370 likes | 778 Views
http://www.seclore.com/autocad.html : AutoCAD users can now benefit from the leading Information Rights Management (IRM) solution for native protection of AutoCAD files. Seclore FileSecure will help engineering companies protect designs and drawings shared with business partners without worrying about data misuse or theft.
E N D
Seclore filesecure autocad
Contents • Constraints of AutoCad security • The Solution .. • What is Seclore FileSecure • Seclore FileSecure connector for AutoCad • Assigning policies to AutoCad document • Accessing a protected AutoCad document • Audit trails • Business Scenarios • About Seclore
AutoCad and Security RECEIVER SENDER Edited Copied Printed Viewed Distributed Un-protected File AutoCad files Once the AutoCad File is sent it can be Edited, Copied, Printed, Distributed etc….
Contents • Constraints of AutoCad security • The Solution .. • What is Seclore FileSecure • Seclore FileSecure connector for AutoCad • Assigning policies to AutoCad document • Accessing a protected AutoCad document • Audit trails • Business Scenarios • About Seclore
Seclore FileSecure Seclore FileSecure allow enterprises to define, implement & audit information usage “policies”. A “policy” defines : • WHO can use the information People & groups within and outside of the organization can be defined as rightful users of the information • WHATcan each person do Individual actions like reading, editing, printing, distributing, copy-pasting, screen grabbing etc. can be controlled • WHEN can he use it Information usage can be time based e.g. can only be used by Mr. A till 28th Sept OR only for the 2 days • WHERE can he use it from Information can be linked to locations e.g. only 3rd floor office by private/public IP addresses
SecloreFileSecure • Policies are • Persistent: Implemented on information and all its copies wherever it is transmitted or stored • Dynamic: Policies can be changed after distributing information without having access to or redistributing the information • Policies can be attached to information on • Creation • Placement in a certain location e.g. shared folder • Attachment to email • Uploading to a document management / ECM system • …
Contents • Constraints of AutoCad security • The Solution .. • What is Seclore FileSecure • Seclore FileSecure connector for AutoCad • Assigning policies to AutoCad document • Accessing a protected AutoCad document • Audit trails • Business Scenarios • About Seclore
Opening AutoCad document with Seclore FileSecure RECEIVER SENDER Edited Copied Printed Protected AutoCad Document Viewed Distributed AutoCad files When the Seclore FileSecure protected AutoCad document is sent, the receiver has only restricted usage rights (e.g. view only, edit + print only, etc)
Contents • Constraints of AutoCad security • The Solution .. • What is Seclore FileSecure • Seclore FileSecure connector for AutoCad • Assigning policies to AutoCad document • Accessing a protected AutoCad document • Audit trails • Business Scenarios • About Seclore
Sender’s Computer Protection – defining usage policy on document
Internal Users External Users Sender’s Computer Policy is defined as- a. WHO - people / groups within or outside of the enterprise
Sender’s Computer Policy is defined as b. WHAT - (VIEW, EDIT, PRINT, FORWARD,… )
Sender’s Computer Policy is defined as- c. WHEN - date range, time span, …
Sender’s Computer Policy is defined as- d. WHERE - Specific computers, specific networks, only from the office, …
Contents • Constraints of AutoCad security • The Solution .. • What is Seclore FileSecure • Seclore FileSecure connector for AutoCad • Assigning policies to AutoCad document • Accessing a protected AutoCad document • Audit trails • Business Scenarios • About Seclore
Sender’s Computer After the policy is defined, the document gets protected. Notice the “red” lock
Receiver’s Computer When the user opens the file, he gets to see the rights that he has on the document
Receiver’s Computer If he tries to print….
Receiver’s Computer He will be restricted from printing !!
Receiver’s Computer If he tries to copy….
Receiver’s Computer He will be restricted from copying data!!
Receiver’s Computer Even print-screen is blocked !!
Contents • Constraints of AutoCad security • The Solution .. • What is Seclore FileSecure • Seclore FileSecure connector for AutoCad • Assigning policies to AutoCad document • Accessing a protected AutoCad document • Audit trails • Business Scenarios • About Seclore
Receiver’s Computer The system also maintains a complete audit trail of all the user actions, time & even location !!
Contents • Constraints of AutoCad security • The Solution .. • What is Seclore FileSecure • Seclore FileSecure connector for AutoCad • Assigning policies to AutoCad document • Accessing a protected AutoCad document • Audit trails • Business Scenarios • About Seclore
Business Case - 1 Do you have confidential CAD drawings which only a specific employee group, while in employment, should use? Seclore FileSecure protects information from leakage due to malicious intent, errors and omissions, as well as lack of awareness, by providing a persistent, information-locked method of protection. This means that confidential/IP information remains confidential post distribution. CAD drawings, formulation sheets, process documents and MIS reports are just some examples of information which are best used only within the walls of the enterprise Malicious intent, errors and omissions and lack of awareness could make this information publicly available leading to potential losses.
Business Case - 2 Do you frequently establish temporary / project-based relationships with manufactures & contractors? Seclore FileSecure enables you to “retract” project files shared with business partners after a specified period, thus protecting intellectual property and driving revenues. This means that collaboration with partners can now become open and free. Temporary relationships with manufacturers & contractors for a specific project typically leads to extensive information sharing during the execution. After the project ends, the drawings & intellectual property shared continues to be retained and used by the partner, sometimes against the enterprise, leading to financial losses.
Business Case - 3 Do you send sensitive CAD designs to manufacturers to execute a business process? Seclore FileSecure enables you to control the usage of information sent to vendors and prevent unauthorized viewing, printing, editing and distributing of the information. Information can also be remotely made unusable in case the relationship ends. Typically confidential information sent to manufacturers is governed by non disclosure agreements without a mechanism to enforce or track the agreement. Therefore you are dependent on the vendors' systems and processes for the confidentiality of your critical information. Loss of information from the vendor could lead to reputation and legal risks for your enterprise.
Contents • Constraints of AutoCad security • The Solution .. • What is Seclore FileSecure • Seclore FileSecure connector for AutoCad • Assigning policies to AutoCad document • Accessing a protected AutoCad document • Audit trails • Business Scenarios • About Seclore
Corporate Background … “Seclore is a high growth software product company. Seclore’s technology helps mitigate the risks arising out of information breaches whilst enhancing collaboration” 6 years old, Headquartered in Mumbai, India Promoted by IIT Bombay under the SINE program - www.sineiitb.org Geographical and customer presence in Middle East, ASEAN, SAARC & Europe Offerings focused on Information Rights Management and Secure Outsourcing Stake holders including IIT Bombay – www.iitb.ac.in ICICI Bank – www.icicibank.com Ventureast – www.ventureast.net Technology and service differentiators focusing on minimally intrusive technology, value based pricing and usage without training
….Large financial services groups Seclore user profile… ….Diversified business groups ….Engineering and manufacturing organizations …Government and service providers
What customers say about us … “We chose Seclore FileSecure due to the flexibility provided by Seclore in terms of solution capabilities and customization. Implementation of Seclore FileSecure has reduced the exposure of critical data for potential misuse or frauds. The business benefits are tremendous.” - MurliNambiar, Head of Information Security "Financial services companies like banks, insurance carriers & broking are ‘opening up’ their information systems and processes for participation by customers, partners and vendors. This of course brings in a lot of value chain integration and lowers costs but comes with information security needs which cannot be solved by present day systems. Seclore’s technology for securing documents as they flow within and outside enterprises as well as securing data shared with outsourcing partners is extremely relevant. - C N Ram. Group CIO, Essar group
What industry experts say … Seclore’s approach is different in that they not mandatory rely on such plug-ins but mainly act “below” the application. The client component (which is required to access protected, e.g. encrypted, documents) tries to analyze the activities off the application like access to the file system. One impact of that approach is that a document might be opened with different applications supporting the specific document format. - Martin Kuppinger, One of the fore-most information security analysts “Information breaches normally result in intellectual property violation which is a serious problem affecting industry today. Seclore’s combination of preventive and corrective methods of handling information breaches is invaluable to any industry” - HaigreveKhaitan (Managing partner – Khaitan and Co) “Collaboration, security and privacy appear as mutually conflicting goals with most present day technologies. Seclore has resolved this conflict in a very elegant manner with its technology.” - AnimeshParihar (Global Delivery Head – SAP)
Awards and recognition … Cool Vendors are “interesting, new and innovative vendors” which “organizations cannot afford to ignore”. Cool Vendors are those vendors that have caught Gartner's interest because they offer innovative and intriguing technologies or solutions. Deloitte Technology Fast 50 is a ranking compiled every year based on percentage of growth of fiscal year revenue over three years. The companies must also fulfil other criterion of technology orientation.
… Awards and recognition ‘Hidden Gems’ 2010 by Kuppinger Cole, Europe’s leading information security analyst firm is a report which lists vendors, which have a significantly differentiated offering and are market leaders in a particular segment. The TR35 award is for innovators whose inventions and research, Massachusetts Institute of Technology (MIT) finds exciting. Technology Review, owned and published by MIT, is the world’s oldest technology magazine.
… Awards and recognition “Innovations – ideas in practice” is an annual event honoring researchers and innovators for creative and innovative work in the sphere of science and technology. The innovation needs to have a high degree of practical relevance to change everyday life.
More Info? www.seclore.com +91-22-6130-4200