Presentation by Seclore Technologies at Zensar #TechShowcase. An iSPIRT ProductNation initiative
Upcoming SlideShare
Loading in...5
×
 

Presentation by Seclore Technologies at Zensar #TechShowcase. An iSPIRT ProductNation initiative

on

  • 1,208 views

Presentation by Seclore Technologies at Zensar #TechShowcase. An iSPIRT ProductNation initiative. Started in 2007; they work in the space of information security policy based. Their tag line is ...

Presentation by Seclore Technologies at Zensar #TechShowcase. An iSPIRT ProductNation initiative. Started in 2007; they work in the space of information security policy based. Their tag line is security not at the cost of collaboration.

Statistics

Views

Total Views
1,208
Views on SlideShare
709
Embed Views
499

Actions

Likes
0
Downloads
13
Comments
0

5 Embeds 499

http://productnation.in 427
http://pn.ispirt.in 51
http://reader.aol.com 13
http://cloud.feedly.com 7
http://avinashdsouza.me 1

Accessibility

Categories

Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

Presentation by Seclore Technologies at Zensar #TechShowcase. An iSPIRT ProductNation initiative Presentation by Seclore Technologies at Zensar #TechShowcase. An iSPIRT ProductNation initiative Presentation Transcript

  • Seclore Overview 9 September 2013
  • Corporate Background  High growth information security product company  Active operations since 2007, products available since 2010  Promoted by IIT Bombay www.iitb.ac.in  Technology commercialization program www.sineiitb.org  Products in the area of IRM and secure outsourcing  Geographic coverage  Direct – South Asia, Europe, North America  Indirect – Parts of Africa, parts of South America, North Asia  Key stakeholders include  IIT Bombay – Premier research and training organization  Institutional investors – Ventureast, Helion Private and Confidential 2
  •  Seclore was in 2010 global list of "Hidden Gems" in Identity and Access Management  Hidden Gems’ 2010 by Kuppinger Cole, Europe’s leading information security analyst firm, is a report which lists vendors, which have a significantly differentiated offering and are market leaders in a particular segment  Seclore was among the top 10 finalists in the Innovations Ideas in Practice 2010 by IIT, Bombay Alumni Association, Pune  “Innovations – ideas in practice” is an annual event honoring researchers and innovators for creative and innovative work in the sphere of science and technology Private and Confidential 3 Awards & Recognition 2012  Seclore was named as the Gartner Cool Vendor for 2012  Gartner's 2012 Cool Vendors focus on delivering better business results through consumption of both services and technology 2012  Seclore was named in the Deloitte Technology Fast 50 for 2012 2010 2010 2009  Seclore was among the top 25 in the Marico Innovation for India 2010 Awards  The TR35 award is for innovators whose inventions and research, Massachusetts Institute of Technology (MIT) finds exciting  Technology Review, owned and published by MIT, is the world’s oldest technology magazine 2009 View slide
  • Marquee customers Private and Confidential 4  Over 3.5 Million users across ~ 370 large enterprises  References and case studies available here View slide
  • Presence and numbers  Global offices, ~ 100 people technology team focused on Seclore FileSecure  Partnerships with leading SI companies for global implementation, integration and support  Customers spread across timezones, languages and cultures Private and Confidential 5
  • Private and Confidential 6 Problems we solve
  • Problems we solve  Information security during collaboration  Normally seen as “mutually conflicting” goals  Security systems perimeter centric – rendered useless when information leaves the perimeter  Information breaches during outsourcing  Security, privacy and compliance norms while outsourcing  Present day solutions archaic and centered around “building walls”  Information audits  Present systems help IT systems audits and not information audits  Compliance to ISO, HIPAA, PCI, SOX, ... Private and Confidential 7
  • Private and Confidential 8 BYOD … Even Rajnikant cannot stop it
  • Private and Confidential 9 Collaboration … Is a Differentiator of any value chain
  • Private and Confidential 10 Is making technology availability “socialist” Data on the cloud …
  • Security in the "new new" world BYOD External collaboration Data on cloud Security Device Control Legal contracts / periodic audits Encryption Privacy Device Control Legal contracts / periodic audits Legal contracts, encryption Compliance Legal contracts Legal contracts / periodic audits Legal contracts Private and Confidential 11
  • Private and Confidential 12 What we offer
  • The dream … Private and Confidential 13 WHO can use People & groups within and outside of the organization can be defined as rightful users of the information WHAT can (s)he do Individual actions like reading, editing, printing, distributing, copy -pasting, screen grabbing etc. can be controlled WHEN can (s)he use it Information usage can be time based e.g. can only be used by Mr. A till 28th Sept OR only for the 2 days WHERE can (s)he use it from Information can be linked to locations e.g. only 3rd floor office by private/public IP addresses
  • The dream … Private and Confidential 14
  • • WHO can use the information People & groups within and outside of the organization can be defined as rightful users of the information • WHAT can each person do Individual actions like reading, editing, printing, distributing, copy- pasting, screen grabbing etc. can be controlled • WHEN can he use it Information usage can be time based e.g. can only be used by Mr. A till 28th Sept OR only for the 2 days • WHERE can he use it from Information can be linked to locations e.g. only 3rd floor office by private/public IP addresses IRM allow enterprises to define, implement & audit information usage “policies”. A “policy” defines : Information Rights Management - defined 15
  • Policy definition … Private and Confidential 16
  • … Policy definition Private and Confidential 17
  • Policy implementation Private and Confidential 18
  • Policy implementation Private and Confidential 19
  • Policy implementation Private and Confidential 20
  • Policy implementation Private and Confidential 21
  • Policy enforcement Private and Confidential 22
  • Policy enforcement Private and Confidential 23
  • Policy enforcement Private and Confidential 24
  • Policy enforcement Private and Confidential 25
  • Policy audits Private and Confidential 26
  • Policy change Private and Confidential 27
  • Policy change Private and Confidential 28
  • Private and Confidential 29 What others say about us
  • Customer Speak - Fugro Private and Confidential 30
  • Customer Speak - PurpleLeap Private and Confidential 31
  • Customer Speak - Asian Paints Private and Confidential 32
  • Customer Speak - HDFC Bank Private and Confidential 33
  • Customer Speak - Larsen & Toubro Private and Confidential 34
  • Analyst Speak - Gartner Private and Confidential 35
  • Analyst Speak – Kuppinger Cole Private and Confidential 36
  • Industry speak - Deloitte Private and Confidential 37
  • Media speak Private and Confidential 38
  • Private and Confidential 39 Partnerships & joint offerings
  • Company Product Product type FileNet Content Management Lotus Notes Mail and Messaging Symantec DLP Data Loss Prevention McAfee DLP Data Loss Prevention Websense DLP Data Loss Prevention SharePoint Content Management Outlook Mail and Messaging SAP ERP Transaction backbone GTB DLP Data Loss Prevention MyDLP DLP Data Loss Prevention RSA DLP Data Loss Prevention Omnidocs Content Management Integrated Offerings Private and Confidential 40
  • Thank you www.seclore.com @secloretech