SlideShare a Scribd company logo
1 of 14
Secure  Objects Ashutosh Jaiswal [email_address]
Agenda ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Objective ,[object Object]
Introduction ,[object Object]
Why needed ,[object Object],[object Object],[object Object],[object Object]
Types of Secure Objects ,[object Object],[object Object],[object Object],[object Object]
Cocoon Data ,[object Object],[object Object],[object Object]
Cocoon Data ,[object Object]
Cocoon Data ,[object Object],[object Object],[object Object]
Cocoon Data ,[object Object],Sender Receivers Client  Software Client  Software Central  Enterprise  Server  encrypt decrypt
Cocoon Data ,[object Object],[object Object],[object Object],[object Object],[object Object]
Key Benefits ,[object Object],[object Object],[object Object],[object Object],[object Object]
Future ,[object Object],[object Object]
Questions?

More Related Content

What's hot

One click protection in microsoft office
One click protection in microsoft officeOne click protection in microsoft office
One click protection in microsoft officeSeclore
 
Email encryption plus | Seclore
Email encryption plus | SecloreEmail encryption plus | Seclore
Email encryption plus | SecloreSeclore
 
Cloud computing tp ny
Cloud computing tp nyCloud computing tp ny
Cloud computing tp nyprekubatortto
 
Msgovern (tour)wiki.ppt
Msgovern (tour)wiki.pptMsgovern (tour)wiki.ppt
Msgovern (tour)wiki.pptMS Govern
 
In data security
In data securityIn data security
In data securityadithdev
 
Redrawing the Cyber Defense Frontier
Redrawing the Cyber Defense FrontierRedrawing the Cyber Defense Frontier
Redrawing the Cyber Defense FrontierJoe Hage
 
Data Classification Protection | Seclore
Data Classification Protection | SecloreData Classification Protection | Seclore
Data Classification Protection | SecloreSeclore
 
Email Security Solutions | Seclore
Email Security Solutions | SecloreEmail Security Solutions | Seclore
Email Security Solutions | SecloreSeclore
 
Sensitive Data Exposure
Sensitive Data ExposureSensitive Data Exposure
Sensitive Data Exposureabodiford
 
Inbound Data Protection
Inbound Data ProtectionInbound Data Protection
Inbound Data ProtectionSeclore
 
Securing MS SharePoint with IRM
Securing MS SharePoint with IRMSecuring MS SharePoint with IRM
Securing MS SharePoint with IRMSeclore
 
International Journal on Cryptography and Information Security ( IJCIS)
International Journal on Cryptography and Information Security ( IJCIS)International Journal on Cryptography and Information Security ( IJCIS)
International Journal on Cryptography and Information Security ( IJCIS)ijcisjournal
 

What's hot (15)

One click protection in microsoft office
One click protection in microsoft officeOne click protection in microsoft office
One click protection in microsoft office
 
Enterprise File Management Systems
Enterprise File Management SystemsEnterprise File Management Systems
Enterprise File Management Systems
 
PG & Associates
PG & AssociatesPG & Associates
PG & Associates
 
Email encryption plus | Seclore
Email encryption plus | SecloreEmail encryption plus | Seclore
Email encryption plus | Seclore
 
Electronic Security
Electronic SecurityElectronic Security
Electronic Security
 
Cloud computing tp ny
Cloud computing tp nyCloud computing tp ny
Cloud computing tp ny
 
Msgovern (tour)wiki.ppt
Msgovern (tour)wiki.pptMsgovern (tour)wiki.ppt
Msgovern (tour)wiki.ppt
 
In data security
In data securityIn data security
In data security
 
Redrawing the Cyber Defense Frontier
Redrawing the Cyber Defense FrontierRedrawing the Cyber Defense Frontier
Redrawing the Cyber Defense Frontier
 
Data Classification Protection | Seclore
Data Classification Protection | SecloreData Classification Protection | Seclore
Data Classification Protection | Seclore
 
Email Security Solutions | Seclore
Email Security Solutions | SecloreEmail Security Solutions | Seclore
Email Security Solutions | Seclore
 
Sensitive Data Exposure
Sensitive Data ExposureSensitive Data Exposure
Sensitive Data Exposure
 
Inbound Data Protection
Inbound Data ProtectionInbound Data Protection
Inbound Data Protection
 
Securing MS SharePoint with IRM
Securing MS SharePoint with IRMSecuring MS SharePoint with IRM
Securing MS SharePoint with IRM
 
International Journal on Cryptography and Information Security ( IJCIS)
International Journal on Cryptography and Information Security ( IJCIS)International Journal on Cryptography and Information Security ( IJCIS)
International Journal on Cryptography and Information Security ( IJCIS)
 

Viewers also liked

Miss Jessica Buffalo
Miss Jessica BuffaloMiss Jessica Buffalo
Miss Jessica BuffaloVilamas Ranch
 
Miss Barbara Buffalo
Miss Barbara BuffaloMiss Barbara Buffalo
Miss Barbara BuffaloVilamas Ranch
 
It's Worth More - Campaign Intro for Charities
It's Worth More - Campaign Intro for CharitiesIt's Worth More - Campaign Intro for Charities
It's Worth More - Campaign Intro for CharitiesSharene Lee
 
Melltoo Social Classifieds - The Story
Melltoo Social Classifieds - The StoryMelltoo Social Classifieds - The Story
Melltoo Social Classifieds - The StorySharene Lee
 
Optimizing My Content workshop
Optimizing My Content workshopOptimizing My Content workshop
Optimizing My Content workshopSharene Lee
 
Get In The Ring: Melltoo Pitch
Get In The Ring: Melltoo PitchGet In The Ring: Melltoo Pitch
Get In The Ring: Melltoo PitchSharene Lee
 
How a charity campaign can rock your business - Melltoo Marketplace
How a charity campaign can rock your business - Melltoo MarketplaceHow a charity campaign can rock your business - Melltoo Marketplace
How a charity campaign can rock your business - Melltoo MarketplaceSharene Lee
 
organizational study @ madras cements ltd 2011
organizational study @ madras cements ltd 2011organizational study @ madras cements ltd 2011
organizational study @ madras cements ltd 2011Bibin K Babu
 
Ma new employee counselling
Ma new employee counsellingMa new employee counselling
Ma new employee counsellingBibin K Babu
 

Viewers also liked (13)

Web 2 0 & Beyond
Web 2 0 & BeyondWeb 2 0 & Beyond
Web 2 0 & Beyond
 
Quiz @2011
Quiz  @2011Quiz  @2011
Quiz @2011
 
Miss Jessica Buffalo
Miss Jessica BuffaloMiss Jessica Buffalo
Miss Jessica Buffalo
 
Miss Barbara Buffalo
Miss Barbara BuffaloMiss Barbara Buffalo
Miss Barbara Buffalo
 
It's Worth More - Campaign Intro for Charities
It's Worth More - Campaign Intro for CharitiesIt's Worth More - Campaign Intro for Charities
It's Worth More - Campaign Intro for Charities
 
Miss Bella Buffalo
Miss Bella BuffaloMiss Bella Buffalo
Miss Bella Buffalo
 
Melltoo Social Classifieds - The Story
Melltoo Social Classifieds - The StoryMelltoo Social Classifieds - The Story
Melltoo Social Classifieds - The Story
 
Optimizing My Content workshop
Optimizing My Content workshopOptimizing My Content workshop
Optimizing My Content workshop
 
Water Buffaloes
Water BuffaloesWater Buffaloes
Water Buffaloes
 
Get In The Ring: Melltoo Pitch
Get In The Ring: Melltoo PitchGet In The Ring: Melltoo Pitch
Get In The Ring: Melltoo Pitch
 
How a charity campaign can rock your business - Melltoo Marketplace
How a charity campaign can rock your business - Melltoo MarketplaceHow a charity campaign can rock your business - Melltoo Marketplace
How a charity campaign can rock your business - Melltoo Marketplace
 
organizational study @ madras cements ltd 2011
organizational study @ madras cements ltd 2011organizational study @ madras cements ltd 2011
organizational study @ madras cements ltd 2011
 
Ma new employee counselling
Ma new employee counsellingMa new employee counselling
Ma new employee counselling
 

Similar to Secure Objects

Cryptolab cse datasheet v1.1.pdf
Cryptolab cse datasheet v1.1.pdfCryptolab cse datasheet v1.1.pdf
Cryptolab cse datasheet v1.1.pdfMassimo Bertaccini
 
IRM Secure on SecuLogica Technical Whitepaper
IRM Secure on SecuLogica Technical WhitepaperIRM Secure on SecuLogica Technical Whitepaper
IRM Secure on SecuLogica Technical WhitepaperJim Kitchen
 
Secure Enterprise File Sharing and Mobile Content Management
Secure Enterprise File Sharing and Mobile Content ManagementSecure Enterprise File Sharing and Mobile Content Management
Secure Enterprise File Sharing and Mobile Content ManagementBlackBerry
 
SendSecure-Factsheet-EN
SendSecure-Factsheet-ENSendSecure-Factsheet-EN
SendSecure-Factsheet-ENGary Baker
 
FinalCode-At-A-Glance-Webcopy-Optimized
FinalCode-At-A-Glance-Webcopy-OptimizedFinalCode-At-A-Glance-Webcopy-Optimized
FinalCode-At-A-Glance-Webcopy-OptimizedPhillip Stalnaker
 
SMB Security Product Overview.pptx
SMB Security Product Overview.pptxSMB Security Product Overview.pptx
SMB Security Product Overview.pptxkovec2684
 
A Survey on Assured deletion and Access Control
A Survey on Assured deletion and Access ControlA Survey on Assured deletion and Access Control
A Survey on Assured deletion and Access ControlAM Publications
 
BlackBerry Workspaces: Solutions for Government
BlackBerry Workspaces: Solutions for GovernmentBlackBerry Workspaces: Solutions for Government
BlackBerry Workspaces: Solutions for GovernmentBlackBerry
 
Document Management System - docManager
Document Management System - docManagerDocument Management System - docManager
Document Management System - docManagerRajesh Shah
 
PRESERVATION Web archiving
PRESERVATION  Web archivingPRESERVATION  Web archiving
PRESERVATION Web archivingEssam Obaid
 
Secure File SharingSecure File Sharing Using Access Contro.docx
Secure File SharingSecure File Sharing Using Access Contro.docxSecure File SharingSecure File Sharing Using Access Contro.docx
Secure File SharingSecure File Sharing Using Access Contro.docxjeffreye3
 
Securing Source Code on Endpoints
Securing Source Code on EndpointsSecuring Source Code on Endpoints
Securing Source Code on Endpointsthomashelsley
 
BlackBerry Workspaces Mobile Applications
BlackBerry Workspaces Mobile ApplicationsBlackBerry Workspaces Mobile Applications
BlackBerry Workspaces Mobile ApplicationsBlackBerry
 
Secure File Sharing Basics - What Every File Sharing Provider Should Have
Secure File Sharing Basics -  What Every File Sharing Provider Should HaveSecure File Sharing Basics -  What Every File Sharing Provider Should Have
Secure File Sharing Basics - What Every File Sharing Provider Should HaveBoxHQ
 
Primend praktiline konverents - Office 365 turvalisus
Primend praktiline konverents - Office 365 turvalisusPrimend praktiline konverents - Office 365 turvalisus
Primend praktiline konverents - Office 365 turvalisusPrimend
 

Similar to Secure Objects (20)

Cryptolab cse datasheet v1.1.pdf
Cryptolab cse datasheet v1.1.pdfCryptolab cse datasheet v1.1.pdf
Cryptolab cse datasheet v1.1.pdf
 
IRM Secure on SecuLogica Technical Whitepaper
IRM Secure on SecuLogica Technical WhitepaperIRM Secure on SecuLogica Technical Whitepaper
IRM Secure on SecuLogica Technical Whitepaper
 
Secure Enterprise File Sharing and Mobile Content Management
Secure Enterprise File Sharing and Mobile Content ManagementSecure Enterprise File Sharing and Mobile Content Management
Secure Enterprise File Sharing and Mobile Content Management
 
SendSecure-Factsheet-EN
SendSecure-Factsheet-ENSendSecure-Factsheet-EN
SendSecure-Factsheet-EN
 
FinalCode-At-A-Glance-Webcopy-Optimized
FinalCode-At-A-Glance-Webcopy-OptimizedFinalCode-At-A-Glance-Webcopy-Optimized
FinalCode-At-A-Glance-Webcopy-Optimized
 
SMB Security Product Overview.pptx
SMB Security Product Overview.pptxSMB Security Product Overview.pptx
SMB Security Product Overview.pptx
 
A Survey on Assured deletion and Access Control
A Survey on Assured deletion and Access ControlA Survey on Assured deletion and Access Control
A Survey on Assured deletion and Access Control
 
BlackBerry Workspaces: Solutions for Government
BlackBerry Workspaces: Solutions for GovernmentBlackBerry Workspaces: Solutions for Government
BlackBerry Workspaces: Solutions for Government
 
Document Management System - docManager
Document Management System - docManagerDocument Management System - docManager
Document Management System - docManager
 
DLP and MDM Datasheet
DLP and MDM DatasheetDLP and MDM Datasheet
DLP and MDM Datasheet
 
VISULOX-Summary-SN
VISULOX-Summary-SNVISULOX-Summary-SN
VISULOX-Summary-SN
 
IT security solutions
IT security solutionsIT security solutions
IT security solutions
 
PRESERVATION Web archiving
PRESERVATION  Web archivingPRESERVATION  Web archiving
PRESERVATION Web archiving
 
Secure File SharingSecure File Sharing Using Access Contro.docx
Secure File SharingSecure File Sharing Using Access Contro.docxSecure File SharingSecure File Sharing Using Access Contro.docx
Secure File SharingSecure File Sharing Using Access Contro.docx
 
Securing Source Code on Endpoints
Securing Source Code on EndpointsSecuring Source Code on Endpoints
Securing Source Code on Endpoints
 
BlackBerry Workspaces Mobile Applications
BlackBerry Workspaces Mobile ApplicationsBlackBerry Workspaces Mobile Applications
BlackBerry Workspaces Mobile Applications
 
Cloud docu ppt
Cloud docu pptCloud docu ppt
Cloud docu ppt
 
Secure File Sharing Basics - What Every File Sharing Provider Should Have
Secure File Sharing Basics -  What Every File Sharing Provider Should HaveSecure File Sharing Basics -  What Every File Sharing Provider Should Have
Secure File Sharing Basics - What Every File Sharing Provider Should Have
 
Vaultize corp three-pager v14
Vaultize corp three-pager v14Vaultize corp three-pager v14
Vaultize corp three-pager v14
 
Primend praktiline konverents - Office 365 turvalisus
Primend praktiline konverents - Office 365 turvalisusPrimend praktiline konverents - Office 365 turvalisus
Primend praktiline konverents - Office 365 turvalisus
 

Secure Objects