280 likes | 483 Views
http://www.seclore.com/ : Seclore is an Enterprise Information Rights Management (IRM) company providing risk mitigation from information leakages whilst enhancing collaboration and data security.
E N D
Vishal Gupta CEO Seclore www.seclore.com What is IRMSecurity and Compliance for unstructured information
Information exchange in the collaborative world Firewalls Competitors TELEMARKETER Information is exchanged between Employees of the organisation Information is exchanged between employees & vendors & employees & customers VENDORS CUSTOMERS Enterprise VPN SSL UTM Firewall …
Information exchange in the collaborative world Firewalls Competitors TELEMARKETER What happens if an employee with privileged access leaves to join a competitor ? What happens if information shared with a vendor is lost by the vendor ? VENDORS CUSTOMERS Enterprise VPN SSL UTM Firewall …
Underlying Issues Share it = It becomes his (also) Ownership and usage cannot be separated Shared once = Shared forever Impossible to “recall” information Out of the enterprise = Free for all Technology & processes are only applicable within
The Result Information lands up in public websites !
Information lifecycle … Desktops Shared folders Desktops Removable media Backup Laptops Content Management Laptops Document retention Remote desktops Email Mobile devices Instant Messaging Archive Mobile devices Online workspaces Removable media Store Use Archive & Backup Create Transmit & collaborate Delete Security DLP Anti-virus UTM SSL Anti-… IDM DLP Vaults Digital shredders Hard disk encryption Application security Heterogeneous policies … Heterogeneous infrastructure
Options for securing unstructured information Option 1 : Control Distribution . . . Security Collaboration
Options for securing unstructured information Option 2 : Control Usage . . . Right Person Right Action Right Time Right Location Security Collaboration
Information Rights Management IRM allow enterprises to define, implement & track information usage “policies”. A “policy” defines : • WHO can use the information People & groups within and outside of the organization can be defined as rightful users of the information • WHAT can each person do Individual actions like reading, editing, printing, distributing, copy-pasting, screen grabbing etc. can be controlled • WHEN can he use it Information usage can be time based e.g. can only be used by Mr. A till 28th Sept OR only for the 2 days • WHERE can he use it from Information can be linked to locations e.g. only 3rd floor office by private/public IP addresses
Policy definition … Policy Admin Computer
… Policy definition Policy Admin Computer
Policy application by end users … Owners’s Computer
Information Classification Owners’s Computer
Protected document Owners’s Computer
Disclaimer on document access Receiver’s Computer
Unauthorized attempt to print Receiver’s Computer
Unauthorized attempt to print Receiver’s Computer
Unauthorized attempt to copy Receiver’s Computer
Unauthorized attempt to copy Receiver’s Computer
Unauthorized attempt to print screen “Screen Print” of a protected document Receiver’s Computer
Audit trail for compliance Audit trails capture authorized activities AND unauthorized attempts Owners’s Computer
Audit trail for compliance Owners’s Computer
About … Seclore is a high growth information security product company focussed on providing Security without compromising collaboration Seclore’s flagship product Seclore FileSecure is used by More than 1 million users & some of the largest enterprises . . .
Thank You Vishal Gupta info [at] seclore dot com +91-22-4015-5252 www.seclore.com
Scenario: Research reports & drawings Sanjiv organization Rahul