Presentation by Seclore Technologies at Zensar #TechShowcase. An iSPIRT ProductNation initiative. Started in 2007; they work in the space of information security policy based. Their tag line is security not at the cost of collaboration.
2. Corporate Background
High growth information security product company
Active operations since 2007, products available since 2010
Promoted by IIT Bombay www.iitb.ac.in
Technology commercialization program www.sineiitb.org
Products in the area of IRM and secure outsourcing
Geographic coverage
Direct – South Asia, Europe, North America
Indirect – Parts of Africa, parts of South America, North Asia
Key stakeholders include
IIT Bombay – Premier research and training organization
Institutional investors – Ventureast, Helion
Private and Confidential 2
3. Seclore was in 2010 global list of "Hidden Gems" in Identity and Access Management
Hidden Gems’ 2010 by Kuppinger Cole, Europe’s leading information security analyst firm, is a report which lists vendors, which
have a significantly differentiated offering and are market leaders in a particular segment
Seclore was among the top 10 finalists in the Innovations Ideas in Practice 2010 by IIT, Bombay Alumni Association, Pune
“Innovations – ideas in practice” is an annual event honoring researchers and innovators for creative and innovative work in the
sphere of science and technology
Private and Confidential 3
Awards & Recognition
2012
Seclore was named as the Gartner Cool Vendor for 2012
Gartner's 2012 Cool Vendors focus on delivering better business results through consumption of both services and technology
2012 Seclore was named in the Deloitte Technology Fast 50 for 2012
2010
2010
2009 Seclore was among the top 25 in the Marico Innovation for India 2010 Awards
The TR35 award is for innovators whose inventions and research, Massachusetts Institute of Technology (MIT) finds exciting
Technology Review, owned and published by MIT, is the world’s oldest technology magazine
2009
4. Marquee customers
Private and Confidential 4
Over 3.5 Million users across ~ 370 large enterprises
References and case studies available here
5. Presence and numbers
Global offices, ~ 100 people technology team focused on
Seclore FileSecure
Partnerships with leading SI companies for global
implementation, integration and support
Customers spread across timezones, languages and cultures
Private and Confidential 5
7. Problems we solve
Information security during collaboration
Normally seen as “mutually conflicting” goals
Security systems perimeter centric – rendered useless when information
leaves the perimeter
Information breaches during outsourcing
Security, privacy and compliance norms while outsourcing
Present day solutions archaic and centered around “building walls”
Information audits
Present systems help IT systems audits and not information audits
Compliance to ISO, HIPAA, PCI, SOX, ...
Private and Confidential 7
13. The dream …
Private and Confidential 13
WHO can use
People & groups within and outside of the
organization can be defined as rightful users
of the information
WHAT can (s)he do
Individual actions like
reading, editing, printing, distributing, copy
-pasting, screen grabbing etc. can be
controlled
WHEN can (s)he use it
Information usage can be time based e.g. can
only be used by Mr. A till 28th Sept OR only
for the 2 days
WHERE can (s)he use it from
Information can be linked to locations e.g. only
3rd floor office by private/public IP
addresses
15. • WHO can use the information
People & groups within and outside of the organization
can be defined as rightful users of the information
• WHAT can each person do
Individual actions like
reading, editing, printing, distributing, copy-
pasting, screen grabbing etc. can be controlled
• WHEN can he use it
Information usage can be time based e.g. can only be
used by Mr. A till 28th Sept OR only for the 2 days
• WHERE can he use it from
Information can be linked to locations e.g. only 3rd
floor office by private/public IP addresses
IRM allow enterprises to define, implement & audit information
usage “policies”. A “policy” defines :
Information Rights Management - defined
15
40. Company Product Product type
FileNet Content Management
Lotus Notes Mail and Messaging
Symantec DLP Data Loss Prevention
McAfee DLP Data Loss Prevention
Websense DLP Data Loss Prevention
SharePoint Content Management
Outlook Mail and Messaging
SAP ERP Transaction backbone
GTB DLP Data Loss Prevention
MyDLP DLP Data Loss Prevention
RSA DLP Data Loss Prevention
Omnidocs Content Management
Integrated Offerings
Private and Confidential 40