Seclore FileSecure HotFolder Walkthrough

897 views

Published on

Seclore FileSecure IRM & FileShare System

Published in: Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
897
On SlideShare
0
From Embeds
0
Number of Embeds
6
Actions
Shares
0
Downloads
16
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Seclore FileSecure HotFolder Walkthrough

  1. 1. Seclore Filesecure<br />Hot Folder server<br />Enhancing security of fileshares<br />
  2. 2. Contents<br /><ul><li>The Problem with Fileshare security
  3. 3. The Solution ..
  4. 4. What is Seclore FileSecure
  5. 5. What is Hot Folder Server
  6. 6. Policy definition
  7. 7. Assigning policies to folders
  8. 8. Protecting a file
  9. 9. Accessing a protected file
  10. 10. Audit trails
  11. 11. About Seclore</li></li></ul><li>A Process Flow of Product Plan<br />Fileshares and security<br />File Share Folder<br />User<br />User<br />Edited<br />Copied<br />Printed<br />Viewed<br />Distributed<br />Un-protected File<br />Fileshare accessed by users<br />Fileshare security is not persistent . Once the file is copied locally, it can be edited, copied & distributed.<br />
  12. 12. Contents<br /><ul><li>The Problem with Fileshare security
  13. 13. The Solution ..
  14. 14. What is Seclore FileSecure
  15. 15. What is Hot Folder Server
  16. 16. Policy definition
  17. 17. Assigning policies to folders
  18. 18. Protecting a file
  19. 19. Accessing a protected file
  20. 20. Audit trails
  21. 21. About Seclore</li></li></ul><li>Seclore FileSecure allow enterprises to define, implement & audit information usage “policies”. A “policy” defines :<br /><ul><li>WHO can use the information</li></ul>People & groups within and outside of the organization can be defined as rightful users of the information<br /><ul><li>WHATcan each person do</li></ul>Individual actions like reading, editing, printing, distributing, copy-pasting, screen grabbing etc. can be controlled<br /><ul><li>WHEN can he use it</li></ul>Information usage can be time based e.g. can only be used by Mr. A till 28th Sept OR only for the 2 days<br /><ul><li>WHERE can he use it from</li></ul>Information can be linked to locations e.g. only 3rd floor office by private/public IP addresses<br />SecloreFileSecure<br />
  22. 22. SecloreFileSecure<br /><ul><li>Policies are
  23. 23. Persistent: Implemented on information and all its copies wherever it is transmitted or stored
  24. 24. Dynamic: Policies can be changed after distributing information without having access to or redistributing the information
  25. 25. Policies can be attached to information on
  26. 26. Creation
  27. 27. Placement in a certain location e.g. shared folder
  28. 28. Attachment to email
  29. 29. Uploading to a document management / ECM system
  30. 30. …</li></li></ul><li>Contents<br /><ul><li>The Problem with Fileshare security
  31. 31. The Solution ..
  32. 32. What is Seclore FileSecure
  33. 33. What is Hot Folder Server
  34. 34. Policy definition
  35. 35. Assigning policies to folders
  36. 36. Protecting a file
  37. 37. Accessing a protected file
  38. 38. Audit trails
  39. 39. About Seclore</li></li></ul><li>A Process Flow of Product Plan<br />Hot Folder enabled Fileshare<br />File Share+ Seclore FileSecure<br />User<br />User<br />Edited<br />Copied<br />Printed<br />Viewed<br />Distributed<br />Protected File<br />Hot Folder accessed by users<br />Files copied out of “Hot Folders” are persistently protected. Rights to edit, copy, print and distribute are restricted based on Seclore FileSecure policies<br />
  40. 40. Contents<br /><ul><li>The Problem with Fileshare security
  41. 41. The Solution ..
  42. 42. What is Seclore FileSecure
  43. 43. What is Hot Folder Server
  44. 44. Policy definition
  45. 45. Assigning policies to folders
  46. 46. Protecting a file
  47. 47. Accessing a protected file
  48. 48. Audit trails
  49. 49. About Seclore</li></li></ul><li>Policy definition–WHO, WHAT<br />10<br />=<br />Policy Admin<br />People / groups, within / outside the enterprise can be dis-allowed to edit, print, copy, forward etc. via a policy<br />
  50. 50. Policy definition–WHEN, WHERE<br />11<br />Policy Admin<br />A policy can expire information beyond a date / timespan and also restrict its usage to certain computers / networks<br />
  51. 51. Contents<br /><ul><li>The Problem with Fileshare security
  52. 52. The Solution ..
  53. 53. What is Seclore FileSecure
  54. 54. What is Hot Folder Server
  55. 55. Policy definition
  56. 56. Assigning policies to folders
  57. 57. Protecting a file
  58. 58. Accessing a protected file
  59. 59. Audit trails
  60. 60. About Seclore</li></li></ul><li>Defining Hot Folders …<br />13<br />Fileshare<br />Admin<br />Policies can be attached to folders by the Fileshare admin. The admin chooses the folder …<br />
  61. 61. … Defining Hot Folders<br />14<br />Fileshare<br />Admin<br />… and the policy to be applied to files in the folder<br />
  62. 62. Contents<br /><ul><li>The Problem with Fileshare security
  63. 63. The Solution ..
  64. 64. What is Seclore FileSecure
  65. 65. What is Hot Folder Server
  66. 66. Policy definition
  67. 67. Assigning policies to folders
  68. 68. Protecting a file
  69. 69. Accessing a protected file
  70. 70. Audit trails
  71. 71. About Seclore</li></li></ul><li>Protecting files<br />16<br />File creator’s computer<br />The creator of the file drags-and-drops the file into the Hot Folder. The file is instantly protected.<br />
  72. 72. Contents<br /><ul><li>The Problem with Fileshare security
  73. 73. The Solution ..
  74. 74. What is Seclore FileSecure
  75. 75. What is Hot Folder Server
  76. 76. Policy definition
  77. 77. Assigning policies to folders
  78. 78. Protecting a file
  79. 79. Accessing a protected file
  80. 80. Audit trails
  81. 81. About Seclore</li></li></ul><li>Rights display<br />18<br />User’s Computer<br />On clicking a rights display makes the recipient explicitly aware of his rights to the document<br />
  82. 82. Unauthorized print<br />19<br />User’s Computer<br />Unauthorized activities like attempts to print …<br />
  83. 83. 20<br />User’s Computer<br />… are disallowed<br />Unauthorized print<br />
  84. 84. 21<br />User’s Computer<br />Unauthorized activities like attempts to edit & save…<br />Unauthorized edit & save<br />
  85. 85. 22<br />User’s Computer<br />… are disallowed<br />Unauthorized edit & save<br />
  86. 86. 23<br />User’s Computer<br />Unauthorized copy<br />Attempts to copy parts / whole of the document …<br />
  87. 87. 24<br />User’s Computer<br />… are disallowed<br />Unauthorized copy<br />
  88. 88. 25<br />User’s Computer<br />Screen capture by the PrtScr key, screen grabbing tools like Camtasia and screen sharing tools like Webex is blocked<br />Unauthorized screen grab<br />
  89. 89. Contents<br /><ul><li>The Problem with Fileshare security
  90. 90. The Solution ..
  91. 91. What is Seclore FileSecure
  92. 92. What is Hot Folder Server
  93. 93. Policy definition
  94. 94. Assigning policies to folders
  95. 95. Protecting a file
  96. 96. Accessing a protected file
  97. 97. Audit trails
  98. 98. About Seclore</li></li></ul><li>27<br />User’s Computer<br />The audit captures the WHO, WHAT, WHEN and WHERE of the access attempt. Authorized and unauthorized attempts are captured and reported<br />Information audit<br />
  99. 99. Contents<br /><ul><li>The Problem with Fileshare security
  100. 100. The Solution ..
  101. 101. What is Seclore FileSecure
  102. 102. What is Hot Folder Server
  103. 103. Policy definition
  104. 104. Assigning policies to folders
  105. 105. Protecting a file
  106. 106. Accessing a protected file
  107. 107. Audit trails
  108. 108. About Seclore</li></li></ul><li>Corporate Background …<br />“Seclore is a high growth software product company. Seclore’s technology helps mitigate the risks arising out of information breaches whilst enhancing collaboration”<br />6 years old, Headquartered in Mumbai, India<br />Promoted by IIT Bombay under the SINE program - www.sineiitb.org <br />Geographical and customer presence in Middle East, ASEAN, SAARC & Europe<br />Offerings focused on Information Rights Management and Secure Outsourcing<br />Stake holders including <br />IIT Bombay – www.iitb.ac.in<br />ICICI Bank – www.icicibank.com<br />Ventureast – www.ventureast.net<br />Technology and service differentiators focusing on minimally intrusive technology, value based pricing and usage without training<br />
  109. 109. About …<br />Value to customers<br />Security without compromising on collaboration<br />Customers across <br />….Diversified business groups<br />….Large financial services groups<br />….Engineering and manufacturing organizations<br />….Defence, Software, BPO, Consulting, Services, ….<br />
  110. 110. What customers say about us …<br />“We chose Seclore FileSecure due to the flexibility provided by Seclore in terms of solution capabilities and customization. Implementation of Seclore FileSecure has reduced the exposure of critical data for potential misuse or frauds. The business benefits are tremendous.”<br /> - Murli Nambiar, Head of Information Security<br />"Financial services companies like banks, insurance carriers & broking are ‘opening up’ their information systems and processes for participation by customers, partners and vendors. This of course brings in a lot of value chain integration and lowers costs but comes with information security needs which cannot be solved by present day systems. Seclore’s technology for securing documents as they flow within and outside enterprises as well as securing data shared with outsourcing partners is extremely relevant. <br /> - C N Ram. Group CIO, Essar group<br />
  111. 111. What industry experts say …<br />Seclore’s approach is different in that they not mandatory rely on such plug-ins but mainly act “below” the application. The client component (which is required to access protected, e.g. encrypted, documents) tries to analyze the activities off the application like access to the file system. One impact of that approach is that a document might be opened with different applications supporting the specific document format.<br />- Martin Kuppinger, One of the fore-most information security analysts<br />“Information breaches normally result in intellectual property violation which is a serious problem affecting industry today. Seclore’s combination of preventive and corrective methods of handling information breaches is invaluable to any industry”<br /> - Haigreve Khaitan (Managing partner – Khaitan and Co)<br />“Collaboration, security and privacy appear as mutually conflicting goals with most present day technologies. Seclore has resolved this conflict in a very elegant manner with its technology.”<br /> - Animesh Parihar (Global Delivery Head – SAP)<br />
  112. 112. Deloitte Technology Fast 50 is a ranking compiled every year based on percentage of growth of fiscal year revenue over three years. The companies must also fulfil other criterion of technology orientation.<br />‘Hidden Gems’ 2010 by Kuppinger Cole, Europe’s leading information security analyst firm is a report which lists vendors, which have a significantly differentiated offering and are market leaders in a particular segment.<br />Awards and recognition …<br />
  113. 113. … Awards and recognition<br /> The TR35 award is for innovators whose inventions and research, Massachusetts Institute of Technology (MIT) finds exciting. Technology Review, owned and published by MIT, is the world’s oldest technology magazine. <br /> “Innovations – ideas in practice” is an annual event honoring researchers and innovators for creative and innovative work in the sphere of science and technology. The innovation needs to have a high degree of practical relevance to change everyday life.<br />
  114. 114. More Info?<br />www.seclore.com<br />+91-22-4015-5252<br />

×