330 likes | 351 Views
Discover the latest trends in securing sensitive information within organizations, emphasizing the importance of protecting data wherever it travels. Learn about real-world incidents and solutions offered by Seclore Company to safeguard intellectual property and maintain control over file access and usage policies.
E N D
Securing Information Wherever it Goes Trends in Enterprise Digital Rights Management
The Headlines Say it All… Mining company.com The Bank of England inadvertently sent highly sensitive financial information the wrong email address. March, 2015 Liebherr Lawsuit Filed Against Employees Over Stolen Truck Design Documents. May 2015 China's J-20 and J-31 stealth fighters based on F-35 documents stolen from Lockheed Martin. January, 2015 Ex-Nike designers, destined for Adidas, stole 'treasure trove of Nike product designs.' December, 2014 Lawsuit contends that partner, Fisker, fraudulently agreed to take on Tesla’s design contract to gain access to confidential design information. January 2015 JP Morgan Chase acknowledged a massive data breach that affected 76 million households and 7 million small businesses. January, 2015 Seclore Company Confidential
Unprotected IP is Flowing Outside of Your Organization How many of your files are being sent to third parties via email or other file-sharing services? Seclore Company Confidential
What and Where is the Problem? FILE-SHARE CONTRACTOR SUPPLIER EMAIL COMPETITOR PRODUCT MGR PROSPECT GOOGLE DRIVE BLACK MARKET ENGINEER PROTECTED UNPROTECTED & UNTRACKABLE Seclore Company Confidential
Traditional Security: Protect the Perimeter & Devices Email SSL Anti-virus Devices Networks UTM Disk Encryption Anti-spyware People Applications Application Firewall DLP PIM Seclore Company Confidential
Make Information the New Perimeter Email Policies Control Awareness Audit Compliance Seclore Company Confidential
Seclore Protects Your Files Wherever They Go No matter how your files are shared, you have complete control of who accesses them and what rights they have. Seclore Company Confidential
Where Is Your Company Still at Risk? Price Lists Sent to Distributors Bids Sent to Prospects Financial Reports Sent to Business Units M & A and Board Documents Shared with Advisors Employee Data Shared Across Business Units Roadmaps Shared With Prospects Content Shared from Knowledgebase IP/Technical Specifications Shared with Suppliers and Contractors QA Reports Shared with Suppliers Seclore Company Confidential
Business Case - 1 Do you have confidential information which only a specific employee group, while in employment, should use? • Research data • Business plans • Forward-looking financial statements • Product documents • Internal quality reports
Business Case - 2 Do you frequently establish temporary/project-based relationships with partners and contractors? Do you share confidential information with outsource vendors? • Sub-Contracting • Manufacturing components • Mergers & Acquisitions (M & A) • Business Process Outsourcing • Check-book printing, Statement printing, Credit card embossing - Bank • Policy printing, Customer communication – Insurance • Recharge voucher printing – Telecom • Payroll processing
Business Case - 3 Do you receive confidential information (and the associated liability) from customers ? • Personally Identifiable Information (PII) • Citizen information • Large project financing for banks • Vendor registration process for large corporations
Business Case - 4 Do you generate revenue by providing reports & other information? • Subscribed reports • Paid research • Financial analysis • Industry specific research • Training/course materials
What’s the Impact? Intellectual Property Gets Into Competitors’ Hands Competitive Advantage Decreases Revenue Decreases: 5%?...10%?...20%? Market Share Decreases: 5%?...8%?...10%? Market Value Decreases: 2%?...5%?...10%? Can your company afford NOT to protect its IP? Seclore Company Confidential
What’s the Impact? Employee Files Lost Legal Fees: $500K?...$1M?...$5M? Productivity Loss: 2%?...5%?...10%? Customer Loss: 1%?...2%? Market Value Loss: 2%?...4%? Can your company afford NOT to protect employee files? Seclore Company Confidential
What’s the Impact? Price List Sent to Wrong Distributor Forced to Match Discount Revenue Decreases: 0.25%?...0.5%?...1%? Market Value Decreases: 0.5%?...0.8%? Can your company afford price lists going to the wrong vendor? Seclore Company Confidential
Today’s Imperatives… Data needs to travel Need for External Collaboration Corporate boundaries are diminishing Your Confidential Information Often Travels Outside Your Network DOES YOUR SECURITY? Seclore Company Confidential
Utilize Any File-Sharing Method Without Risk Protection endures with the file regardless of how it is shared or how it is accessed. Seclore Company Confidential
Flexible, Granular Usage Policies WHO can access the file? • Permanence:Protection persists with the file forever • Remote Control: File rights can be changed from anywhere in the world • Audit Trail: All activities are tracked Specific Users/groups within and outside the organization WHAT rights do they have? View, edit, print, copy content, take screen grabs, work offline WHEN can they do it? Automatic file expiry, date and time ranges, number of days from first access WHERE can they do it? Specific computers, devices, IP addresses Seclore Company Confidential
Make Sure Your EDRM has Advanced Technology Seclore Company Confidential
The ‘Anyness’ Factor • Works Seamlessly in any Environment • Supports any Device • Supports any OS • Supports any File Format Natively • Not Dependent on any Underlying System • Removes Friction to Facilitate Adoption Seclore Company Confidential
Multiple Ways to Associate Rights with Files • Multiple methods for attaching rights to files • One-click to add protection as files are created, emailed or shared • Automated when files are shared or downloaded from exiting systems, or placed in a specific folder Seclore Company Confidential
One-Click Email Protection Seclore Company Confidential
Easily On-Board New Users Seclore Company Confidential
Recipients Can Easily Utilize Protected Files • Seamless User Authentication • For internal users - integrate with AD and other IAM / SSO tools • For external users - utilize Okta, Ping, other ID methods or Seclore’s built-in identity service • Use Protected File in Native Application • File opens in native application – rights continue to control file usage (e.g. MS-Office, Acrobat Reader, AutoCAD, OpenOffice) • File extension is maintained Browser-Based Access No software download needed to access protected files Seclore Company Confidential
Other Advanced Features • Automated Licensing: • Dynamically assigns a license to any user needing to protect a file • Eliminates manual licensing admin process • Dynamic Request Access: • Occurs when a protected file is sent to a group and a user is not yet on-boarded • New user can easily request access • Owner registers user w/one click • One-Click Permission Modification: • Rapidly change permissions on previously protected files by clicking on the file Seclore Company Confidential
Make Sure Your EDRM is Secure Seclore Company Confidential
Reliable Security • Pluggable Encryption • We don’t own the keys • Keys do not travel with files • Companies can use their own algorithm • Single-Stack Security • No hand offs between EDRM platform and third-party products (e.g. MS RM to FoxIT) • Eliminates Security Loop-Holes • Controls screen capture • Cannot cut/paste into unsecured file • Policies remain even when file is saved in different format Seclore Company Confidential
Make Sure Your EDRM is Automated Seclore Company Confidential
Automate Protection with Pre-Built Connectors • Automatically attach policies to files as they are downloaded, shared, or viewed • Pre-built connectors for DLP, ERP, ECM, EFSS and more • Policy Federation: Leverage access policies already defined within existing systems Seclore Company Confidential
Seclore – What’s Unique Seclore protects 60% more documents annually versus other EDRM solutions Seclore Company Confidential
Thank You! www.seclore.com | info@seclore.com | http://blog.seclore.com Seclore Company Confidential