• Save
Seclore FileSecure IRM connector for Microsoft SharePoint.
 

Seclore FileSecure IRM connector for Microsoft SharePoint.

on

  • 1,107 views

Seclore FileSecure’s Information Rights Management (IRM) connector for SharePoint enables organizations to maintain a safe and secure information data management system. Seclore FileSecure provides ...

Seclore FileSecure’s Information Rights Management (IRM) connector for SharePoint enables organizations to maintain a safe and secure information data management system. Seclore FileSecure provides complete control and monitoring functionality of SharePoint content irrespective of where it lies (i.e. inside or outside of SharePoint)

Statistics

Views

Total Views
1,107
Views on SlideShare
980
Embed Views
127

Actions

Likes
0
Downloads
0
Comments
0

7 Embeds 127

http://www.seclore.com 106
http://seclore.com 9
http://www.irmsecure.com 5
http://www.skillsillustrated.com 3
http://timesmail.timesgroup.com 2
http://www.alliance.seclore.com 1
http://irmsecure.com 1
More...

Accessibility

Categories

Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

    Seclore FileSecure IRM connector for Microsoft SharePoint. Seclore FileSecure IRM connector for Microsoft SharePoint. Presentation Transcript

    • Seclore Filesecure SharePOINT ConnectorEnhancing security of MS SharePOINT
    • Contents• Constraints with MS SharePoint• The Solution .. • What is Seclore FileSecure • Seclore FileSecure connector for MS SharePoint • Policy definition • Assigning policies to Sharepoint folders • Uploading documents • Downloading a file from Sharepoint folder • Accessing a protected file • Audit trails• About Seclore
    • Sharepoint and security A Process Flow of Product Plan User User Sharepoint Edited Copied Printed Un-protected File Viewed Distributed Sharepoint Sharepoint security is not persistent . Once the file is downloadedaccessed by users locally, it can be edited, copied & distributed.
    • Contents• Constraints with MS SharePoint• The Solution .. • What is Seclore FileSecure • Seclore FileSecure connector for MS SharePoint • Policy definition • Assigning policies to Sharepoint folders • Uploading documents • Downloading a file from Sharepoint folder • Accessing a protected file • Audit trails• About Seclore
    • Seclore FileSecureSeclore FileSecure allow enterprises to define, implement & auditinformation usage “policies”. A “policy” defines : • WHO can use the information People & groups within and outside of the organization can be defined as rightful users of the information • WHAT can each person do Individual actions like reading, editing, printing, distributing, copy-pasting, screen grabbing etc. can be controlled • WHEN can he use it Information usage can be time based e.g. can only be used by Mr. A till 28th Sept OR only for the 2 days • WHERE can he use it from Information can be linked to locations e.g. only 3rd floor office by private/public IP addresses
    • Seclore FileSecure• Policies are – Persistent: Implemented on information and all its copies wherever it is transmitted or stored – Dynamic: Policies can be changed after distributing information without having access to or redistributing the information• Policies can be attached to information on – Creation – Placement in a certain location e.g. shared folder – Attachment to email – Uploading to a document management / ECM system – …
    • Contents• Constraints with MS SharePoint• The Solution .. • What is Seclore FileSecure • Seclore FileSecure connector for MS SharePoint • Policy definition • Assigning policies to Sharepoint folders • Uploading documents • Downloading a file from Sharepoint folder • Accessing a protected file • Audit trails• About Seclore
    • Seclore FileSecure Enabled Sharepoint A Process Flow of Product SharePoint + Seclore Plan User User FileSecure Edited Copied Printed Protected File Viewed DistributedSharepoint Files copied out of “Sharepoint Folder” are persistently protected.accessed by Rights to edit, copy, print and distribute are restricted based on users Seclore FileSecure policies
    • Contents• Constraints with MS SharePoint• The Solution .. • What is Seclore FileSecure • Seclore FileSecure connector for MS SharePoint • Policy definition • Assigning policies to Sharepoint folders • Uploading documents • Downloading a file from Sharepoint folder • Accessing a protected file • Audit trails• About Seclore
    • Policy definition–WHO, WHATPolicy People / groups, within / outside the enterprise can be dis-Admin allowed to edit, print, copy, forward etc. via a policy 10
    • Policy definition–WHEN, WHERE Policy A policy can expire information beyond a date / timespan Admin and also restrict its usage to certain computers / networks11
    • Contents• Constraints with MS SharePoint• The Solution .. • What is Seclore FileSecure • Seclore FileSecure connector for MS SharePoint • Policy definition • Assigning policies to Sharepoint folders • Uploading documents • Downloading a file from Sharepoint folder • Accessing a protected file • Audit trails• About Seclore
    • Applying Policies…Sharepoint Policies can be applied to folders by the Sharepoint admin. Admin The admin chooses the folder … 13
    • …Applying PoliciesSharepoint Policies are applied… Admin 14
    • Contents• Constraints with MS SharePoint• The Solution .. • What is Seclore FileSecure • Seclore FileSecure connector for MS SharePoint • Policy definition • Assigning policies to Sharepoint folders • Uploading documents • Downloading a file from Sharepoint folder • Accessing a protected file • Audit trails• About Seclore 15
    • Upload document…Sharepoint Upload document Admin 16
    • …Upload documentSharepoint Upload document Admin 17
    • Document is uploadedSharepoint Document is uploaded Admin 18
    • Contents• Constraints with MS SharePoint• The Solution .. • What is Seclore FileSecure • Seclore FileSecure connector for MS SharePoint • Policy definition • Assigning policies to Sharepoint folders • Uploading documents • Downloading a file from Sharepoint folder • Accessing a protected file • Audit trails• About Seclore
    • Download document from Sharepoint… Once the user’s downloads the document from Seclore User’s FileSecure policy protected Sharepoint folder the file getsComputer instantly protected 20
    • …Download document from Sharepoint Downloaded document from Sharepoint Notice the red lock! User’s …the file is instantly protectedComputer 21
    • Contents• Constraints with MS SharePoint• The Solution .. • What is Seclore FileSecure • Seclore FileSecure connector for MS SharePoint • Policy definition • Assigning policies to Sharepoint folders • Uploading documents • Downloading a file from Sharepoint folder • Accessing a protected file • Audit trails• About Seclore
    • Rights display User’s On clicking a rights display makes the recipient explicitlyComputer aware of his rights to the document 23
    • Unauthorized print User’s Unauthorized activities like attempts to print …Computer 24
    • Unauthorized print User’s … are disallowedComputer 25
    • Unauthorized edit & save User’s Unauthorized activities like attempts to edit & save…Computer 26
    • Unauthorized edit & save User’s … are disallowedComputer 27
    • Unauthorized copy User’s Attempts to copy parts / whole of the document …Computer 28
    • Unauthorized copy User’s … are disallowedComputer 29
    • Unauthorized screen grab User’s Screen capture by the Prt Scr key, screen grabbing tools likeComputer Camtasia and screen sharing tools like Webex is blocked 30
    • Contents• Constraints with MS SharePoint• The Solution .. • What is Seclore FileSecure • Seclore FileSecure connector for MS SharePoint • Policy definition • Assigning policies to Sharepoint folders • Uploading documents • Downloading a file from Sharepoint folder • Accessing a protected file • Audit trails• About Seclore
    • Information audit The audit captures the WHO, WHAT, WHEN and WHERE of User’s the access attempt. Authorized and unauthorized attemptsComputer are captured and reported 32
    • Contents• The Problem with MS SharePoint• The Solution .. • What is Seclore FileSecure • What is Seclore FileSecure enabled – MS SharePoint • Policy definition • Assigning policies to Sharepoint folders • Uploading documents • Downloading a file from Sharepoint folder • Accessing a protected file • Audit trails• About Seclore
    • Corporate Background …“Seclore is a high growth software product company. Seclore’s technology helps mitigate the risks arising out of information breaches whilst enhancing collaboration”6 years old, Headquartered in Mumbai, IndiaPromoted by IIT Bombay under the SINE program - www.sineiitb.orgGeographical and customer presence in Middle East, ASEAN, SAARC & EuropeOfferings focused on Information Rights Management and Secure OutsourcingStake holders including IIT Bombay – www.iitb.ac.in ICICI Bank – www.icicibank.com Ventureast – www.ventureast.netTechnology and service differentiators focusing on minimally intrusive technology, value based pricing and usage without training
    • Seclore user profile… ….Diversified business groups ….Engineering and manufacturing organizations …Government and service providers
    • What customers say about us … “We chose Seclore FileSecure due to the flexibility provided by Seclore in terms of solution capabilities and customization. Implementation of Seclore FileSecure has reduced the exposure of critical data for potential misuse or frauds. The business benefits are tremendous.” - Murli Nambiar, Head of Information Security "Financial services companies like banks, insurance carriers & broking are „opening up‟ their information systems and processes for participation by customers, partners and vendors. This of course brings in a lot of value chain integration and lowers costs but comes with information security needs which cannot be solved by present day systems. Seclore‟s technology for securing documents as they flow within and outside enterprises as well as securing data shared with outsourcing partners is extremely relevant. - C N Ram. Group CIO, Essar group
    • What industry experts say … Seclore‟s approach is different in that they not mandatory rely on such plug-ins but mainly act “below” the application. The client component (which is required to access protected, e.g. encrypted, documents) tries to analyze the activities off the application like access to the file system. One impact of that approach is that a document might be opened with different applications supporting the specific document format.- Martin Kuppinger, One of the fore-most information security analysts “Information breaches normally result in intellectual property violation which is a serious problem affecting industry today. Seclore‟s combination of preventive and corrective methods of handling information breaches is invaluable to any industry” - Haigreve Khaitan (Managing partner – Khaitan and Co) “Collaboration, security and privacy appear as mutually conflicting goals with most present day technologies. Seclore has resolved this conflict in a very elegant manner with its technology.” - Animesh Parihar (Global Delivery Head – SAP)
    • Awards and recognition … Cool Vendors are “interesting, new and innovative vendors” which “organizations cannot afford to ignore”. Cool Vendors are those vendors that have caught Gartners interest because they offer innovative and intriguing technologies or solutions. Deloitte Technology Fast 50 is a ranking compiled every year based on percentage of growth of fiscal year revenue over three years. The companies must also fulfil other criterion of technology orientation.
    • … Awards and recognition„Hidden Gems‟ 2010 by Kuppinger Cole, Europe‟sleading information security analyst firm is a reportwhich lists vendors, which have a significantlydifferentiated offering and are market leaders in aparticular segment. The TR35 award is for innovators whose inventions and research, Massachusetts Institute of Technology (MIT) finds exciting. Technology Review, owned and published by MIT, is the world‟s oldest technology magazine.
    • … Awards and recognition“Innovations – ideas in practice” is an annual event honoringresearchers and innovators for creative and innovative work inthe sphere of science and technology. The innovation needs tohave a high degree of practical relevance to change everydaylife.
    • More Info?www.seclore.com +91-22-6130-4200 41