1 / 32

Securing Information Wherever it Goes

Discover the latest trends in securing sensitive information within organizations, emphasizing the importance of protecting data wherever it travels. Learn about real-world incidents and solutions offered by Seclore Company to safeguard intellectual property and maintain control over file access and usage policies.

stacys
Download Presentation

Securing Information Wherever it Goes

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Securing Information Wherever it Goes Trends in Enterprise Digital Rights Management

  2. The Headlines Say it All… Mining company.com The Bank of England inadvertently sent highly sensitive financial information the wrong email address. March, 2015 Liebherr Lawsuit Filed Against Employees Over Stolen Truck Design Documents. May 2015 China's J-20 and J-31 stealth fighters based on F-35 documents stolen from Lockheed Martin. January, 2015 Ex-Nike designers, destined for Adidas, stole 'treasure trove of Nike product designs.' December, 2014 Lawsuit contends that partner, Fisker, fraudulently agreed to take on Tesla’s design contract to gain access to confidential design information. January 2015 JP Morgan Chase acknowledged a massive data breach that affected 76 million households and 7 million small businesses. January, 2015 Seclore Company Confidential

  3. Unprotected IP is Flowing Outside of Your Organization How many of your files are being sent to third parties via email or other file-sharing services? Seclore Company Confidential

  4. What and Where is the Problem? FILE-SHARE CONTRACTOR SUPPLIER EMAIL COMPETITOR PRODUCT MGR PROSPECT GOOGLE DRIVE BLACK MARKET ENGINEER PROTECTED UNPROTECTED & UNTRACKABLE Seclore Company Confidential

  5. Traditional Security: Protect the Perimeter & Devices Email SSL Anti-virus Devices Networks UTM Disk Encryption Anti-spyware People Applications Application Firewall DLP PIM Seclore Company Confidential

  6. Make Information the New Perimeter Email Policies Control Awareness Audit Compliance Seclore Company Confidential

  7. Seclore Protects Your Files Wherever They Go No matter how your files are shared, you have complete control of who accesses them and what rights they have. Seclore Company Confidential

  8. Where Is Your Company Still at Risk? Price Lists Sent to Distributors Bids Sent to Prospects Financial Reports Sent to Business Units M & A and Board Documents Shared with Advisors Employee Data Shared Across Business Units Roadmaps Shared With Prospects Content Shared from Knowledgebase IP/Technical Specifications Shared with Suppliers and Contractors QA Reports Shared with Suppliers Seclore Company Confidential

  9. Business Case - 1 Do you have confidential information which only a specific employee group, while in employment, should use? • Research data • Business plans • Forward-looking financial statements • Product documents • Internal quality reports

  10. Business Case - 2 Do you frequently establish temporary/project-based relationships with partners and contractors? Do you share confidential information with outsource vendors? • Sub-Contracting • Manufacturing components • Mergers & Acquisitions (M & A) • Business Process Outsourcing • Check-book printing, Statement printing, Credit card embossing - Bank • Policy printing, Customer communication – Insurance • Recharge voucher printing – Telecom • Payroll processing

  11. Business Case - 3 Do you receive confidential information (and the associated liability) from customers ? • Personally Identifiable Information (PII) • Citizen information • Large project financing for banks • Vendor registration process for large corporations

  12. Business Case - 4 Do you generate revenue by providing reports & other information? • Subscribed reports • Paid research • Financial analysis • Industry specific research • Training/course materials

  13. What’s the Impact? Intellectual Property Gets Into Competitors’ Hands Competitive Advantage Decreases Revenue Decreases: 5%?...10%?...20%? Market Share Decreases: 5%?...8%?...10%? Market Value Decreases: 2%?...5%?...10%? Can your company afford NOT to protect its IP? Seclore Company Confidential

  14. What’s the Impact? Employee Files Lost Legal Fees: $500K?...$1M?...$5M? Productivity Loss: 2%?...5%?...10%? Customer Loss: 1%?...2%? Market Value Loss: 2%?...4%? Can your company afford NOT to protect employee files? Seclore Company Confidential

  15. What’s the Impact? Price List Sent to Wrong Distributor Forced to Match Discount Revenue Decreases: 0.25%?...0.5%?...1%? Market Value Decreases: 0.5%?...0.8%? Can your company afford price lists going to the wrong vendor? Seclore Company Confidential

  16. Today’s Imperatives… Data needs to travel Need for External Collaboration Corporate boundaries are diminishing Your Confidential Information Often Travels Outside Your Network DOES YOUR SECURITY? Seclore Company Confidential

  17. Utilize Any File-Sharing Method Without Risk Protection endures with the file regardless of how it is shared or how it is accessed. Seclore Company Confidential

  18. Flexible, Granular Usage Policies WHO can access the file? • Permanence:Protection persists with the file forever • Remote Control: File rights can be changed from anywhere in the world • Audit Trail: All activities are tracked Specific Users/groups within and outside the organization WHAT rights do they have? View, edit, print, copy content, take screen grabs, work offline WHEN can they do it? Automatic file expiry, date and time ranges, number of days from first access WHERE can they do it? Specific computers, devices, IP addresses Seclore Company Confidential

  19. Make Sure Your EDRM has Advanced Technology Seclore Company Confidential

  20. The ‘Anyness’ Factor • Works Seamlessly in any Environment • Supports any Device • Supports any OS • Supports any File Format Natively • Not Dependent on any Underlying System • Removes Friction to Facilitate Adoption Seclore Company Confidential

  21. Multiple Ways to Associate Rights with Files • Multiple methods for attaching rights to files • One-click to add protection as files are created, emailed or shared • Automated when files are shared or downloaded from exiting systems, or placed in a specific folder Seclore Company Confidential

  22. One-Click Email Protection Seclore Company Confidential

  23. Easily On-Board New Users Seclore Company Confidential

  24. Recipients Can Easily Utilize Protected Files • Seamless User Authentication • For internal users - integrate with AD and other IAM / SSO tools • For external users - utilize Okta, Ping, other ID methods or Seclore’s built-in identity service • Use Protected File in Native Application • File opens in native application – rights continue to control file usage (e.g. MS-Office, Acrobat Reader, AutoCAD, OpenOffice) • File extension is maintained Browser-Based Access No software download needed to access protected files Seclore Company Confidential

  25. Other Advanced Features • Automated Licensing: • Dynamically assigns a license to any user needing to protect a file • Eliminates manual licensing admin process • Dynamic Request Access: • Occurs when a protected file is sent to a group and a user is not yet on-boarded • New user can easily request access • Owner registers user w/one click • One-Click Permission Modification: • Rapidly change permissions on previously protected files by clicking on the file Seclore Company Confidential

  26. Make Sure Your EDRM is Secure Seclore Company Confidential

  27. Reliable Security • Pluggable Encryption • We don’t own the keys • Keys do not travel with files • Companies can use their own algorithm • Single-Stack Security • No hand offs between EDRM platform and third-party products (e.g. MS RM to FoxIT) • Eliminates Security Loop-Holes • Controls screen capture • Cannot cut/paste into unsecured file • Policies remain even when file is saved in different format Seclore Company Confidential

  28. Make Sure Your EDRM is Automated Seclore Company Confidential

  29. Automate Protection with Pre-Built Connectors • Automatically attach policies to files as they are downloaded, shared, or viewed • Pre-built connectors for DLP, ERP, ECM, EFSS and more • Policy Federation: Leverage access policies already defined within existing systems Seclore Company Confidential

  30. Sample Customers – Over 450 World-Wide

  31. Seclore – What’s Unique Seclore protects 60% more documents annually versus other EDRM solutions Seclore Company Confidential

  32. Thank You! www.seclore.com | info@seclore.com | http://blog.seclore.com Seclore Company Confidential

More Related