1 / 25

Seclore - What is IRM - Security & Compliance

http://www.seclore.com/ : Seclore is an Enterprise Information Rights Management (IRM) company providing risk mitigation from information leakages whilst enhancing collaboration and data security.

gilberteric
Download Presentation

Seclore - What is IRM - Security & Compliance

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Vishal Gupta CEO Seclore www.seclore.com What is IRMSecurity and Compliance for unstructured information

  2. Information exchange in the collaborative world Firewalls Competitors TELEMARKETER Information is exchanged between Employees of the organisation Information is exchanged between employees & vendors & employees & customers VENDORS CUSTOMERS Enterprise VPN SSL UTM Firewall …

  3. Information exchange in the collaborative world Firewalls Competitors TELEMARKETER What happens if an employee with privileged access leaves to join a competitor ? What happens if information shared with a vendor is lost by the vendor ? VENDORS CUSTOMERS Enterprise VPN SSL UTM Firewall …

  4. Underlying Issues Share it = It becomes his (also) Ownership and usage cannot be separated Shared once = Shared forever Impossible to “recall” information Out of the enterprise = Free for all Technology & processes are only applicable within

  5. The Result Information lands up in public websites !

  6. Information lifecycle … Desktops Shared folders Desktops Removable media Backup Laptops Content Management Laptops Document retention Remote desktops Email Mobile devices Instant Messaging Archive Mobile devices Online workspaces Removable media Store Use Archive & Backup Create Transmit & collaborate Delete Security DLP Anti-virus UTM SSL Anti-… IDM DLP Vaults Digital shredders Hard disk encryption Application security Heterogeneous policies … Heterogeneous infrastructure

  7. Options for securing unstructured information Option 1 : Control Distribution . . . Security Collaboration

  8. Options for securing unstructured information Option 2 : Control Usage . . . Right Person Right Action Right Time Right Location Security Collaboration

  9. Information Rights Management IRM allow enterprises to define, implement & track information usage “policies”. A “policy” defines : • WHO can use the information People & groups within and outside of the organization can be defined as rightful users of the information • WHAT can each person do Individual actions like reading, editing, printing, distributing, copy-pasting, screen grabbing etc. can be controlled • WHEN can he use it Information usage can be time based e.g. can only be used by Mr. A till 28th Sept OR only for the 2 days • WHERE can he use it from Information can be linked to locations e.g. only 3rd floor office by private/public IP addresses

  10. Policy definition … Policy Admin Computer

  11. … Policy definition Policy Admin Computer

  12. Policy application by end users … Owners’s Computer

  13. Information Classification Owners’s Computer

  14. Protected document Owners’s Computer

  15. Disclaimer on document access Receiver’s Computer

  16. Unauthorized attempt to print Receiver’s Computer

  17. Unauthorized attempt to print Receiver’s Computer

  18. Unauthorized attempt to copy Receiver’s Computer

  19. Unauthorized attempt to copy Receiver’s Computer

  20. Unauthorized attempt to print screen “Screen Print” of a protected document Receiver’s Computer

  21. Audit trail for compliance Audit trails capture authorized activities AND unauthorized attempts Owners’s Computer

  22. Audit trail for compliance Owners’s Computer

  23. About … Seclore is a high growth information security product company focussed on providing Security without compromising collaboration Seclore’s flagship product Seclore FileSecure is used by More than 1 million users & some of the largest enterprises . . .

  24. Thank You Vishal Gupta info [at] seclore dot com +91-22-4015-5252 www.seclore.com

  25. Scenario: Research reports & drawings Sanjiv organization Rahul

More Related