SlideShare a Scribd company logo
1 of 53
Introduction and presentation to CEVA Logistics &
About … Seclore is a high growth information security product company focused on providing  Security without compromising collaboration Seclore’s flagship product Seclore FileSecure is used by  More than 1.5 million users  & some of the largest enterprises
Information exchange in the collaborative world Information is exchanged between Employees of the organisation Enterprise CUSTOMERS VENDORS Information is exchanged between employees & vendors & employees & customers What happens if an employee with privileged access leaves to join a competitor ? What happens if information shared with a vendor is lost by the vendor ? VPN SSL UTM Firewall … TELEMARKETER Competitors Firewalls
Underlying Issues ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
The Result Information lands up in public websites !
Information lifecycle … Create Store Transmit & collaborate Use Archive & Backup Delete DLP Anti-virus Anti-… Hard disk encryption SSL UTM Application security IDM DLP Vaults Digital shredders Heterogeneous policies … Heterogeneous infrastructure Security Desktops Laptops Mobile devices Removable media Email Content Management Online workspaces Remote desktops Shared folders Removable media Instant Messaging Desktops Laptops Mobile devices Archive Backup Document retention
Options for securing unstructured information Option 1 : Control Distribution . . .  Security Collaboration
Options for securing unstructured information Option 2 : Control Usage . . .  Security Collaboration Right Location Right Time Right Action Right Person
Seclore FileSecure ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Seclore FileSecure allow enterprises to  define ,  implement  &  audit  information usage “policies”. A “policy” defines :
Information Rights Management ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Information creation Maya’s Computer
Manual policy assignment Maya’s Computer
Policy definition – WHO, WHAT
Policy definition – WHEN, WHERE
Manual protection Owner of Document protects the file Maya’s Computer
Manual policy assignment Maya’s Computer
Hot Folder protection
Sharepoint upload
FileNet upload
Email send
Email send
Other options of applying policies ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Policy controlled information
Collaboration Right Location Right Time Right Action Right Person organization
Collaboration - within Research  Dept. Maya Research Associate Neal Research Associate Head  Research
Recipient – within the enterprise Neal’s Computer
Rights display Neal’s Computer
Unauthorized print After a user “accepts” the policy is when the actual content is shown to him/her Neal’s Computer
Unauthorized print Neal’s Computer
Unauthorized copy Neal’s Computer
Unauthorized copy Neal’s Computer
Unauthorized screen grab Neal’s Computer
Recipient – within the enterprise One more users receives File Head Research Computer
Rights display This user has full control of document Head Research Computer
Collaboration - outside Policy admin Head Research Distributes files to other Internal Employees and External Users Research  Dept. Maya Research Associate Neal Research Associate Head  Research Head - Marketing Head - Finance Head - Legal External reviewer
External user identity management
Recipient - outside External Reviewer's  Computer
Explicit authentication External Reviewer's  Computer
Unauthorized save External Reviewer's  Computer
Unauthorized save External Reviewer's  Computer
Information audit Maya's  Computer
Information audit Maya's  Computer
Forensics Maya's  Computer
Owner (Maya) Redistributes the File with New Policy   Maya’s Computer
Old policy Old Policy Definition Maya's  Computer
Old policy Old Policy Definition Internal Users External Users
New policy New Policy definition Maya's  Computer
New policy Internal Users
Orphaned copies of information External Reviewer Still has a file on his desktop External Reviewer's  Computer
Policy control message External Reviewer's  Computer
The default disclaimer External Reviewer's  Computer
Key criteria in evaluating IRM for Ceva ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Thank You ,[object Object],[object Object],[object Object]

More Related Content

What's hot

What's hot (20)

cloud Resilience
cloud Resilience cloud Resilience
cloud Resilience
 
MuleSoft Offerings by BasilRoot Technologies
MuleSoft Offerings by BasilRoot TechnologiesMuleSoft Offerings by BasilRoot Technologies
MuleSoft Offerings by BasilRoot Technologies
 
tcp cloud - Advanced Cloud Computing
tcp cloud - Advanced Cloud Computingtcp cloud - Advanced Cloud Computing
tcp cloud - Advanced Cloud Computing
 
Cloud Migration Workshop
Cloud Migration WorkshopCloud Migration Workshop
Cloud Migration Workshop
 
Best Practices for running the Oracle Database on EC2 webinar
Best Practices for running the Oracle Database on EC2 webinarBest Practices for running the Oracle Database on EC2 webinar
Best Practices for running the Oracle Database on EC2 webinar
 
Fundamentals of AWS Security
Fundamentals of AWS SecurityFundamentals of AWS Security
Fundamentals of AWS Security
 
Cloud Migration, Application Modernization, and Security
Cloud Migration, Application Modernization, and Security Cloud Migration, Application Modernization, and Security
Cloud Migration, Application Modernization, and Security
 
How Can I Build a Landing Zone & Extend my Operations into AWS to Support my ...
How Can I Build a Landing Zone & Extend my Operations into AWS to Support my ...How Can I Build a Landing Zone & Extend my Operations into AWS to Support my ...
How Can I Build a Landing Zone & Extend my Operations into AWS to Support my ...
 
Network Security - Defense Through Layered Information Security
Network Security - Defense Through Layered Information SecurityNetwork Security - Defense Through Layered Information Security
Network Security - Defense Through Layered Information Security
 
Chap 3 infrastructure as a service(iaas)
Chap 3 infrastructure as a service(iaas)Chap 3 infrastructure as a service(iaas)
Chap 3 infrastructure as a service(iaas)
 
Migrating your Data Centre to AWS
Migrating your Data Centre to AWSMigrating your Data Centre to AWS
Migrating your Data Centre to AWS
 
AWS Floor 28 - Migrating to AWS
AWS Floor 28 - Migrating to AWSAWS Floor 28 - Migrating to AWS
AWS Floor 28 - Migrating to AWS
 
Building Your Roadmap Sucessful Identity And Access Management
Building Your Roadmap Sucessful Identity And Access ManagementBuilding Your Roadmap Sucessful Identity And Access Management
Building Your Roadmap Sucessful Identity And Access Management
 
AWS Well Architected Framework - Walk Through
AWS Well Architected Framework - Walk ThroughAWS Well Architected Framework - Walk Through
AWS Well Architected Framework - Walk Through
 
Security Operation Center Fundamental
Security Operation Center FundamentalSecurity Operation Center Fundamental
Security Operation Center Fundamental
 
AWS Security Best Practices
AWS Security Best PracticesAWS Security Best Practices
AWS Security Best Practices
 
AWS Cloud Security Fundamentals
AWS Cloud Security FundamentalsAWS Cloud Security Fundamentals
AWS Cloud Security Fundamentals
 
Security Management Practices
Security Management PracticesSecurity Management Practices
Security Management Practices
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Modern Application Development in the Cloud
Modern Application Development in the CloudModern Application Development in the Cloud
Modern Application Development in the Cloud
 

Similar to Seclore File Secure Introduction Brief

Compliance to privacy act and mandatory data breach reporting for corporates
Compliance to privacy act and mandatory data breach reporting for corporatesCompliance to privacy act and mandatory data breach reporting for corporates
Compliance to privacy act and mandatory data breach reporting for corporates
e-Safe Systems
 
Integrating DLP and the 4 W's is a Must by Uzi Yair - CEO, GTB Technologies Inc.
Integrating DLP and the 4 W's is a Must by Uzi Yair - CEO, GTB Technologies Inc.Integrating DLP and the 4 W's is a Must by Uzi Yair - CEO, GTB Technologies Inc.
Integrating DLP and the 4 W's is a Must by Uzi Yair - CEO, GTB Technologies Inc.
Ravtach Solutions
 
626 Information leakage and Data Loss Prevention Tools
626 Information leakage and Data Loss Prevention Tools626 Information leakage and Data Loss Prevention Tools
626 Information leakage and Data Loss Prevention Tools
Splitty
 

Similar to Seclore File Secure Introduction Brief (20)

What Is Irm
What Is IrmWhat Is Irm
What Is Irm
 
Data Loss Prevention (DLP) - Fundamental Concept - Eryk
Data Loss Prevention (DLP) - Fundamental Concept - ErykData Loss Prevention (DLP) - Fundamental Concept - Eryk
Data Loss Prevention (DLP) - Fundamental Concept - Eryk
 
Webinar: Endpoint Backup is not Enough - You Need an End-user Data Strategy
Webinar: Endpoint Backup is not Enough - You Need an End-user Data StrategyWebinar: Endpoint Backup is not Enough - You Need an End-user Data Strategy
Webinar: Endpoint Backup is not Enough - You Need an End-user Data Strategy
 
Seclore FileSecure HotFolder Walkthrough
Seclore FileSecure HotFolder WalkthroughSeclore FileSecure HotFolder Walkthrough
Seclore FileSecure HotFolder Walkthrough
 
What is IRM? bright talk
What is IRM?  bright talkWhat is IRM?  bright talk
What is IRM? bright talk
 
IRJET- Data Leak Prevention System: A Survey
IRJET-  	  Data Leak Prevention System: A SurveyIRJET-  	  Data Leak Prevention System: A Survey
IRJET- Data Leak Prevention System: A Survey
 
Search Inform DLP
Search Inform DLPSearch Inform DLP
Search Inform DLP
 
nullcon 2011 - Protect infrastructure of protect information – Lessons from W...
nullcon 2011 - Protect infrastructure of protect information – Lessons from W...nullcon 2011 - Protect infrastructure of protect information – Lessons from W...
nullcon 2011 - Protect infrastructure of protect information – Lessons from W...
 
Compliance to privacy act and mandatory data breach reporting for corporates
Compliance to privacy act and mandatory data breach reporting for corporatesCompliance to privacy act and mandatory data breach reporting for corporates
Compliance to privacy act and mandatory data breach reporting for corporates
 
Integrating DLP and the 4 W's is a Must by Uzi Yair - CEO, GTB Technologies Inc.
Integrating DLP and the 4 W's is a Must by Uzi Yair - CEO, GTB Technologies Inc.Integrating DLP and the 4 W's is a Must by Uzi Yair - CEO, GTB Technologies Inc.
Integrating DLP and the 4 W's is a Must by Uzi Yair - CEO, GTB Technologies Inc.
 
Irm11g overview
Irm11g overviewIrm11g overview
Irm11g overview
 
Privacy, Encryption, and Anonymity in the Civil Legal Aid Context
Privacy, Encryption, and Anonymity in the Civil Legal Aid ContextPrivacy, Encryption, and Anonymity in the Civil Legal Aid Context
Privacy, Encryption, and Anonymity in the Civil Legal Aid Context
 
Data security
Data securityData security
Data security
 
626 Information leakage and Data Loss Prevention Tools
626 Information leakage and Data Loss Prevention Tools626 Information leakage and Data Loss Prevention Tools
626 Information leakage and Data Loss Prevention Tools
 
Monitoring security in the externalised organisation (Auscert 2013)
Monitoring security in the externalised organisation (Auscert 2013)Monitoring security in the externalised organisation (Auscert 2013)
Monitoring security in the externalised organisation (Auscert 2013)
 
Emma Aubert | Information Protection
Emma Aubert | Information ProtectionEmma Aubert | Information Protection
Emma Aubert | Information Protection
 
One name unify them all
One name unify them allOne name unify them all
One name unify them all
 
Azure Information Protection
Azure Information ProtectionAzure Information Protection
Azure Information Protection
 
Data security strategies and drivers
Data security strategies and driversData security strategies and drivers
Data security strategies and drivers
 
ECS19 - Nicki Borell - Microsoft Cybersecurity Reference Architecture
ECS19 - Nicki Borell - Microsoft Cybersecurity Reference ArchitectureECS19 - Nicki Borell - Microsoft Cybersecurity Reference Architecture
ECS19 - Nicki Borell - Microsoft Cybersecurity Reference Architecture
 

Seclore File Secure Introduction Brief