Strike Down
Your Security Problems
With Seclore FileSecure
In this age of democracy and transparent government, citizens are
justifiably demanding more information. However governan...
Upcoming SlideShare
Loading in...5
×

Does Right To Information mean Bye-Bye to Information Security?

219

Published on

One way to ensure that BYOD does not end up in disaster is to protect your unstructured information with Information Rights Management.

0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
219
On Slideshare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
5
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Does Right To Information mean Bye-Bye to Information Security?

  1. 1. Strike Down Your Security Problems With Seclore FileSecure
  2. 2. In this age of democracy and transparent government, citizens are justifiably demanding more information. However governance has to balance between citizen's valid right to information and government's need to keep some information out of public view in public interest Information Rights Management allows government to share only appropriate information with appropriate people at appropriate time, thus preventing leak of state secrets that could jeopardize national interests. Seclore FileSecure protects information from leakage due to malicious intent, errors and omissions as well as lack of awareness by providing a persistent information-locked method of protection. This means that confidential information remains confidential Seclore FileSecure allows enterprises to define and implement information usage policies. A policy is an "answer" to four Questions i.e. WHO can use the information People & groups within and outside of the organization can be defined as rightful users of the information WHAT can each person do Individual actions like reading, editing, printing, distributing, copy-pasting, screen grabbing etc. can be controlled WHEN can he use it Information usage can be time based e.g. can only be used by Mr. A till 25th Sept or only for the 2 days WHERE can he use it from Information can be linked to locations e.g. only 3rd floor office by private/public IP addresses Seclore Technology (incubated and promoted by IIT, Bombay) is a leading provider of information security solutions in the areas of information usage control, information rights management (IRM) and secure outsourcing. Its expertise lies in protection of data post distribution irrespective of its location or mode of transfer. www.seclore.com | info@seclore.com | blog: http://blogseclore.com

×