Seclore File Secure Sharepoint Walkthrough

1,561 views

Published on

SharePoint - Indicating PDF File.

Published in: Technology
0 Comments
2 Likes
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total views
1,561
On SlideShare
0
From Embeds
0
Number of Embeds
15
Actions
Shares
0
Downloads
0
Comments
0
Likes
2
Embeds 0
No embeds

No notes for slide

Seclore File Secure Sharepoint Walkthrough

  1. 1. Seclore Filesecure SharePOINT ConnectorEnhancing security of MS SharePOINT
  2. 2. Contents• Constraints with MS SharePoint• The Solution .. • What is Seclore FileSecure • Seclore FileSecure connector for MS SharePoint • Policy definition • Assigning policies to Sharepoint folders • Uploading documents • Downloading a file from Sharepoint folder • Accessing a protected file • Audit trails• About Seclore
  3. 3. Sharepoint and security A Process Flow of Product Plan User User Sharepoint Edited Copied Printed Un-protected File Viewed Distributed Sharepoint Sharepoint security is not persistent . Once the file isaccessed by downloaded locally, it can be edited, copied & users distributed.
  4. 4. Contents• Constraints with MS SharePoint• The Solution .. • What is Seclore FileSecure • Seclore FileSecure connector for MS SharePoint • Policy definition • Assigning policies to Sharepoint folders • Uploading documents • Downloading a file from Sharepoint folder • Accessing a protected file • Audit trails• About Seclore
  5. 5. Seclore FileSecureSeclore FileSecure allow enterprises to define, implement & auditinformation usage “policies”. A “policy” defines : • WHO can use the information People & groups within and outside of the organization can be defined as rightful users of the information • WHAT can each person do Individual actions like reading, editing, printing, distributing, copy-pasting, screen grabbing etc. can be controlled • WHEN can he use it Information usage can be time based e.g. can only be used by Mr. A till 28th Sept OR only for the 2 days • WHERE can he use it from Information can be linked to locations e.g. only 3rd floor office by private/public IP addresses
  6. 6. Seclore FileSecure• Policies are – Persistent: Implemented on information and all its copies wherever it is transmitted or stored – Dynamic: Policies can be changed after distributing information without having access to or redistributing the information• Policies can be attached to information on – Creation – Placement in a certain location e.g. shared folder – Attachment to email – Uploading to a document management / ECM system – …
  7. 7. Contents• Constraints with MS SharePoint• The Solution .. • What is Seclore FileSecure • Seclore FileSecure connector for MS SharePoint • Policy definition • Assigning policies to Sharepoint folders • Uploading documents • Downloading a file from Sharepoint folder • Accessing a protected file • Audit trails• About Seclore
  8. 8. Seclore FileSecure Enabled Sharepoint A Process Flow of Product SharePoint + Seclore Plan User User FileSecure Edited Copied Printed Protected File Viewed Distributed Sharepoint Files copied out of “Sharepoint Folder” are persistentlyaccessed by protected. Rights to edit, copy, print and distribute are users restricted based on Seclore FileSecure policies
  9. 9. Contents• Constraints with MS SharePoint• The Solution .. • What is Seclore FileSecure • Seclore FileSecure connector for MS SharePoint • Policy definition • Assigning policies to Sharepoint folders • Uploading documents • Downloading a file from Sharepoint folder • Accessing a protected file • Audit trails• About Seclore
  10. 10. Policy definition–WHO, WHATPolicy People / groups, within / outside the enterprise can beAdmin dis-allowed to edit, print, copy, forward etc. via a policy 10
  11. 11. Policy definition–WHEN, WHERE A policy can expire information beyond a date / Policy timespan and also restrict its usage to certain Admin 11 computers / networks
  12. 12. Contents• Constraints with MS SharePoint• The Solution .. • What is Seclore FileSecure • Seclore FileSecure connector for MS SharePoint • Policy definition • Assigning policies to Sharepoint folders • Uploading documents • Downloading a file from Sharepoint folder • Accessing a protected file • Audit trails• About Seclore
  13. 13. Applying Policies…Sharepoint Policies can be applied to folders by the Sharepoint Admin admin. The admin chooses the folder … 13
  14. 14. …Applying PoliciesSharepoint Policies are applied… Admin 14
  15. 15. Contents• Constraints with MS SharePoint• The Solution .. • What is Seclore FileSecure • Seclore FileSecure connector for MS SharePoint • Policy definition • Assigning policies to Sharepoint folders • Uploading documents • Downloading a file from Sharepoint folder • Accessing a protected file • Audit trails• About Seclore 15
  16. 16. Upload document…Sharepoint Upload document Admin 16
  17. 17. …Upload documentSharepoint Upload document Admin 17
  18. 18. Document is uploadedSharepoint Document is uploaded Admin 18
  19. 19. Contents• Constraints with MS SharePoint• The Solution .. • What is Seclore FileSecure • Seclore FileSecure connector for MS SharePoint • Policy definition • Assigning policies to Sharepoint folders • Uploading documents • Downloading a file from Sharepoint folder • Accessing a protected file • Audit trails• About Seclore
  20. 20. Download document from Sharepoint… Once the user’s downloads the document from Seclore User’s FileSecure policy protected Sharepoint folder the fileComputer 20 gets instantly protected
  21. 21. …Download document from Sharepoint Downloaded document from Sharepoint Notice the red lock User’s …the file is instantly protectedComputer 21
  22. 22. Contents• Constraints with MS SharePoint• The Solution .. • What is Seclore FileSecure • Seclore FileSecure connector for MS SharePoint • Policy definition • Assigning policies to Sharepoint folders • Uploading documents • Downloading a file from Sharepoint folder • Accessing a protected file • Audit trails• About Seclore
  23. 23. Rights display User’s On clicking a rights display makes the recipientComputer explicitly aware of his rights to the document 23
  24. 24. Unauthorized print User’s Unauthorized activities like attempts to print …Computer 24
  25. 25. Unauthorized print User’s … are disallowedComputer 25
  26. 26. Unauthorized copy User’s Attempts to copy parts / whole of the document …Computer 26
  27. 27. Unauthorized copy User’s … are disallowedComputer 27
  28. 28. Unauthorized screen grab Screen capture by the Prt Scr key, screen grabbing tools User’s like Camtasia and screen sharing tools like Webex isComputer 28 blocked
  29. 29. Contents• Constraints with MS SharePoint• The Solution .. • What is Seclore FileSecure • Seclore FileSecure connector for MS SharePoint • Policy definition • Assigning policies to Sharepoint folders • Uploading documents • Downloading a file from Sharepoint folder • Accessing a protected file • Audit trails• About Seclore
  30. 30. Information audit The audit captures the WHO, WHAT, WHEN and WHERE User’s of the access attempt. Authorized and unauthorizedComputer 30 attempts are captured and reported
  31. 31. Contents• The Problem with MS SharePoint• The Solution .. • What is Seclore FileSecure • What is Seclore FileSecure enabled – MS SharePoint • Policy definition • Assigning policies to Sharepoint folders • Uploading documents • Downloading a file from Sharepoint folder • Accessing a protected file • Audit trails• About Seclore
  32. 32. Corporate Background …“Seclore is a high growth software product company. Seclore’s technology helps mitigate the risks arising out of information breaches whilst enhancing collaboration”6 years old, Headquartered in Mumbai, IndiaPromoted by IIT Bombay under the SINE program - www.sineiitb.orgGeographical and customer presence in Middle East, ASEAN, SAARC & EuropeOfferings focused on Information Rights Management and Secure OutsourcingStake holders including IIT Bombay – www.iitb.ac.in ICICI Bank – www.icicibank.com Ventureast – www.ventureast.netTechnology and service differentiators focusing on minimally intrusive technology, value based pricing and usage without training
  33. 33. About … Value to customersSecurity without compromising on collaboration Customers across ….Diversified business groups ….Large financial services groups ….Engineering and manufacturing organizations ….Defence, Software, BPO, Consulting, Services, ….
  34. 34. What customers say about us … “We chose Seclore FileSecure due to the flexibility provided by Seclore in terms of solution capabilities and customization. Implementation of Seclore FileSecure has reduced the exposure of critical data for potential misuse or frauds. The business benefits are tremendous.” - Murli Nambiar, Head of Information Security "Financial services companies like banks, insurance carriers & broking are ‘opening up’ their information systems and processes for participation by customers, partners and vendors. This of course brings in a lot of value chain integration and lowers costs but comes with information security needs which cannot be solved by present day systems. Seclore’s technology for securing documents as they flow within and outside enterprises as well as securing data shared with outsourcing partners is extremely relevant. - C N Ram. Group CIO, Essar group
  35. 35. What industry experts say … Seclore’s approach is different in that they not mandatory rely on such plug-ins but mainly act “below” the application. The client component (which is required to access protected, e.g. encrypted, documents) tries to analyze the activities off the application like access to the file system. One impact of that approach is that a document might be opened with different applications supporting the specific document format.- Martin Kuppinger, One of the fore-most information security analysts “Information breaches normally result in intellectual property violation which is a serious problem affecting industry today. Seclore’s combination of preventive and corrective methods of handling information breaches is invaluable to any industry” - Haigreve Khaitan (Managing partner – Khaitan and Co) “Collaboration, security and privacy appear as mutually conflicting goals with most present day technologies. Seclore has resolved this conflict in a very elegant manner with its technology.” - Animesh Parihar (Global Delivery Head – SAP)
  36. 36. Awards and recognition … Deloitte Technology Fast 50 is a ranking compiled every year based on percentage of growth of fiscal year revenue over three years. The companies must also fulfil other criterion of technology orientation. ‘Hidden Gems’ 2010 by Kuppinger Cole, Europe’sleading information security analyst firm is a report which lists vendors, which have a significantly differentiated offering and are market leaders in a particular segment.
  37. 37. … Awards and recognition The TR35 award is for innovators whose inventions and research, Massachusetts Institute of Technology (MIT) finds exciting. Technology Review, owned and published by MIT, is the world’s oldest technology magazine. “Innovations – ideas in practice” is an annual event honoring researchers and innovators for creative and innovative work in thesphere of science and technology. The innovation needs to have a high degree of practical relevance to change everyday life.
  38. 38. More Info?www.seclore.com +91-22-4015-5252

×