Seclore
Overview
9 September 2013
Corporate Background
 High growth information security product company
 Active operations since 2007, products available...
 Seclore was in 2010 global list of "Hidden Gems" in Identity and Access Management
 Hidden Gems’ 2010 by Kuppinger Cole...
Marquee customers
Private and Confidential 4
 Over 3.5 Million users across ~ 370 large enterprises
 References and case...
Presence and numbers
 Global offices, ~ 100 people technology team focused on
Seclore FileSecure
 Partnerships with lead...
Private and Confidential 6
Problems
we solve
Problems we solve
 Information security during collaboration
 Normally seen as “mutually conflicting” goals
 Security s...
Private and Confidential 8
BYOD …
Even
Rajnikant
cannot stop it
Private and Confidential 9
Collaboration …
Is a
Differentiator
of any
value chain
Private and Confidential 10
Is making technology
availability “socialist”
Data on the cloud …
Security in the "new new" world
BYOD External
collaboration
Data on cloud
Security Device Control Legal contracts /
period...
Private and Confidential 12
What
we offer
The dream …
Private and Confidential 13
WHO can use
People & groups within and outside of the
organization can be defined ...
The dream …
Private and Confidential 14
• WHO can use the information
People & groups within and outside of the organization
can be defined as rightful users of t...
Policy definition …
Private and Confidential 16
… Policy definition
Private and Confidential 17
Policy implementation
Private and Confidential 18
Policy implementation
Private and Confidential 19
Policy implementation
Private and Confidential 20
Policy implementation
Private and Confidential 21
Policy enforcement
Private and Confidential 22
Policy enforcement
Private and Confidential 23
Policy enforcement
Private and Confidential 24
Policy enforcement
Private and Confidential 25
Policy audits
Private and Confidential 26
Policy change
Private and Confidential 27
Policy change
Private and Confidential 28
Private and Confidential 29
What others
say about us
Customer Speak - Fugro
Private and Confidential 30
Customer Speak - PurpleLeap
Private and Confidential 31
Customer Speak - Asian Paints
Private and Confidential 32
Customer Speak - HDFC Bank
Private and Confidential 33
Customer Speak - Larsen & Toubro
Private and Confidential 34
Analyst Speak - Gartner
Private and Confidential 35
Analyst Speak – Kuppinger Cole
Private and Confidential 36
Industry speak - Deloitte
Private and Confidential 37
Media speak
Private and Confidential 38
Private and Confidential 39
Partnerships &
joint offerings
Company Product Product type
FileNet Content Management
Lotus Notes Mail and Messaging
Symantec DLP Data Loss Prevention
M...
Thank you
www.seclore.com @secloretech
Upcoming SlideShare
Loading in...5
×

Presentation by Seclore Technologies at Zensar #TechShowcase. An iSPIRT ProductNation initiative

1,007

Published on

Presentation by Seclore Technologies at Zensar #TechShowcase. An iSPIRT ProductNation initiative. Started in 2007; they work in the space of information security policy based. Their tag line is security not at the cost of collaboration.

Published in: Technology, Business
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
1,007
On Slideshare
0
From Embeds
0
Number of Embeds
6
Actions
Shares
0
Downloads
20
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Presentation by Seclore Technologies at Zensar #TechShowcase. An iSPIRT ProductNation initiative

  1. 1. Seclore Overview 9 September 2013
  2. 2. Corporate Background  High growth information security product company  Active operations since 2007, products available since 2010  Promoted by IIT Bombay www.iitb.ac.in  Technology commercialization program www.sineiitb.org  Products in the area of IRM and secure outsourcing  Geographic coverage  Direct – South Asia, Europe, North America  Indirect – Parts of Africa, parts of South America, North Asia  Key stakeholders include  IIT Bombay – Premier research and training organization  Institutional investors – Ventureast, Helion Private and Confidential 2
  3. 3.  Seclore was in 2010 global list of "Hidden Gems" in Identity and Access Management  Hidden Gems’ 2010 by Kuppinger Cole, Europe’s leading information security analyst firm, is a report which lists vendors, which have a significantly differentiated offering and are market leaders in a particular segment  Seclore was among the top 10 finalists in the Innovations Ideas in Practice 2010 by IIT, Bombay Alumni Association, Pune  “Innovations – ideas in practice” is an annual event honoring researchers and innovators for creative and innovative work in the sphere of science and technology Private and Confidential 3 Awards & Recognition 2012  Seclore was named as the Gartner Cool Vendor for 2012  Gartner's 2012 Cool Vendors focus on delivering better business results through consumption of both services and technology 2012  Seclore was named in the Deloitte Technology Fast 50 for 2012 2010 2010 2009  Seclore was among the top 25 in the Marico Innovation for India 2010 Awards  The TR35 award is for innovators whose inventions and research, Massachusetts Institute of Technology (MIT) finds exciting  Technology Review, owned and published by MIT, is the world’s oldest technology magazine 2009
  4. 4. Marquee customers Private and Confidential 4  Over 3.5 Million users across ~ 370 large enterprises  References and case studies available here
  5. 5. Presence and numbers  Global offices, ~ 100 people technology team focused on Seclore FileSecure  Partnerships with leading SI companies for global implementation, integration and support  Customers spread across timezones, languages and cultures Private and Confidential 5
  6. 6. Private and Confidential 6 Problems we solve
  7. 7. Problems we solve  Information security during collaboration  Normally seen as “mutually conflicting” goals  Security systems perimeter centric – rendered useless when information leaves the perimeter  Information breaches during outsourcing  Security, privacy and compliance norms while outsourcing  Present day solutions archaic and centered around “building walls”  Information audits  Present systems help IT systems audits and not information audits  Compliance to ISO, HIPAA, PCI, SOX, ... Private and Confidential 7
  8. 8. Private and Confidential 8 BYOD … Even Rajnikant cannot stop it
  9. 9. Private and Confidential 9 Collaboration … Is a Differentiator of any value chain
  10. 10. Private and Confidential 10 Is making technology availability “socialist” Data on the cloud …
  11. 11. Security in the "new new" world BYOD External collaboration Data on cloud Security Device Control Legal contracts / periodic audits Encryption Privacy Device Control Legal contracts / periodic audits Legal contracts, encryption Compliance Legal contracts Legal contracts / periodic audits Legal contracts Private and Confidential 11
  12. 12. Private and Confidential 12 What we offer
  13. 13. The dream … Private and Confidential 13 WHO can use People & groups within and outside of the organization can be defined as rightful users of the information WHAT can (s)he do Individual actions like reading, editing, printing, distributing, copy -pasting, screen grabbing etc. can be controlled WHEN can (s)he use it Information usage can be time based e.g. can only be used by Mr. A till 28th Sept OR only for the 2 days WHERE can (s)he use it from Information can be linked to locations e.g. only 3rd floor office by private/public IP addresses
  14. 14. The dream … Private and Confidential 14
  15. 15. • WHO can use the information People & groups within and outside of the organization can be defined as rightful users of the information • WHAT can each person do Individual actions like reading, editing, printing, distributing, copy- pasting, screen grabbing etc. can be controlled • WHEN can he use it Information usage can be time based e.g. can only be used by Mr. A till 28th Sept OR only for the 2 days • WHERE can he use it from Information can be linked to locations e.g. only 3rd floor office by private/public IP addresses IRM allow enterprises to define, implement & audit information usage “policies”. A “policy” defines : Information Rights Management - defined 15
  16. 16. Policy definition … Private and Confidential 16
  17. 17. … Policy definition Private and Confidential 17
  18. 18. Policy implementation Private and Confidential 18
  19. 19. Policy implementation Private and Confidential 19
  20. 20. Policy implementation Private and Confidential 20
  21. 21. Policy implementation Private and Confidential 21
  22. 22. Policy enforcement Private and Confidential 22
  23. 23. Policy enforcement Private and Confidential 23
  24. 24. Policy enforcement Private and Confidential 24
  25. 25. Policy enforcement Private and Confidential 25
  26. 26. Policy audits Private and Confidential 26
  27. 27. Policy change Private and Confidential 27
  28. 28. Policy change Private and Confidential 28
  29. 29. Private and Confidential 29 What others say about us
  30. 30. Customer Speak - Fugro Private and Confidential 30
  31. 31. Customer Speak - PurpleLeap Private and Confidential 31
  32. 32. Customer Speak - Asian Paints Private and Confidential 32
  33. 33. Customer Speak - HDFC Bank Private and Confidential 33
  34. 34. Customer Speak - Larsen & Toubro Private and Confidential 34
  35. 35. Analyst Speak - Gartner Private and Confidential 35
  36. 36. Analyst Speak – Kuppinger Cole Private and Confidential 36
  37. 37. Industry speak - Deloitte Private and Confidential 37
  38. 38. Media speak Private and Confidential 38
  39. 39. Private and Confidential 39 Partnerships & joint offerings
  40. 40. Company Product Product type FileNet Content Management Lotus Notes Mail and Messaging Symantec DLP Data Loss Prevention McAfee DLP Data Loss Prevention Websense DLP Data Loss Prevention SharePoint Content Management Outlook Mail and Messaging SAP ERP Transaction backbone GTB DLP Data Loss Prevention MyDLP DLP Data Loss Prevention RSA DLP Data Loss Prevention Omnidocs Content Management Integrated Offerings Private and Confidential 40
  41. 41. Thank you www.seclore.com @secloretech
  1. A particular slide catching your eye?

    Clipping is a handy way to collect important slides you want to go back to later.

×