140 likes | 268 Views
Question : Why do F1 cars have the biggest brakes ?. Answer : Because they need to go the fastest. Presentation at NullCon 2011, Goa Vishal Gupta Seclore. Protect Infrastructure or protect information ?? Lessons from Wikileaks. Information exchange in the collaborative world. Firewalls.
E N D
Question : Why do F1 cars have the biggest brakes ? Answer : Because they need to go the fastest.
Presentation at NullCon 2011, Goa Vishal Gupta Seclore Protect Infrastructure or protect information ??Lessons from Wikileaks
Information exchange in the collaborative world Firewalls Competitors TELEMARKETER Information is exchanged between Employees of the organisation Information is exchanged between employees & vendors & employees & customers What happens if an employee with privileged access leaves to join a competitor ? What happens if information shared with a vendor is lost by the vendor ? VENDORS CUSTOMERS Enterprise VPN SSL UTM Firewall …
The compromise ... Decreasing control and protection over data Increasing risks of systems and data Decreasing availability of systems and data Enterprise + Partners Data Center Enterprise The world
Underlying Issues Share it = It becomes his (also) Ownership and usage cannot be separated Shared once = Shared forever Impossible to “recall” information Out of the firewall = Free for all Technology & processes are only applicable within
Information lifecycle … Desktops Shared folders Desktops Removable media Backup Laptops Content Management Laptops Document retention Remote desktops Email Mobile devices Instant Messaging Archive Mobile devices Online workspaces Removable media Store Use Archive & Backup Create Transmit & collaborate Delete Security DLP Anti-virus UTM SSL Anti-… IDM DLP Vaults Digital shredders Hard disk encryption Application security NTFS Heterogeneous policies … Heterogeneous infrastructure
Unstructured information security Option 1 : Control Distribution . . . Security Collaboration
Unstructured information security Option 2 : Control Usage . . . Right Person Right Action Right Time Right Location Security Collaboration
Information Rights Management IRM systems allow enterprises to define, implement & audit information usage “policies”. A “policy” defines : • WHO can use the information People & groups within and outside of the organization can be defined as rightful users of the information • WHAT can each person do Individual actions like reading, editing, printing, distributing, copy-pasting, screen grabbing etc. can be controlled • WHEN can he use it Information usage can be time based e.g. can only be used by Mr. A till 28th Sept OR only for the 2 days • WHERE can he use it from Information can be linked to locations e.g. only 3rd floor office by private/public IP addresses Policies are persistent with data, dynamic & audit-able
Lessons from Wikileaks security Content is King 1 supposed to be like ‘s security 2 Thou shall focus on protecting the information …because no “wall” is too high 3 Thou shall listen to dad & not watch TV beyond 7 pm
About … Seclore is a high growth information security product company focused on providing Security without compromising collaboration Seclore’s flagship product Seclore FileSecure is used by More than 1 million users & some of the largest enterprises
www.seclore.com ContactVishal Gupta+91-22-4015-5252