SlideShare a Scribd company logo
1 of 38
Seclore Filesecure
      SharePOINT Connector
Enhancing security of MS SharePOINT
Contents
• Constraints with MS SharePoint

• The Solution ..
  •   What is Seclore FileSecure
  •   Seclore FileSecure connector for MS SharePoint
  •   Policy definition
  •   Assigning policies to Sharepoint folders
  •   Uploading documents
  •   Downloading a file from Sharepoint folder
  •   Accessing a protected file
  •   Audit trails


• About Seclore
Sharepoint and security
            A Process Flow of Product Plan
               User
               User                                          Sharepoint




                                Edited


                                Copied



                                Printed

     Un-protected File
                                 Viewed             Distributed



 Sharepoint        Sharepoint security is not persistent . Once the file is
accessed by           downloaded locally, it can be edited, copied &
   users                                distributed.
Contents
• Constraints with MS SharePoint

• The Solution ..
  •   What is Seclore FileSecure
  •   Seclore FileSecure connector for MS SharePoint
  •   Policy definition
  •   Assigning policies to Sharepoint folders
  •   Uploading documents
  •   Downloading a file from Sharepoint folder
  •   Accessing a protected file
  •   Audit trails


• About Seclore
Seclore FileSecure
Seclore FileSecure allow enterprises to define, implement & audit
information usage “policies”. A “policy” defines :

 • WHO can use the information
 People & groups within and outside of the organization
     can be defined as rightful users of the information

 • WHAT can each person do
 Individual actions like reading, editing, printing,
      distributing, copy-pasting, screen grabbing etc.
      can be controlled

 • WHEN can he use it
 Information usage can be time based e.g. can only be
      used by Mr. A till 28th Sept OR only for the 2
      days

 • WHERE can he use it from
 Information can be linked to locations e.g. only 3rd
      floor office by private/public IP addresses
Seclore FileSecure

• Policies are
   – Persistent: Implemented on information and all its copies
     wherever it is transmitted or stored
   – Dynamic: Policies can be changed after distributing information
     without having access to or redistributing the information


• Policies can be attached to information on
   –   Creation
   –   Placement in a certain location e.g. shared folder
   –   Attachment to email
   –   Uploading to a document management / ECM system
   –   …
Contents
• Constraints with MS SharePoint

• The Solution ..
  •   What is Seclore FileSecure
  •   Seclore FileSecure connector for MS SharePoint
  •   Policy definition
  •   Assigning policies to Sharepoint folders
  •   Uploading documents
  •   Downloading a file from Sharepoint folder
  •   Accessing a protected file
  •   Audit trails


• About Seclore
Seclore FileSecure Enabled Sharepoint
                     A Process Flow of Product SharePoint + Seclore
                                               Plan
              User
              User                                          FileSecure




                                Edited


                                Copied



                                Printed

    Protected File
                                 Viewed           Distributed



 Sharepoint      Files copied out of “Sharepoint Folder” are persistently
accessed by      protected. Rights to edit, copy, print and distribute are
   users             restricted based on Seclore FileSecure policies
Contents
• Constraints with MS SharePoint

• The Solution ..
  •   What is Seclore FileSecure
  •   Seclore FileSecure connector for MS SharePoint
  •   Policy definition
  •   Assigning policies to Sharepoint folders
  •   Uploading documents
  •   Downloading a file from Sharepoint folder
  •   Accessing a protected file
  •   Audit trails


• About Seclore
Policy definition–WHO, WHAT




Policy   People / groups, within / outside the enterprise can be
Admin    dis-allowed to edit, print, copy, forward etc. via a policy 10
Policy definition–WHEN, WHERE




            A policy can expire information beyond a date /
 Policy
            timespan and also restrict its usage to certain
 Admin                                                        11
                         computers / networks
Contents
• Constraints with MS SharePoint

• The Solution ..
  •   What is Seclore FileSecure
  •   Seclore FileSecure connector for MS SharePoint
  •   Policy definition
  •   Assigning policies to Sharepoint folders
  •   Uploading documents
  •   Downloading a file from Sharepoint folder
  •   Accessing a protected file
  •   Audit trails


• About Seclore
Applying Policies…




Sharepoint   Policies can be applied to folders by the Sharepoint
  Admin            admin. The admin chooses the folder …            13
…Applying Policies




Sharepoint
                       Policies are applied…
  Admin                                        14
Contents
• Constraints with MS SharePoint

• The Solution ..
  •   What is Seclore FileSecure
  •   Seclore FileSecure connector for MS SharePoint
  •   Policy definition
  •   Assigning policies to Sharepoint folders
  •   Uploading documents
  •   Downloading a file from Sharepoint folder
  •   Accessing a protected file
  •   Audit trails


• About Seclore
                                                       15
Upload document…




Sharepoint
                      Upload document
  Admin                                 16
…Upload document




Sharepoint
                      Upload document
  Admin                                 17
Document is uploaded




Sharepoint
                     Document is uploaded
  Admin                                     18
Contents
• Constraints with MS SharePoint

• The Solution ..
  •   What is Seclore FileSecure
  •   Seclore FileSecure connector for MS SharePoint
  •   Policy definition
  •   Assigning policies to Sharepoint folders
  •   Uploading documents
  •   Downloading a file from Sharepoint folder
  •   Accessing a protected file
  •   Audit trails


• About Seclore
Download document from Sharepoint…




           Once the user’s downloads the document from Seclore
 User’s
            FileSecure policy protected Sharepoint folder the file
Computer                                                           20
                          gets instantly protected
…Download document from Sharepoint


                Downloaded document
                   from Sharepoint
                 Notice the red lock




 User’s
                      …the file is instantly protected
Computer                                                 21
Contents
• Constraints with MS SharePoint

• The Solution ..
  •   What is Seclore FileSecure
  •   Seclore FileSecure connector for MS SharePoint
  •   Policy definition
  •   Assigning policies to Sharepoint folders
  •   Uploading documents
  •   Downloading a file from Sharepoint folder
  •   Accessing a protected file
  •   Audit trails


• About Seclore
Rights display




 User’s        On clicking a rights display makes the recipient
Computer        explicitly aware of his rights to the document    23
Unauthorized print




 User’s
             Unauthorized activities like attempts to print …
Computer                                                        24
Unauthorized print




 User’s
                        … are disallowed
Computer                                   25
Unauthorized copy




 User’s
            Attempts to copy parts / whole of the document …
Computer                                                       26
Unauthorized copy




 User’s
                       … are disallowed
Computer                                  27
Unauthorized screen grab




           Screen capture by the Prt Scr key, screen grabbing tools
 User’s
            like Camtasia and screen sharing tools like Webex is
Computer                                                            28
                                  blocked
Contents
• Constraints with MS SharePoint

• The Solution ..
  •   What is Seclore FileSecure
  •   Seclore FileSecure connector for MS SharePoint
  •   Policy definition
  •   Assigning policies to Sharepoint folders
  •   Uploading documents
  •   Downloading a file from Sharepoint folder
  •   Accessing a protected file
  •   Audit trails


• About Seclore
Information audit




              The audit captures the WHO, WHAT, WHEN and WHERE
 User’s
                of the access attempt. Authorized and unauthorized
Computer                                                           30
                         attempts are captured and reported
Contents
• The Problem with MS SharePoint

• The Solution ..
  •   What is Seclore FileSecure
  •   What is Seclore FileSecure enabled – MS SharePoint
  •   Policy definition
  •   Assigning policies to Sharepoint folders
  •   Uploading documents
  •   Downloading a file from Sharepoint folder
  •   Accessing a protected file
  •   Audit trails


• About Seclore
Corporate Background …
“Seclore is a high growth software product company. Seclore’s technology
    helps mitigate the risks arising out of information breaches whilst
                         enhancing collaboration”


6 years old, Headquartered in Mumbai, India
Promoted by IIT Bombay under the SINE program - www.sineiitb.org
Geographical and customer presence in Middle East, ASEAN, SAARC & Europe
Offerings focused on Information Rights Management and Secure Outsourcing
Stake holders including
   IIT Bombay – www.iitb.ac.in
   ICICI Bank – www.icicibank.com
   Ventureast – www.ventureast.net
Technology and service differentiators focusing on minimally intrusive technology,
   value based pricing and usage without training
About …
               Value to customers
Security without compromising on collaboration
               Customers across
                                  ….Diversified business groups


                              ….Large financial services groups


                 ….Engineering and manufacturing organizations




            ….Defence, Software, BPO, Consulting, Services, ….
What customers say about us …

         “We chose Seclore FileSecure due to the flexibility provided by Seclore in
         terms of solution capabilities and customization. Implementation of
         Seclore FileSecure has reduced the exposure of critical data for potential
         misuse or frauds. The business benefits are tremendous.”
          - Murli Nambiar, Head of Information Security


          "Financial services companies like banks, insurance carriers & broking are
          ‘opening up’ their information systems and processes for participation by
          customers, partners and vendors. This of course brings in a lot of value
          chain integration and lowers costs but comes with information security
          needs which cannot be solved by present day systems. Seclore’s
          technology for securing documents as they flow within and outside
          enterprises as well as securing data shared with outsourcing partners is
          extremely relevant.
            - C N Ram. Group CIO, Essar group
What industry experts say …
                                                          Seclore’s approach is different in that they not mandatory
                                                          rely on such plug-ins but mainly act “below” the
                                                          application. The client component (which is required to
                                                          access protected, e.g. encrypted, documents) tries to
                                                          analyze the activities off the application like access to the
                                                          file system. One impact of that approach is that a
                                                          document might be opened with different applications
                                                          supporting the specific document format.

- Martin Kuppinger, One of the fore-most information security analysts



              “Information breaches normally result in intellectual property violation which is a serious problem
              affecting industry today. Seclore’s combination of preventive and corrective methods of handling
              information breaches is invaluable to any industry”
                - Haigreve Khaitan (Managing partner – Khaitan and Co)




              “Collaboration, security and privacy appear as mutually conflicting goals with most present day
              technologies. Seclore has resolved this conflict in a very elegant manner with its technology.”
               - Animesh Parihar (Global Delivery Head – SAP)
Awards and recognition …



                                                  Deloitte Technology Fast 50 is a ranking compiled
                                                  every year based on percentage of growth of
                                                  fiscal year revenue over three years. The
                                                  companies must also fulfil other criterion of
                                                  technology orientation.




 ‘Hidden Gems’ 2010 by Kuppinger Cole, Europe’s
leading information security analyst firm is a report
      which lists vendors, which have a significantly
  differentiated offering and are market leaders in a
                                  particular segment.
… Awards and recognition




                                 The TR35 award is for innovators whose inventions and research,
                                 Massachusetts Institute of Technology (MIT) finds exciting. Technology
                                 Review, owned and published by MIT, is the world’s oldest technology
                                 magazine.




      “Innovations – ideas in practice” is an annual event honoring
 researchers and innovators for creative and innovative work in the
sphere of science and technology. The innovation needs to have a high
                 degree of practical relevance to change everyday life.
More Info?




www.seclore.com
   +91-22-4015-5252

More Related Content

What's hot

Micro segmentation and zero trust for security and compliance - Guardicore an...
Micro segmentation and zero trust for security and compliance - Guardicore an...Micro segmentation and zero trust for security and compliance - Guardicore an...
Micro segmentation and zero trust for security and compliance - Guardicore an...YouAttestSlideshare
 
Security-by-Design in Enterprise Architecture
Security-by-Design in Enterprise ArchitectureSecurity-by-Design in Enterprise Architecture
Security-by-Design in Enterprise ArchitectureThe Open Group SA
 
A Practical Example to Using SABSA Extended Security-in-Depth Strategy
A Practical Example to Using SABSA Extended Security-in-Depth Strategy A Practical Example to Using SABSA Extended Security-in-Depth Strategy
A Practical Example to Using SABSA Extended Security-in-Depth Strategy Allen Baranov
 
Making a cloud first strategy a practical reality
Making a cloud first strategy a practical realityMaking a cloud first strategy a practical reality
Making a cloud first strategy a practical realityAmazon Web Services
 
Cybersecurity Insiders Webinar - Zero Trust: Best Practices for Securing the...
Cybersecurity Insiders Webinar  - Zero Trust: Best Practices for Securing the...Cybersecurity Insiders Webinar  - Zero Trust: Best Practices for Securing the...
Cybersecurity Insiders Webinar - Zero Trust: Best Practices for Securing the...Ivanti
 
What is SASE and How Can Partners Talk About it?
What is SASE and How Can Partners Talk About it?What is SASE and How Can Partners Talk About it?
What is SASE and How Can Partners Talk About it?QOS Networks
 
Cisco umbrella overview
Cisco umbrella overviewCisco umbrella overview
Cisco umbrella overviewCisco Canada
 
Azure Cloud Adoption Framework + Governance - Sana Khan and Jay Kumar
Azure Cloud Adoption Framework + Governance - Sana Khan and Jay Kumar Azure Cloud Adoption Framework + Governance - Sana Khan and Jay Kumar
Azure Cloud Adoption Framework + Governance - Sana Khan and Jay Kumar Timothy McAliley
 
Cato Management Console
Cato Management ConsoleCato Management Console
Cato Management ConsoleCatoNetworks
 
Integrated Cloud Framework: Security, Governance, Compliance, Content Applica...
Integrated Cloud Framework: Security, Governance, Compliance, Content Applica...Integrated Cloud Framework: Security, Governance, Compliance, Content Applica...
Integrated Cloud Framework: Security, Governance, Compliance, Content Applica...Chad Lawler
 
Demystifying Prisma Access
Demystifying Prisma AccessDemystifying Prisma Access
Demystifying Prisma AccessHaris Chughtai
 
Cloud Access Security Brokers - CASB
Cloud Access Security Brokers - CASB Cloud Access Security Brokers - CASB
Cloud Access Security Brokers - CASB Samrat Das
 
Cloud security and security architecture
Cloud security and security architectureCloud security and security architecture
Cloud security and security architectureVladimir Jirasek
 
Security Building Blocks of the IBM Cloud Computing Reference Architecture
Security Building Blocks of the IBM Cloud Computing Reference ArchitectureSecurity Building Blocks of the IBM Cloud Computing Reference Architecture
Security Building Blocks of the IBM Cloud Computing Reference ArchitectureStefaan Van daele
 

What's hot (20)

Micro segmentation and zero trust for security and compliance - Guardicore an...
Micro segmentation and zero trust for security and compliance - Guardicore an...Micro segmentation and zero trust for security and compliance - Guardicore an...
Micro segmentation and zero trust for security and compliance - Guardicore an...
 
AWS Security Checklist
AWS Security ChecklistAWS Security Checklist
AWS Security Checklist
 
Security-by-Design in Enterprise Architecture
Security-by-Design in Enterprise ArchitectureSecurity-by-Design in Enterprise Architecture
Security-by-Design in Enterprise Architecture
 
A Practical Example to Using SABSA Extended Security-in-Depth Strategy
A Practical Example to Using SABSA Extended Security-in-Depth Strategy A Practical Example to Using SABSA Extended Security-in-Depth Strategy
A Practical Example to Using SABSA Extended Security-in-Depth Strategy
 
Making a cloud first strategy a practical reality
Making a cloud first strategy a practical realityMaking a cloud first strategy a practical reality
Making a cloud first strategy a practical reality
 
Cybersecurity Insiders Webinar - Zero Trust: Best Practices for Securing the...
Cybersecurity Insiders Webinar  - Zero Trust: Best Practices for Securing the...Cybersecurity Insiders Webinar  - Zero Trust: Best Practices for Securing the...
Cybersecurity Insiders Webinar - Zero Trust: Best Practices for Securing the...
 
What is SASE and How Can Partners Talk About it?
What is SASE and How Can Partners Talk About it?What is SASE and How Can Partners Talk About it?
What is SASE and How Can Partners Talk About it?
 
Cisco umbrella overview
Cisco umbrella overviewCisco umbrella overview
Cisco umbrella overview
 
Azure Cloud Adoption Framework + Governance - Sana Khan and Jay Kumar
Azure Cloud Adoption Framework + Governance - Sana Khan and Jay Kumar Azure Cloud Adoption Framework + Governance - Sana Khan and Jay Kumar
Azure Cloud Adoption Framework + Governance - Sana Khan and Jay Kumar
 
Understanding SASE
Understanding SASE Understanding SASE
Understanding SASE
 
Cato Management Console
Cato Management ConsoleCato Management Console
Cato Management Console
 
NetScaler ADC - Customer Overview
NetScaler ADC - Customer OverviewNetScaler ADC - Customer Overview
NetScaler ADC - Customer Overview
 
Cloud migration
Cloud migrationCloud migration
Cloud migration
 
Integrated Cloud Framework: Security, Governance, Compliance, Content Applica...
Integrated Cloud Framework: Security, Governance, Compliance, Content Applica...Integrated Cloud Framework: Security, Governance, Compliance, Content Applica...
Integrated Cloud Framework: Security, Governance, Compliance, Content Applica...
 
Cloud security
Cloud securityCloud security
Cloud security
 
Azure fundamentals
Azure fundamentalsAzure fundamentals
Azure fundamentals
 
Demystifying Prisma Access
Demystifying Prisma AccessDemystifying Prisma Access
Demystifying Prisma Access
 
Cloud Access Security Brokers - CASB
Cloud Access Security Brokers - CASB Cloud Access Security Brokers - CASB
Cloud Access Security Brokers - CASB
 
Cloud security and security architecture
Cloud security and security architectureCloud security and security architecture
Cloud security and security architecture
 
Security Building Blocks of the IBM Cloud Computing Reference Architecture
Security Building Blocks of the IBM Cloud Computing Reference ArchitectureSecurity Building Blocks of the IBM Cloud Computing Reference Architecture
Security Building Blocks of the IBM Cloud Computing Reference Architecture
 

Viewers also liked

Bo p, disequlibrium
Bo p, disequlibriumBo p, disequlibrium
Bo p, disequlibriumwwgreatmutha
 
Xabier,itzea,peio and asier n
Xabier,itzea,peio and asier nXabier,itzea,peio and asier n
Xabier,itzea,peio and asier nartxandape
 
吳威龍
吳威龍吳威龍
吳威龍輝 哲
 
Introduction to Message-Oriented Middleware
Introduction to Message-Oriented MiddlewareIntroduction to Message-Oriented Middleware
Introduction to Message-Oriented MiddlewareEdward Curry
 
Simple machines ly kell & mckenzie
Simple machines ly kell & mckenzieSimple machines ly kell & mckenzie
Simple machines ly kell & mckenziesmbass62
 
Pathways through Participation - Final report launch presentation
Pathways through Participation - Final report launch presentationPathways through Participation - Final report launch presentation
Pathways through Participation - Final report launch presentationTimJHughes
 
Cartelera de cine Roxy Valladolid 29 junio 2012 Ocio y Rutas Valladolid
Cartelera de cine Roxy Valladolid 29 junio 2012 Ocio y Rutas ValladolidCartelera de cine Roxy Valladolid 29 junio 2012 Ocio y Rutas Valladolid
Cartelera de cine Roxy Valladolid 29 junio 2012 Ocio y Rutas ValladolidOcio y Rutas Valladolid
 
MediaCat dergisi, Event Marketing eki 2009/06
MediaCat dergisi, Event Marketing eki 2009/06MediaCat dergisi, Event Marketing eki 2009/06
MediaCat dergisi, Event Marketing eki 2009/06Hakan Turkkusu
 
Alegaciones a la nueva plaza de Director del Área de Seguridad Ciudadana, Mov...
Alegaciones a la nueva plaza de Director del Área de Seguridad Ciudadana, Mov...Alegaciones a la nueva plaza de Director del Área de Seguridad Ciudadana, Mov...
Alegaciones a la nueva plaza de Director del Área de Seguridad Ciudadana, Mov...UPyDMajadahonda
 
التشخيص الميداني حول ظاهرة تشغيل الأطفال بأسفي2012 2013 دراسة للنقابة الوطنية...
التشخيص الميداني حول ظاهرة تشغيل الأطفال بأسفي2012 2013 دراسة للنقابة الوطنية...التشخيص الميداني حول ظاهرة تشغيل الأطفال بأسفي2012 2013 دراسة للنقابة الوطنية...
التشخيص الميداني حول ظاهرة تشغيل الأطفال بأسفي2012 2013 دراسة للنقابة الوطنية...CMCF(Centre Maroco-Coréen de Formation en TICE)
 
Pecutan terakhir
Pecutan terakhirPecutan terakhir
Pecutan terakhir123syahier
 
229232801 cooperare-judiciară-in-materie-penală-culegere-de-practică-judiciar...
229232801 cooperare-judiciară-in-materie-penală-culegere-de-practică-judiciar...229232801 cooperare-judiciară-in-materie-penală-culegere-de-practică-judiciar...
229232801 cooperare-judiciară-in-materie-penală-culegere-de-practică-judiciar...exodumuser
 

Viewers also liked (20)

Bo p, disequlibrium
Bo p, disequlibriumBo p, disequlibrium
Bo p, disequlibrium
 
130624 auto layout
130624 auto layout130624 auto layout
130624 auto layout
 
Xabier,itzea,peio and asier n
Xabier,itzea,peio and asier nXabier,itzea,peio and asier n
Xabier,itzea,peio and asier n
 
吳威龍
吳威龍吳威龍
吳威龍
 
Introduction to Message-Oriented Middleware
Introduction to Message-Oriented MiddlewareIntroduction to Message-Oriented Middleware
Introduction to Message-Oriented Middleware
 
Simple machines ly kell & mckenzie
Simple machines ly kell & mckenzieSimple machines ly kell & mckenzie
Simple machines ly kell & mckenzie
 
Space/Narrative PPT
Space/Narrative PPTSpace/Narrative PPT
Space/Narrative PPT
 
Pathways through Participation - Final report launch presentation
Pathways through Participation - Final report launch presentationPathways through Participation - Final report launch presentation
Pathways through Participation - Final report launch presentation
 
sci
scisci
sci
 
Farsund digitalworkshop
Farsund digitalworkshopFarsund digitalworkshop
Farsund digitalworkshop
 
Cartelera de cine Roxy Valladolid 29 junio 2012 Ocio y Rutas Valladolid
Cartelera de cine Roxy Valladolid 29 junio 2012 Ocio y Rutas ValladolidCartelera de cine Roxy Valladolid 29 junio 2012 Ocio y Rutas Valladolid
Cartelera de cine Roxy Valladolid 29 junio 2012 Ocio y Rutas Valladolid
 
Tutoria herramientas
Tutoria herramientasTutoria herramientas
Tutoria herramientas
 
MediaCat dergisi, Event Marketing eki 2009/06
MediaCat dergisi, Event Marketing eki 2009/06MediaCat dergisi, Event Marketing eki 2009/06
MediaCat dergisi, Event Marketing eki 2009/06
 
Teste em 1º periodo 16-17 1-
Teste em   1º periodo 16-17  1-Teste em   1º periodo 16-17  1-
Teste em 1º periodo 16-17 1-
 
Presentazione mosi
Presentazione mosiPresentazione mosi
Presentazione mosi
 
Alegaciones a la nueva plaza de Director del Área de Seguridad Ciudadana, Mov...
Alegaciones a la nueva plaza de Director del Área de Seguridad Ciudadana, Mov...Alegaciones a la nueva plaza de Director del Área de Seguridad Ciudadana, Mov...
Alegaciones a la nueva plaza de Director del Área de Seguridad Ciudadana, Mov...
 
التشخيص الميداني حول ظاهرة تشغيل الأطفال بأسفي2012 2013 دراسة للنقابة الوطنية...
التشخيص الميداني حول ظاهرة تشغيل الأطفال بأسفي2012 2013 دراسة للنقابة الوطنية...التشخيص الميداني حول ظاهرة تشغيل الأطفال بأسفي2012 2013 دراسة للنقابة الوطنية...
التشخيص الميداني حول ظاهرة تشغيل الأطفال بأسفي2012 2013 دراسة للنقابة الوطنية...
 
Top 10 tech tools
Top 10 tech toolsTop 10 tech tools
Top 10 tech tools
 
Pecutan terakhir
Pecutan terakhirPecutan terakhir
Pecutan terakhir
 
229232801 cooperare-judiciară-in-materie-penală-culegere-de-practică-judiciar...
229232801 cooperare-judiciară-in-materie-penală-culegere-de-practică-judiciar...229232801 cooperare-judiciară-in-materie-penală-culegere-de-practică-judiciar...
229232801 cooperare-judiciară-in-materie-penală-culegere-de-practică-judiciar...
 

Similar to Seclore File Secure Sharepoint Walkthrough

Irmintroductionforautocad 110415002444-phpapp02
Irmintroductionforautocad 110415002444-phpapp02Irmintroductionforautocad 110415002444-phpapp02
Irmintroductionforautocad 110415002444-phpapp02gilberteric
 
Seclore FileSecure IBM Filenet Walkthrough
Seclore FileSecure IBM Filenet WalkthroughSeclore FileSecure IBM Filenet Walkthrough
Seclore FileSecure IBM Filenet Walkthroughsiddarthc
 
Intelligent Security, Compliance and Privacy in Office 365
Intelligent Security, Compliance and Privacy in Office 365Intelligent Security, Compliance and Privacy in Office 365
Intelligent Security, Compliance and Privacy in Office 365Miguel Isidoro
 
Seclore FileSecure HotFolder Walkthrough
Seclore FileSecure HotFolder WalkthroughSeclore FileSecure HotFolder Walkthrough
Seclore FileSecure HotFolder Walkthroughsiddarthc
 
What's new with Security & Compliance for SharePoint, OneDrive, and Teams
What's new with Security & Compliance for SharePoint, OneDrive, and TeamsWhat's new with Security & Compliance for SharePoint, OneDrive, and Teams
What's new with Security & Compliance for SharePoint, OneDrive, and TeamsDrew Madelung
 
ESDDC - Making Secured Content Discoverable in SharePoint
ESDDC - Making Secured Content Discoverable in SharePointESDDC - Making Secured Content Discoverable in SharePoint
ESDDC - Making Secured Content Discoverable in SharePointJonathan Ralton
 
Infoaxon extended enterprise
Infoaxon extended enterpriseInfoaxon extended enterprise
Infoaxon extended enterpriseNavnit Saurabh
 
SIKM Boston - Making Secured Content Discoverable in SharePoint
SIKM Boston - Making Secured Content Discoverable in SharePointSIKM Boston - Making Secured Content Discoverable in SharePoint
SIKM Boston - Making Secured Content Discoverable in SharePointJonathan Ralton
 
Best practices for security and governance in share point 2013 published
Best practices for security and governance in share point 2013   publishedBest practices for security and governance in share point 2013   published
Best practices for security and governance in share point 2013 publishedAntonioMaio2
 
March 2023 CIAOPS Need to Know Webinar
March 2023 CIAOPS Need to Know WebinarMarch 2023 CIAOPS Need to Know Webinar
March 2023 CIAOPS Need to Know WebinarRobert Crane
 
Enterprise File Synchronization and Sharing - Biscom Verosync
Enterprise File Synchronization and Sharing - Biscom VerosyncEnterprise File Synchronization and Sharing - Biscom Verosync
Enterprise File Synchronization and Sharing - Biscom VerosyncBiscomMarketing
 
Integrating and positioning IBM Connections in an existing information manage...
Integrating and positioning IBM Connections in an existing information manage...Integrating and positioning IBM Connections in an existing information manage...
Integrating and positioning IBM Connections in an existing information manage...Femke Goedhart
 
5 Reason – To Use Seclore for Microsoft Teams
5 Reason – To Use Seclore for Microsoft Teams5 Reason – To Use Seclore for Microsoft Teams
5 Reason – To Use Seclore for Microsoft TeamsSeclore
 
File Security in Microsoft SharePoint and OneDrive
File Security in Microsoft SharePoint and OneDriveFile Security in Microsoft SharePoint and OneDrive
File Security in Microsoft SharePoint and OneDriveDavid J Rosenthal
 
Deploying & Managing OneDrive
Deploying & Managing OneDriveDeploying & Managing OneDrive
Deploying & Managing OneDriveDrew Madelung
 
Working securely with Microsoft Teams - Techorama 2021
Working securely with Microsoft Teams - Techorama 2021Working securely with Microsoft Teams - Techorama 2021
Working securely with Microsoft Teams - Techorama 2021Albert Hoitingh
 
Community IT innovators Webinar - Taking another look at SharePoint
Community IT innovators Webinar - Taking another look at SharePointCommunity IT innovators Webinar - Taking another look at SharePoint
Community IT innovators Webinar - Taking another look at SharePointCommunity IT Innovators
 

Similar to Seclore File Secure Sharepoint Walkthrough (20)

Irmintroductionforautocad 110415002444-phpapp02
Irmintroductionforautocad 110415002444-phpapp02Irmintroductionforautocad 110415002444-phpapp02
Irmintroductionforautocad 110415002444-phpapp02
 
Seclore FileSecure IBM Filenet Walkthrough
Seclore FileSecure IBM Filenet WalkthroughSeclore FileSecure IBM Filenet Walkthrough
Seclore FileSecure IBM Filenet Walkthrough
 
Intelligent Security, Compliance and Privacy in Office 365
Intelligent Security, Compliance and Privacy in Office 365Intelligent Security, Compliance and Privacy in Office 365
Intelligent Security, Compliance and Privacy in Office 365
 
Seclore FileSecure HotFolder Walkthrough
Seclore FileSecure HotFolder WalkthroughSeclore FileSecure HotFolder Walkthrough
Seclore FileSecure HotFolder Walkthrough
 
Document management and collaboration system
Document management and collaboration systemDocument management and collaboration system
Document management and collaboration system
 
What's new with Security & Compliance for SharePoint, OneDrive, and Teams
What's new with Security & Compliance for SharePoint, OneDrive, and TeamsWhat's new with Security & Compliance for SharePoint, OneDrive, and Teams
What's new with Security & Compliance for SharePoint, OneDrive, and Teams
 
ESDDC - Making Secured Content Discoverable in SharePoint
ESDDC - Making Secured Content Discoverable in SharePointESDDC - Making Secured Content Discoverable in SharePoint
ESDDC - Making Secured Content Discoverable in SharePoint
 
Infoaxon extended enterprise
Infoaxon extended enterpriseInfoaxon extended enterprise
Infoaxon extended enterprise
 
SIKM Boston - Making Secured Content Discoverable in SharePoint
SIKM Boston - Making Secured Content Discoverable in SharePointSIKM Boston - Making Secured Content Discoverable in SharePoint
SIKM Boston - Making Secured Content Discoverable in SharePoint
 
The Untethered Enterprise - Synchronizing Content Across Multiple Storage Pla...
The Untethered Enterprise - Synchronizing Content Across Multiple Storage Pla...The Untethered Enterprise - Synchronizing Content Across Multiple Storage Pla...
The Untethered Enterprise - Synchronizing Content Across Multiple Storage Pla...
 
Best practices for security and governance in share point 2013 published
Best practices for security and governance in share point 2013   publishedBest practices for security and governance in share point 2013   published
Best practices for security and governance in share point 2013 published
 
March 2023 CIAOPS Need to Know Webinar
March 2023 CIAOPS Need to Know WebinarMarch 2023 CIAOPS Need to Know Webinar
March 2023 CIAOPS Need to Know Webinar
 
Enterprise File Synchronization and Sharing - Biscom Verosync
Enterprise File Synchronization and Sharing - Biscom VerosyncEnterprise File Synchronization and Sharing - Biscom Verosync
Enterprise File Synchronization and Sharing - Biscom Verosync
 
Integrating and positioning IBM Connections in an existing information manage...
Integrating and positioning IBM Connections in an existing information manage...Integrating and positioning IBM Connections in an existing information manage...
Integrating and positioning IBM Connections in an existing information manage...
 
5 Reason – To Use Seclore for Microsoft Teams
5 Reason – To Use Seclore for Microsoft Teams5 Reason – To Use Seclore for Microsoft Teams
5 Reason – To Use Seclore for Microsoft Teams
 
File Security in Microsoft SharePoint and OneDrive
File Security in Microsoft SharePoint and OneDriveFile Security in Microsoft SharePoint and OneDrive
File Security in Microsoft SharePoint and OneDrive
 
Deploying & Managing OneDrive
Deploying & Managing OneDriveDeploying & Managing OneDrive
Deploying & Managing OneDrive
 
Working securely with Microsoft Teams - Techorama 2021
Working securely with Microsoft Teams - Techorama 2021Working securely with Microsoft Teams - Techorama 2021
Working securely with Microsoft Teams - Techorama 2021
 
Community IT innovators Webinar - Taking another look at SharePoint
Community IT innovators Webinar - Taking another look at SharePointCommunity IT innovators Webinar - Taking another look at SharePoint
Community IT innovators Webinar - Taking another look at SharePoint
 
CloudStorage_M.A.Acar
CloudStorage_M.A.AcarCloudStorage_M.A.Acar
CloudStorage_M.A.Acar
 

Recently uploaded

Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetEnjoy Anytime
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 

Recently uploaded (20)

E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 

Seclore File Secure Sharepoint Walkthrough

  • 1. Seclore Filesecure SharePOINT Connector Enhancing security of MS SharePOINT
  • 2. Contents • Constraints with MS SharePoint • The Solution .. • What is Seclore FileSecure • Seclore FileSecure connector for MS SharePoint • Policy definition • Assigning policies to Sharepoint folders • Uploading documents • Downloading a file from Sharepoint folder • Accessing a protected file • Audit trails • About Seclore
  • 3. Sharepoint and security A Process Flow of Product Plan User User Sharepoint Edited Copied Printed Un-protected File Viewed Distributed Sharepoint Sharepoint security is not persistent . Once the file is accessed by downloaded locally, it can be edited, copied & users distributed.
  • 4. Contents • Constraints with MS SharePoint • The Solution .. • What is Seclore FileSecure • Seclore FileSecure connector for MS SharePoint • Policy definition • Assigning policies to Sharepoint folders • Uploading documents • Downloading a file from Sharepoint folder • Accessing a protected file • Audit trails • About Seclore
  • 5. Seclore FileSecure Seclore FileSecure allow enterprises to define, implement & audit information usage “policies”. A “policy” defines : • WHO can use the information People & groups within and outside of the organization can be defined as rightful users of the information • WHAT can each person do Individual actions like reading, editing, printing, distributing, copy-pasting, screen grabbing etc. can be controlled • WHEN can he use it Information usage can be time based e.g. can only be used by Mr. A till 28th Sept OR only for the 2 days • WHERE can he use it from Information can be linked to locations e.g. only 3rd floor office by private/public IP addresses
  • 6. Seclore FileSecure • Policies are – Persistent: Implemented on information and all its copies wherever it is transmitted or stored – Dynamic: Policies can be changed after distributing information without having access to or redistributing the information • Policies can be attached to information on – Creation – Placement in a certain location e.g. shared folder – Attachment to email – Uploading to a document management / ECM system – …
  • 7. Contents • Constraints with MS SharePoint • The Solution .. • What is Seclore FileSecure • Seclore FileSecure connector for MS SharePoint • Policy definition • Assigning policies to Sharepoint folders • Uploading documents • Downloading a file from Sharepoint folder • Accessing a protected file • Audit trails • About Seclore
  • 8. Seclore FileSecure Enabled Sharepoint A Process Flow of Product SharePoint + Seclore Plan User User FileSecure Edited Copied Printed Protected File Viewed Distributed Sharepoint Files copied out of “Sharepoint Folder” are persistently accessed by protected. Rights to edit, copy, print and distribute are users restricted based on Seclore FileSecure policies
  • 9. Contents • Constraints with MS SharePoint • The Solution .. • What is Seclore FileSecure • Seclore FileSecure connector for MS SharePoint • Policy definition • Assigning policies to Sharepoint folders • Uploading documents • Downloading a file from Sharepoint folder • Accessing a protected file • Audit trails • About Seclore
  • 10. Policy definition–WHO, WHAT Policy People / groups, within / outside the enterprise can be Admin dis-allowed to edit, print, copy, forward etc. via a policy 10
  • 11. Policy definition–WHEN, WHERE A policy can expire information beyond a date / Policy timespan and also restrict its usage to certain Admin 11 computers / networks
  • 12. Contents • Constraints with MS SharePoint • The Solution .. • What is Seclore FileSecure • Seclore FileSecure connector for MS SharePoint • Policy definition • Assigning policies to Sharepoint folders • Uploading documents • Downloading a file from Sharepoint folder • Accessing a protected file • Audit trails • About Seclore
  • 13. Applying Policies… Sharepoint Policies can be applied to folders by the Sharepoint Admin admin. The admin chooses the folder … 13
  • 14. …Applying Policies Sharepoint Policies are applied… Admin 14
  • 15. Contents • Constraints with MS SharePoint • The Solution .. • What is Seclore FileSecure • Seclore FileSecure connector for MS SharePoint • Policy definition • Assigning policies to Sharepoint folders • Uploading documents • Downloading a file from Sharepoint folder • Accessing a protected file • Audit trails • About Seclore 15
  • 16. Upload document… Sharepoint Upload document Admin 16
  • 17. …Upload document Sharepoint Upload document Admin 17
  • 18. Document is uploaded Sharepoint Document is uploaded Admin 18
  • 19. Contents • Constraints with MS SharePoint • The Solution .. • What is Seclore FileSecure • Seclore FileSecure connector for MS SharePoint • Policy definition • Assigning policies to Sharepoint folders • Uploading documents • Downloading a file from Sharepoint folder • Accessing a protected file • Audit trails • About Seclore
  • 20. Download document from Sharepoint… Once the user’s downloads the document from Seclore User’s FileSecure policy protected Sharepoint folder the file Computer 20 gets instantly protected
  • 21. …Download document from Sharepoint Downloaded document from Sharepoint Notice the red lock User’s …the file is instantly protected Computer 21
  • 22. Contents • Constraints with MS SharePoint • The Solution .. • What is Seclore FileSecure • Seclore FileSecure connector for MS SharePoint • Policy definition • Assigning policies to Sharepoint folders • Uploading documents • Downloading a file from Sharepoint folder • Accessing a protected file • Audit trails • About Seclore
  • 23. Rights display User’s On clicking a rights display makes the recipient Computer explicitly aware of his rights to the document 23
  • 24. Unauthorized print User’s Unauthorized activities like attempts to print … Computer 24
  • 25. Unauthorized print User’s … are disallowed Computer 25
  • 26. Unauthorized copy User’s Attempts to copy parts / whole of the document … Computer 26
  • 27. Unauthorized copy User’s … are disallowed Computer 27
  • 28. Unauthorized screen grab Screen capture by the Prt Scr key, screen grabbing tools User’s like Camtasia and screen sharing tools like Webex is Computer 28 blocked
  • 29. Contents • Constraints with MS SharePoint • The Solution .. • What is Seclore FileSecure • Seclore FileSecure connector for MS SharePoint • Policy definition • Assigning policies to Sharepoint folders • Uploading documents • Downloading a file from Sharepoint folder • Accessing a protected file • Audit trails • About Seclore
  • 30. Information audit The audit captures the WHO, WHAT, WHEN and WHERE User’s of the access attempt. Authorized and unauthorized Computer 30 attempts are captured and reported
  • 31. Contents • The Problem with MS SharePoint • The Solution .. • What is Seclore FileSecure • What is Seclore FileSecure enabled – MS SharePoint • Policy definition • Assigning policies to Sharepoint folders • Uploading documents • Downloading a file from Sharepoint folder • Accessing a protected file • Audit trails • About Seclore
  • 32. Corporate Background … “Seclore is a high growth software product company. Seclore’s technology helps mitigate the risks arising out of information breaches whilst enhancing collaboration” 6 years old, Headquartered in Mumbai, India Promoted by IIT Bombay under the SINE program - www.sineiitb.org Geographical and customer presence in Middle East, ASEAN, SAARC & Europe Offerings focused on Information Rights Management and Secure Outsourcing Stake holders including IIT Bombay – www.iitb.ac.in ICICI Bank – www.icicibank.com Ventureast – www.ventureast.net Technology and service differentiators focusing on minimally intrusive technology, value based pricing and usage without training
  • 33. About … Value to customers Security without compromising on collaboration Customers across ….Diversified business groups ….Large financial services groups ….Engineering and manufacturing organizations ….Defence, Software, BPO, Consulting, Services, ….
  • 34. What customers say about us … “We chose Seclore FileSecure due to the flexibility provided by Seclore in terms of solution capabilities and customization. Implementation of Seclore FileSecure has reduced the exposure of critical data for potential misuse or frauds. The business benefits are tremendous.” - Murli Nambiar, Head of Information Security "Financial services companies like banks, insurance carriers & broking are ‘opening up’ their information systems and processes for participation by customers, partners and vendors. This of course brings in a lot of value chain integration and lowers costs but comes with information security needs which cannot be solved by present day systems. Seclore’s technology for securing documents as they flow within and outside enterprises as well as securing data shared with outsourcing partners is extremely relevant. - C N Ram. Group CIO, Essar group
  • 35. What industry experts say … Seclore’s approach is different in that they not mandatory rely on such plug-ins but mainly act “below” the application. The client component (which is required to access protected, e.g. encrypted, documents) tries to analyze the activities off the application like access to the file system. One impact of that approach is that a document might be opened with different applications supporting the specific document format. - Martin Kuppinger, One of the fore-most information security analysts “Information breaches normally result in intellectual property violation which is a serious problem affecting industry today. Seclore’s combination of preventive and corrective methods of handling information breaches is invaluable to any industry” - Haigreve Khaitan (Managing partner – Khaitan and Co) “Collaboration, security and privacy appear as mutually conflicting goals with most present day technologies. Seclore has resolved this conflict in a very elegant manner with its technology.” - Animesh Parihar (Global Delivery Head – SAP)
  • 36. Awards and recognition … Deloitte Technology Fast 50 is a ranking compiled every year based on percentage of growth of fiscal year revenue over three years. The companies must also fulfil other criterion of technology orientation. ‘Hidden Gems’ 2010 by Kuppinger Cole, Europe’s leading information security analyst firm is a report which lists vendors, which have a significantly differentiated offering and are market leaders in a particular segment.
  • 37. … Awards and recognition The TR35 award is for innovators whose inventions and research, Massachusetts Institute of Technology (MIT) finds exciting. Technology Review, owned and published by MIT, is the world’s oldest technology magazine. “Innovations – ideas in practice” is an annual event honoring researchers and innovators for creative and innovative work in the sphere of science and technology. The innovation needs to have a high degree of practical relevance to change everyday life.
  • 38. More Info? www.seclore.com +91-22-4015-5252