Seclore FileSecure IBM Filenet Walkthrough

1,702 views

Published on

Seclore integrates with ECM - IBM FileNet

Published in: Technology
0 Comments
3 Likes
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total views
1,702
On SlideShare
0
From Embeds
0
Number of Embeds
2
Actions
Shares
0
Downloads
4
Comments
0
Likes
3
Embeds 0
No embeds

No notes for slide

Seclore FileSecure IBM Filenet Walkthrough

  1. 1. Seclore Filesecure<br />FileNet Connector<br />Enhancing security of IBM FILENET<br />
  2. 2. Contents<br /><ul><li>Constraints of IBM FileNet security
  3. 3. The Solution ..
  4. 4. What is Seclore FileSecure
  5. 5. Seclore FileSecure connector for IBM FileNet
  6. 6. Policy definition
  7. 7. Assigning policies to FileNet folders
  8. 8. Uploading documents
  9. 9. Downloading a file from FileNet folder
  10. 10. Accessing a protected file
  11. 11. Audit trails
  12. 12. About Seclore</li></li></ul><li>A Process Flow of Product Plan<br />FileNet and security<br />FileNet<br />User<br />User<br />Edited<br />Copied<br />Printed<br />Viewed<br />Distributed<br />Un-protected File<br />FileNet accessed by users<br />FileNet security is not persistent . Once the file is downloaded locally, it can be edited, copied & distributed.<br />
  13. 13. Contents<br /><ul><li>Constraints of IBM FileNet security
  14. 14. The Solution ..
  15. 15. What is Seclore FileSecure
  16. 16. Seclore FileSecure connector for IBM FileNet
  17. 17. Policy definition
  18. 18. Assigning policies to FileNet folders
  19. 19. Uploading documents
  20. 20. Downloading a file from FileNet folder
  21. 21. Accessing a protected file
  22. 22. Audit trails
  23. 23. About Seclore</li></li></ul><li>Seclore FileSecure allow enterprises to define, implement & audit information usage “policies”. A “policy” defines :<br /><ul><li>WHO can use the information</li></ul>People & groups within and outside of the organization can be defined as rightful users of the information<br /><ul><li>WHATcan each person do</li></ul>Individual actions like reading, editing, printing, distributing, copy-pasting, screen grabbing etc. can be controlled<br /><ul><li>WHEN can he use it</li></ul>Information usage can be time based e.g. can only be used by Mr. A till 28th Sept OR only for the 2 days<br /><ul><li>WHERE can he use it from</li></ul>Information can be linked to locations e.g. only 3rd floor office by private/public IP addresses<br />SecloreFileSecure<br />
  24. 24. SecloreFileSecure<br /><ul><li>Policies are
  25. 25. Persistent: Implemented on information and all its copies wherever it is transmitted or stored
  26. 26. Dynamic: Policies can be changed after distributing information without having access to or redistributing the information
  27. 27. Policies can be attached to information on
  28. 28. Creation
  29. 29. Placement in a certain location e.g. shared folder
  30. 30. Attachment to email
  31. 31. Uploading to a document management / ECM system
  32. 32. …</li></li></ul><li>Contents<br /><ul><li>Constraints of IBM FileNet security
  33. 33. The Solution ..
  34. 34. What is Seclore FileSecure
  35. 35. Seclore FileSecure connector for IBM FileNet
  36. 36. Policy definition
  37. 37. Assigning policies to FileNet folders
  38. 38. Uploading documents
  39. 39. Downloading a file from FileNet folder
  40. 40. Accessing a protected file
  41. 41. Audit trails
  42. 42. About Seclore</li></li></ul><li>A Process Flow of Product Plan<br />Seclore FileSecure Enabled FileNet<br />FileNet + Seclore FileSecure<br />User<br />User<br />Edited<br />Copied<br />Printed<br />Viewed<br />Distributed<br />Protected File<br />FileNet<br />accessed by users<br />Files copied out of “FileNet Folder” are persistently protected. Rights to edit, copy, print and distribute are restricted based on Seclore FileSecure policies<br />
  43. 43. Contents<br /><ul><li>Constraints of IBM FileNet security
  44. 44. The Solution ..
  45. 45. What is Seclore FileSecure
  46. 46. Seclore FileSecure connector for IBM FileNet
  47. 47. Policy definition
  48. 48. Assigning policies to FileNet folders
  49. 49. Uploading documents
  50. 50. Downloading a file from FileNet folder
  51. 51. Accessing a protected file
  52. 52. Audit trails
  53. 53. About Seclore</li></li></ul><li>Policy definition–WHO, WHAT<br />10<br />Policy Admin<br />People / groups, within / outside the enterprise can be dis-allowed to edit, print, copy, forward etc. via a policy<br />
  54. 54. Policy definition–WHEN, WHERE<br />11<br />Policy Admin<br />A policy can expire information beyond a date / timespan and also restrict its usage to certain computers / networks<br />
  55. 55. Contents<br /><ul><li>Constraints of IBM FileNet security
  56. 56. The Solution ..
  57. 57. What is Seclore FileSecure
  58. 58. Seclore FileSecure connector for IBM FileNet
  59. 59. Policy definition
  60. 60. Assigning policies to FileNet folders
  61. 61. Uploading documents
  62. 62. Downloading a file from FileNet folder
  63. 63. Accessing a protected file
  64. 64. Audit trails
  65. 65. About Seclore</li></li></ul><li>Applying Policies…<br />13<br />FileNet<br />Admin<br />Policies can be applied to folders by the FileNet admin. The admin chooses the folder …<br />
  66. 66. 14<br />FileNet<br />Admin<br />Policies are applied…<br />…Applying Policies<br />
  67. 67. 15<br />Contents<br /><ul><li>Constraints of IBM FileNet security
  68. 68. The Solution ..
  69. 69. What is Seclore FileSecure
  70. 70. Seclore FileSecure connector for IBM FileNet
  71. 71. Policy definition
  72. 72. Assigning policies to FileNet folders
  73. 73. Uploading documents
  74. 74. Downloading a file from FileNet folder
  75. 75. Accessing a protected file
  76. 76. Audit trails
  77. 77. About Seclore</li></li></ul><li>16<br />FileNet<br />Admin<br />Add document<br />Add document…<br />
  78. 78. 17<br />FileNet<br />Admin<br />Add document<br />…Add document<br />
  79. 79. 18<br />FileNet<br />Admin<br />Document is uploaded<br />Document is uploaded<br />
  80. 80. Contents<br /><ul><li>Constraints of IBM FileNet security
  81. 81. The Solution ..
  82. 82. What is Seclore FileSecure
  83. 83. Seclore FileSecure connector for IBM FileNet
  84. 84. Policy definition
  85. 85. Assigning policies to FileNet folders
  86. 86. Uploading documents
  87. 87. Downloading a file from FileNet folder
  88. 88. Accessing a protected file
  89. 89. Audit trails
  90. 90. About Seclore</li></li></ul><li>20<br />Download document from FileNet…<br />User’s Computer<br />Once the user’s downloads the document <br />from Seclore FileSecure policy protected FileNet folder the file gets instantly protected<br />
  91. 91. …Download document from FileNet<br />21<br />Downloaded document <br />from FileNet.<br />Notice the red lock!<br />User’s Computer<br />…file gets instantly protected<br />
  92. 92. Contents<br /><ul><li>Constraints of IBM FileNet security
  93. 93. The Solution ..
  94. 94. What is Seclore FileSecure
  95. 95. Seclore FileSecure connector for IBM FileNet
  96. 96. Policy definition
  97. 97. Assigning policies to FileNet folders
  98. 98. Uploading documents
  99. 99. Downloading a file from FileNet folder
  100. 100. Accessing a protected file
  101. 101. Audit trails
  102. 102. About Seclore</li></li></ul><li>Rights display<br />23<br />User’s Computer<br />On clicking a rights display makes the recipient explicitly aware of his rights to the document<br />
  103. 103. Unauthorized print<br />24<br />User’s Computer<br />Unauthorized activities like attempts to print …<br />
  104. 104. 25<br />User’s Computer<br />… are disallowed<br />Unauthorized print<br />
  105. 105. 26<br />User’s Computer<br />Unauthorized activities like attempts to edit & save…<br />Unauthorized edit & save<br />
  106. 106. 27<br />User’s Computer<br />… are disallowed<br />Unauthorized edit & save<br />
  107. 107. 28<br />User’s Computer<br />Unauthorized copy<br />Attempts to copy parts / whole of the document …<br />
  108. 108. 29<br />User’s Computer<br />… are disallowed<br />Unauthorized copy<br />
  109. 109. 30<br />User’s Computer<br />Screen capture by the PrtScr key, screen grabbing tools like Camtasia and screen sharing tools like Webex is blocked<br />Unauthorized screen grab<br />
  110. 110. Contents<br /><ul><li>Constraints of IBM FileNet security
  111. 111. The Solution ..
  112. 112. What is Seclore FileSecure
  113. 113. Seclore FileSecure connector for IBM FileNet
  114. 114. Policy definition
  115. 115. Assigning policies to FileNet folders
  116. 116. Uploading documents
  117. 117. Downloading a file from FileNet folder
  118. 118. Accessing a protected file
  119. 119. Audit trails
  120. 120. About Seclore</li></li></ul><li>32<br />User’s Computer<br />The audit captures the WHO, WHAT, WHEN and WHERE of the access attempt. Authorized and unauthorized attempts are captured and reported<br />Information audit<br />
  121. 121. Contents<br /><ul><li>Constraints of IBM FileNet security
  122. 122. The Solution ..
  123. 123. What is Seclore FileSecure
  124. 124. Seclore FileSecure connector for IBM FileNet
  125. 125. Policy definition
  126. 126. Assigning policies to FileNet folders
  127. 127. Uploading documents
  128. 128. Downloading a file from FileNet folder
  129. 129. Accessing a protected file
  130. 130. Audit trails
  131. 131. About Seclore</li></li></ul><li>Corporate Background …<br />“Seclore is a high growth software product company. Seclore’s technology helps mitigate the risks arising out of information breaches whilst enhancing collaboration”<br />6 years old, Headquartered in Mumbai, India<br />Promoted by IIT Bombay under the SINE program - www.sineiitb.org <br />Geographical and customer presence in Middle East, ASEAN, SAARC & Europe<br />Offerings focused on Information Rights Management and Secure Outsourcing<br />Stake holders including <br />IIT Bombay – www.iitb.ac.in<br />ICICI Bank – www.icicibank.com<br />Ventureast – www.ventureast.net<br />Technology and service differentiators focusing on minimally intrusive technology, value based pricing and usage without training<br />
  132. 132. About …<br />Value to customers<br />Security without compromising on collaboration<br />Customers across <br />….Diversified business groups<br />….Large financial services groups<br />….Engineering and manufacturing organizations<br />….Defence, Software, BPO, Consulting, Services, ….<br />
  133. 133. What customers say about us …<br />“We chose Seclore FileSecure due to the flexibility provided by Seclore in terms of solution capabilities and customization. Implementation of Seclore FileSecure has reduced the exposure of critical data for potential misuse or frauds. The business benefits are tremendous.”<br /> - Murli Nambiar, Head of Information Security<br />"Financial services companies like banks, insurance carriers & broking are ‘opening up’ their information systems and processes for participation by customers, partners and vendors. This of course brings in a lot of value chain integration and lowers costs but comes with information security needs which cannot be solved by present day systems. Seclore’s technology for securing documents as they flow within and outside enterprises as well as securing data shared with outsourcing partners is extremely relevant. <br /> - C N Ram. Group CIO, Essar group<br />
  134. 134. What industry experts say …<br />Seclore’s approach is different in that they not mandatory rely on such plug-ins but mainly act “below” the application. The client component (which is required to access protected, e.g. encrypted, documents) tries to analyze the activities off the application like access to the file system. One impact of that approach is that a document might be opened with different applications supporting the specific document format.<br />- Martin Kuppinger, One of the fore-most information security analysts<br />“Information breaches normally result in intellectual property violation which is a serious problem affecting industry today. Seclore’s combination of preventive and corrective methods of handling information breaches is invaluable to any industry”<br /> - Haigreve Khaitan (Managing partner – Khaitan and Co)<br />“Collaboration, security and privacy appear as mutually conflicting goals with most present day technologies. Seclore has resolved this conflict in a very elegant manner with its technology.”<br /> - Animesh Parihar (Global Delivery Head – SAP)<br />
  135. 135. Deloitte Technology Fast 50 is a ranking compiled every year based on percentage of growth of fiscal year revenue over three years. The companies must also fulfil other criterion of technology orientation.<br />‘Hidden Gems’ 2010 by Kuppinger Cole, Europe’s leading information security analyst firm is a report which lists vendors, which have a significantly differentiated offering and are market leaders in a particular segment.<br />Awards and recognition …<br />
  136. 136. … Awards and recognition<br /> The TR35 award is for innovators whose inventions and research, Massachusetts Institute of Technology (MIT) finds exciting. Technology Review, owned and published by MIT, is the world’s oldest technology magazine. <br /> “Innovations – ideas in practice” is an annual event honoring researchers and innovators for creative and innovative work in the sphere of science and technology. The innovation needs to have a high degree of practical relevance to change everyday life.<br />
  137. 137. More Info?<br />www.seclore.com<br />+91-22-4015-5252<br />

×