![Page 14: Seclore File Secure Introduction Brief](https://reader035.vdocuments.site/reader035/viewer/2022062418/55669718d8b42a51558b53db/html5/thumbnails/14.jpg)
Maya’sComputer
Manual policy assignment
![Page 15: Seclore File Secure Introduction Brief](https://reader035.vdocuments.site/reader035/viewer/2022062418/55669718d8b42a51558b53db/html5/thumbnails/15.jpg)
Hot Folder protection
![Page 16: Seclore File Secure Introduction Brief](https://reader035.vdocuments.site/reader035/viewer/2022062418/55669718d8b42a51558b53db/html5/thumbnails/16.jpg)
Sharepoint upload
![Page 17: Seclore File Secure Introduction Brief](https://reader035.vdocuments.site/reader035/viewer/2022062418/55669718d8b42a51558b53db/html5/thumbnails/17.jpg)
FileNet upload
![Page 18: Seclore File Secure Introduction Brief](https://reader035.vdocuments.site/reader035/viewer/2022062418/55669718d8b42a51558b53db/html5/thumbnails/18.jpg)
Email send
![Page 19: Seclore File Secure Introduction Brief](https://reader035.vdocuments.site/reader035/viewer/2022062418/55669718d8b42a51558b53db/html5/thumbnails/19.jpg)
Email send
![Page 20: Seclore File Secure Introduction Brief](https://reader035.vdocuments.site/reader035/viewer/2022062418/55669718d8b42a51558b53db/html5/thumbnails/20.jpg)
Other options of applying policies
• Download of reports from transactional systems like ERP systems
• Extraction from business intelligence and reporting tools
• “Discovery” by E-discovery and content aware DLP systems– Pattern recognition– Owner and format recognition
• ...
![Page 21: Seclore File Secure Introduction Brief](https://reader035.vdocuments.site/reader035/viewer/2022062418/55669718d8b42a51558b53db/html5/thumbnails/21.jpg)
Policy controlled information
![Page 22: Seclore File Secure Introduction Brief](https://reader035.vdocuments.site/reader035/viewer/2022062418/55669718d8b42a51558b53db/html5/thumbnails/22.jpg)
organization
Collaboration
RightLocation
RightTime
RightAction
RightPerson
![Page 23: Seclore File Secure Introduction Brief](https://reader035.vdocuments.site/reader035/viewer/2022062418/55669718d8b42a51558b53db/html5/thumbnails/23.jpg)
Research Dept.Research Dept.
Maya Research Associate
NealResearch Associate
Head Research
Collaboration - within
![Page 24: Seclore File Secure Introduction Brief](https://reader035.vdocuments.site/reader035/viewer/2022062418/55669718d8b42a51558b53db/html5/thumbnails/24.jpg)
Neal’sComputer
Recipient – within the enterprise
![Page 25: Seclore File Secure Introduction Brief](https://reader035.vdocuments.site/reader035/viewer/2022062418/55669718d8b42a51558b53db/html5/thumbnails/25.jpg)
Neal’sComputer
Rights display
![Page 26: Seclore File Secure Introduction Brief](https://reader035.vdocuments.site/reader035/viewer/2022062418/55669718d8b42a51558b53db/html5/thumbnails/26.jpg)
After a user “accepts” the policy is when the actual content is shown to him/her
Neal’sComputer
Unauthorized print
![Page 27: Seclore File Secure Introduction Brief](https://reader035.vdocuments.site/reader035/viewer/2022062418/55669718d8b42a51558b53db/html5/thumbnails/27.jpg)
Neal’sComputer
Unauthorized print
![Page 28: Seclore File Secure Introduction Brief](https://reader035.vdocuments.site/reader035/viewer/2022062418/55669718d8b42a51558b53db/html5/thumbnails/28.jpg)
Neal’sComputer
Unauthorized copy
![Page 29: Seclore File Secure Introduction Brief](https://reader035.vdocuments.site/reader035/viewer/2022062418/55669718d8b42a51558b53db/html5/thumbnails/29.jpg)
Neal’sComputer
Unauthorized copy
![Page 30: Seclore File Secure Introduction Brief](https://reader035.vdocuments.site/reader035/viewer/2022062418/55669718d8b42a51558b53db/html5/thumbnails/30.jpg)
Neal’sComputer
Unauthorized screen grab
![Page 31: Seclore File Secure Introduction Brief](https://reader035.vdocuments.site/reader035/viewer/2022062418/55669718d8b42a51558b53db/html5/thumbnails/31.jpg)
One more users receives File
Head ResearchComputer
Recipient – within the enterprise
![Page 32: Seclore File Secure Introduction Brief](https://reader035.vdocuments.site/reader035/viewer/2022062418/55669718d8b42a51558b53db/html5/thumbnails/32.jpg)
This user has full control of document
Head ResearchComputer
Rights display
![Page 33: Seclore File Secure Introduction Brief](https://reader035.vdocuments.site/reader035/viewer/2022062418/55669718d8b42a51558b53db/html5/thumbnails/33.jpg)
Policy admin
Research Dept.Research Dept.
Maya Research Associate
NealResearch Associate
Head Research
Head - Marketing
Head - Finance
Head - Legal
External reviewer
Head Research Distributes files to other Internal Employees and External Users
Collaboration - outside
![Page 34: Seclore File Secure Introduction Brief](https://reader035.vdocuments.site/reader035/viewer/2022062418/55669718d8b42a51558b53db/html5/thumbnails/34.jpg)
External user identity management
![Page 35: Seclore File Secure Introduction Brief](https://reader035.vdocuments.site/reader035/viewer/2022062418/55669718d8b42a51558b53db/html5/thumbnails/35.jpg)
External Reviewer's Computer
Recipient - outside
![Page 36: Seclore File Secure Introduction Brief](https://reader035.vdocuments.site/reader035/viewer/2022062418/55669718d8b42a51558b53db/html5/thumbnails/36.jpg)
External Reviewer's Computer
Explicit authentication
![Page 37: Seclore File Secure Introduction Brief](https://reader035.vdocuments.site/reader035/viewer/2022062418/55669718d8b42a51558b53db/html5/thumbnails/37.jpg)
External Reviewer's Computer
Unauthorized save
![Page 38: Seclore File Secure Introduction Brief](https://reader035.vdocuments.site/reader035/viewer/2022062418/55669718d8b42a51558b53db/html5/thumbnails/38.jpg)
External Reviewer's Computer
Unauthorized save
![Page 39: Seclore File Secure Introduction Brief](https://reader035.vdocuments.site/reader035/viewer/2022062418/55669718d8b42a51558b53db/html5/thumbnails/39.jpg)
Maya's Computer
Information audit
![Page 40: Seclore File Secure Introduction Brief](https://reader035.vdocuments.site/reader035/viewer/2022062418/55669718d8b42a51558b53db/html5/thumbnails/40.jpg)
Maya's Computer
Information audit
![Page 41: Seclore File Secure Introduction Brief](https://reader035.vdocuments.site/reader035/viewer/2022062418/55669718d8b42a51558b53db/html5/thumbnails/41.jpg)
Maya's Computer
Forensics
![Page 42: Seclore File Secure Introduction Brief](https://reader035.vdocuments.site/reader035/viewer/2022062418/55669718d8b42a51558b53db/html5/thumbnails/42.jpg)
Owner (Maya) Redistributes the File with New Policy
Maya’sComputer
![Page 43: Seclore File Secure Introduction Brief](https://reader035.vdocuments.site/reader035/viewer/2022062418/55669718d8b42a51558b53db/html5/thumbnails/43.jpg)
Old Policy Definition
Maya's Computer
Old policy
![Page 44: Seclore File Secure Introduction Brief](https://reader035.vdocuments.site/reader035/viewer/2022062418/55669718d8b42a51558b53db/html5/thumbnails/44.jpg)
Old Policy Definition
Internal Users
External Users
Old policy
![Page 45: Seclore File Secure Introduction Brief](https://reader035.vdocuments.site/reader035/viewer/2022062418/55669718d8b42a51558b53db/html5/thumbnails/45.jpg)
New Policy definition
Maya's Computer
New policy
![Page 46: Seclore File Secure Introduction Brief](https://reader035.vdocuments.site/reader035/viewer/2022062418/55669718d8b42a51558b53db/html5/thumbnails/46.jpg)
Internal Users
New policy
![Page 47: Seclore File Secure Introduction Brief](https://reader035.vdocuments.site/reader035/viewer/2022062418/55669718d8b42a51558b53db/html5/thumbnails/47.jpg)
External Reviewer Still has a file on his desktop
External Reviewer's Computer
Orphaned copies of information
![Page 48: Seclore File Secure Introduction Brief](https://reader035.vdocuments.site/reader035/viewer/2022062418/55669718d8b42a51558b53db/html5/thumbnails/48.jpg)
External Reviewer's Computer
Policy control message
![Page 49: Seclore File Secure Introduction Brief](https://reader035.vdocuments.site/reader035/viewer/2022062418/55669718d8b42a51558b53db/html5/thumbnails/49.jpg)
External Reviewer's Computer
The default disclaimer
![Page 50: Seclore File Secure Introduction Brief](https://reader035.vdocuments.site/reader035/viewer/2022062418/55669718d8b42a51558b53db/html5/thumbnails/50.jpg)
Key criteria in evaluating IRM for Ceva
Format and application support
Integration-friendliness around existing IT infrastructureIdentity systemsTransactions systemsReporting and BI toolsECM systems
Auditing capabilities
External user identity management
Mature policy management and consulting services
Licensing modelUser based / Protector based
![Page 51: Seclore File Secure Introduction Brief](https://reader035.vdocuments.site/reader035/viewer/2022062418/55669718d8b42a51558b53db/html5/thumbnails/51.jpg)
Thank You
Website : www.seclore.com
Blog : blog.seclore.com Phone : +91-22-4015-
5252