Data-Centric Security
2
OVERVIEW
Overview
• Every Organization has DATA which is vital for their organizational
growth and business opportunities. Most of the organization are
building foundation for the security controls around Structured Data
which is mostly stored in the organized storage like Database.
• Organization now have to protect the data from unauthorized access
not only from external users but also from internal users as criticality
of the data may be high. DATA LEAKS NOT ONLY puts pothole on
reputation of the organization but also leads to monetary
loss/penalties /legal action.
3
DATA-DRIVEN
SECURITY
SOLUTIONS
DATA-DRIVEN Security solutions
The core DATA-DRIVEN Security solutions can be categorized into the
following:
● Data Classification
● Data Loss/Leakage Prevention (DLP)
● Cloud Access Security Broker (CASB)
● Digital/Information Rights Management (IRM, DRM, ERM, EDRM)
4
HOW THE
SECURITY OF
THE
DOCUMENT/FIL
E BE ENSURED?
How the security of the document/file be ensured?
Can we assume that after printing from the file, vendor has deleted the
data from the device or from SFTP location?
Can the enterprise be 100% sure that data would not be misused in
future? NO
If we enforce DRM on the document or file, we can set the period of the
life of the document itself. We can even recall or revoke access to
information that we have shared to anybody. DRM maps the policy so
that the document can be protected automatically whenever they are
discovered, detected, downloaded or shared.
5
EMERGENCE
OF DATA
PROTECTION
LAWS
Emergence of Data Protection Laws
2018 has been a significant year for privacy and data protection laws in
the world. Some of the popular data protection laws are:
GDPR- The EU General Data Protection Regulation (GDPR) took effect on
May 25, 2019 and is a regulation in EU law on data protection and
privacy for all individuals citizens of the European Union (EU) and the
European Economic Area (EEA). The GDPR aims primarily to give control
to individuals over their personal data and simplifies the regulatory
environment for international business by unifying the regulation within
the EU.
6
EMERGENCE
OF DATA
PROTECTION
LAWS
Emergence of Data Protection Laws
2018 has been a significant year for privacy and data protection laws in
the world. Some of the popular data protection laws are:
CCPA- The California Consumer Privacy Act (CCPA) – a US law – which got
passed in California in 2018 and takes effect on January 1, 2020. The
CCPA applies to businesses (regardless of location) that collects personal
information about California residents, including customers and
employees.
7
SECLORE FOR
DATA
PROTECTION
LAWS
Seclore for Data Protection Laws
Security has always been paramount to Seclore because organizations
and government agencies rely on our solutions to protect their most
valuable asset – data. Seclore the only automated Data-Centric Security
Platform that has completed SOC 2 Type 1 and Type 2 certification.
SOC 2 certification is widely recognized as a gold standard for data
security. Completing both Type 1 and 2 certifications validate that
Seclore’s solutions have met the five trust principles of security,
availability, processing integrity, confidentiality, and privacy.
8
ABOUT
SECLORE
About Seclore
● Seclore offers the market’s first browser-based Data-Centric Security
Platform, which gives organizations the agility to utilize best-of-breed
solutions to discover, identify, protect, and audit the usage of data
wherever it goes, both within and outside of the organization’s
boundaries.
● The ability to automate the data-centric security process enables
organizations to fully protect information with minimal friction and cost.
● Over 2000 companies in 29 countries are using Seclore to achieve their
data security, governance, and compliance objectives.
9
CONTACT US
Contact US
● 691 S. MILPITAS BLVD SUITE # 217
MILPITAS, CA 95035
● 1-844-4-SECLORE
1-844-473-2567
● INFO@SECLORE.COM
Thank you!

Data-Centric Security | Seclore

  • 1.
  • 2.
    2 OVERVIEW Overview • Every Organizationhas DATA which is vital for their organizational growth and business opportunities. Most of the organization are building foundation for the security controls around Structured Data which is mostly stored in the organized storage like Database. • Organization now have to protect the data from unauthorized access not only from external users but also from internal users as criticality of the data may be high. DATA LEAKS NOT ONLY puts pothole on reputation of the organization but also leads to monetary loss/penalties /legal action.
  • 3.
    3 DATA-DRIVEN SECURITY SOLUTIONS DATA-DRIVEN Security solutions Thecore DATA-DRIVEN Security solutions can be categorized into the following: ● Data Classification ● Data Loss/Leakage Prevention (DLP) ● Cloud Access Security Broker (CASB) ● Digital/Information Rights Management (IRM, DRM, ERM, EDRM)
  • 4.
    4 HOW THE SECURITY OF THE DOCUMENT/FIL EBE ENSURED? How the security of the document/file be ensured? Can we assume that after printing from the file, vendor has deleted the data from the device or from SFTP location? Can the enterprise be 100% sure that data would not be misused in future? NO If we enforce DRM on the document or file, we can set the period of the life of the document itself. We can even recall or revoke access to information that we have shared to anybody. DRM maps the policy so that the document can be protected automatically whenever they are discovered, detected, downloaded or shared.
  • 5.
    5 EMERGENCE OF DATA PROTECTION LAWS Emergence ofData Protection Laws 2018 has been a significant year for privacy and data protection laws in the world. Some of the popular data protection laws are: GDPR- The EU General Data Protection Regulation (GDPR) took effect on May 25, 2019 and is a regulation in EU law on data protection and privacy for all individuals citizens of the European Union (EU) and the European Economic Area (EEA). The GDPR aims primarily to give control to individuals over their personal data and simplifies the regulatory environment for international business by unifying the regulation within the EU.
  • 6.
    6 EMERGENCE OF DATA PROTECTION LAWS Emergence ofData Protection Laws 2018 has been a significant year for privacy and data protection laws in the world. Some of the popular data protection laws are: CCPA- The California Consumer Privacy Act (CCPA) – a US law – which got passed in California in 2018 and takes effect on January 1, 2020. The CCPA applies to businesses (regardless of location) that collects personal information about California residents, including customers and employees.
  • 7.
    7 SECLORE FOR DATA PROTECTION LAWS Seclore forData Protection Laws Security has always been paramount to Seclore because organizations and government agencies rely on our solutions to protect their most valuable asset – data. Seclore the only automated Data-Centric Security Platform that has completed SOC 2 Type 1 and Type 2 certification. SOC 2 certification is widely recognized as a gold standard for data security. Completing both Type 1 and 2 certifications validate that Seclore’s solutions have met the five trust principles of security, availability, processing integrity, confidentiality, and privacy.
  • 8.
    8 ABOUT SECLORE About Seclore ● Secloreoffers the market’s first browser-based Data-Centric Security Platform, which gives organizations the agility to utilize best-of-breed solutions to discover, identify, protect, and audit the usage of data wherever it goes, both within and outside of the organization’s boundaries. ● The ability to automate the data-centric security process enables organizations to fully protect information with minimal friction and cost. ● Over 2000 companies in 29 countries are using Seclore to achieve their data security, governance, and compliance objectives.
  • 9.
    9 CONTACT US Contact US ●691 S. MILPITAS BLVD SUITE # 217 MILPITAS, CA 95035 ● 1-844-4-SECLORE 1-844-473-2567 ● INFO@SECLORE.COM
  • 10.