270 likes | 465 Views
http://www.seclore.com/ : The webcast looks at typical information security issues faced in outsourcing, their causes possible remedies. It also introduces Seclore InfoSource, a secure outsourcing technology for “end to end encryption” of information shared with outsourcing partners. Seclore InfoSource introduces an easy to integrate method in existing business processes and involving minimum changes in infrastructure.
E N D
Security concerns in outsourcing An Introduction to Seclore InfoSource Abhijit Tannu CTO www.seclore.com
The problem In 2010, the total size of the outsourcing market is expected to be about USD 154B ~USD 1.9B will be spent on proactive and reactive actions on information breaches An average breach costs an enterprise USD 6.75 M in direct costs
The risks - Human • Each person in the chain of outsourcing process handoffs represents a “risk” • * • High man power churn typical to the industry • = • Mother of all HR problems !! • This element of risk is indispensable, intelligent, adaptive and prone to greed !
The risks – Legal and compliance • Legal cover for malfunction for any of the risks is critical • Outsourcing process is typically under compliance norms of various country specific norms, compliance frameworks and cross border data flow agreements • Liability is largely spread across multiple entities and reputation risks are not covered • Insurance is at-best, high cost !
The risks - technology • Information through the lifecycle of creation – storage – transmission – use – archival & deletion represents one of the biggest risks • Multitude of information systems with hand offs have shown themselves to be prone to breaches • Controls are typically built into individual applications
Information exchange in outsourcing Firewall • Remote application access is provided • Vendor may be part of same network / domain • Vendor may be complete disconnected. Outsourcing partner ENTERPRISE Disconnected Network VPN Outsourcing partner VPN Network Remote Access Outsourcing partner
The underlying issues • Share it = It becomes his (also) • Usage and access control separation is not possible • Share it once = Share it forever • No possibility of information “recall” if relationships change • Out of the firewall = Free for all • Only legal contracts protect information outside the “perimeter”
Illustration BPO Bank Bank Employee BPO Employees doing data entry Kay Bank outsource it’s data entry work to a remotely located business partner IntServices Pvt Ltd
Illustration BPO Bank Bank Employee BPO Employees doing data entry Certain documents are scanned and image files are sent by a bank employee to the business partner via a secured FTP connection.
Illustration BPO Bank Bank Employee BPO Employees doing data entry Different employees process the scanned image files to enter data into excel or database files. These files are sent back to bank via secured FTP.
Illustration BPO Bank Telemarketer Bank Employee BPO Employees doing data entry Confidential data may be leaked by one of the employees to a telemarketer.
A new concept in secure collaboration Right Person Right Action Right Time Right Location Outsourcing partner Defined by the enterprise Users from bank as well as outsourcing partner can access protected information provided it is - • Right Person : Only pre-identified authorized persons / groups • Right Action : Action performed by the processing application – View / Edit / Print / Full Control • Right Time : Within the stipulated time • Right Location : Only pre-identified trusted machines / applications
Illustration - After BPO Bank Bank Employee BPO Employees doing data entry Kay Bank outsource it’s data entry work to a remotely located business partner IntServices
Illustration - After BPO Bank Bank Employee BPO Employees doing data entry Certain documents are scanned and image files are protected & sent by a bank employee to the business partner via a secured FTP connection.
Illustration - After BPO Bank Bank Employee BPO Employees doing data entry Different employees process the scanned image files to enter data into excel or database files. These files are sent back to bank via secured FTP.
Illustration - After BPO Bank Bank Employee Telemarketer BPO Employees doing data entry In case anyone attempts to make copies of the information and send it to an unauthorized user / location, the information becomes inaccessible
Illustration - After BPO Bank Bank Employee BPO Employees doing data entry After legitimate use, Kay bank can ensure that information shared with or generate by Intservices is destructed
Introducing Seclore InfoSource • A technology for defining and implementing usage policies on information before sharing • Granular usage policies can define … • Right person, • Right action, • Right time & • Right location of usage • Policies are persistent and travel with the information wherever it goes
Introducing Seclore InfoSource Processing Application Email, Web, FTP, Fileshare “Hot Folder” with pre-defined permissions for usage OUTSOURCING PARTNER ENTERPRISE
Introducing Seclore InfoSource Processing Application Processing Application Outsourcing Partner Enterprise Source Application Hot Folder Anywhere else
About … Seclore is a high growth information security product company focussed on providing Security without compromising collaboration Seclore’s flagship product Seclore FileSecure is used by More than 1 million users & some of the largest enterprises . . .
What customers say about us … "In today’s world, where the boundaries of the organisation’s functionality are disappearing, we are dependent on different business providers to process our customer information. Given that requirement, we still want to control how that information is used and processed by the service providers. Seclore’s technology has allowed us to do that." - Vishal Salvi, CISO Senior Vice President and CISO, HDFC Bank. 26
Want to know more … Website : www.seclore.com Blog : blog.seclore.com Email : info@seclore.com Phone : +91-22-4015-5252 27