The Codex of Business Writing Software for Real-World Solutions 2.pptx
Seclore File Secure Sharepoint Walkthrough
1. Seclore Filesecure
SharePOINT Connector
Enhancing security of MS SharePOINT
2. Contents
• Constraints with MS SharePoint
• The Solution ..
• What is Seclore FileSecure
• Seclore FileSecure connector for MS SharePoint
• Policy definition
• Assigning policies to Sharepoint folders
• Uploading documents
• Downloading a file from Sharepoint folder
• Accessing a protected file
• Audit trails
• About Seclore
3. Sharepoint and security
A Process Flow of Product Plan
User
User Sharepoint
Edited
Copied
Printed
Un-protected File
Viewed Distributed
Sharepoint Sharepoint security is not persistent . Once the file is
accessed by downloaded locally, it can be edited, copied &
users distributed.
4. Contents
• Constraints with MS SharePoint
• The Solution ..
• What is Seclore FileSecure
• Seclore FileSecure connector for MS SharePoint
• Policy definition
• Assigning policies to Sharepoint folders
• Uploading documents
• Downloading a file from Sharepoint folder
• Accessing a protected file
• Audit trails
• About Seclore
5. Seclore FileSecure
Seclore FileSecure allow enterprises to define, implement & audit
information usage “policies”. A “policy” defines :
• WHO can use the information
People & groups within and outside of the organization
can be defined as rightful users of the information
• WHAT can each person do
Individual actions like reading, editing, printing,
distributing, copy-pasting, screen grabbing etc.
can be controlled
• WHEN can he use it
Information usage can be time based e.g. can only be
used by Mr. A till 28th Sept OR only for the 2
days
• WHERE can he use it from
Information can be linked to locations e.g. only 3rd
floor office by private/public IP addresses
6. Seclore FileSecure
• Policies are
– Persistent: Implemented on information and all its copies
wherever it is transmitted or stored
– Dynamic: Policies can be changed after distributing information
without having access to or redistributing the information
• Policies can be attached to information on
– Creation
– Placement in a certain location e.g. shared folder
– Attachment to email
– Uploading to a document management / ECM system
– …
7. Contents
• Constraints with MS SharePoint
• The Solution ..
• What is Seclore FileSecure
• Seclore FileSecure connector for MS SharePoint
• Policy definition
• Assigning policies to Sharepoint folders
• Uploading documents
• Downloading a file from Sharepoint folder
• Accessing a protected file
• Audit trails
• About Seclore
8. Seclore FileSecure Enabled Sharepoint
A Process Flow of Product SharePoint + Seclore
Plan
User
User FileSecure
Edited
Copied
Printed
Protected File
Viewed Distributed
Sharepoint Files copied out of “Sharepoint Folder” are persistently
accessed by protected. Rights to edit, copy, print and distribute are
users restricted based on Seclore FileSecure policies
9. Contents
• Constraints with MS SharePoint
• The Solution ..
• What is Seclore FileSecure
• Seclore FileSecure connector for MS SharePoint
• Policy definition
• Assigning policies to Sharepoint folders
• Uploading documents
• Downloading a file from Sharepoint folder
• Accessing a protected file
• Audit trails
• About Seclore
10. Policy definition–WHO, WHAT
Policy People / groups, within / outside the enterprise can be
Admin dis-allowed to edit, print, copy, forward etc. via a policy 10
11. Policy definition–WHEN, WHERE
A policy can expire information beyond a date /
Policy
timespan and also restrict its usage to certain
Admin 11
computers / networks
12. Contents
• Constraints with MS SharePoint
• The Solution ..
• What is Seclore FileSecure
• Seclore FileSecure connector for MS SharePoint
• Policy definition
• Assigning policies to Sharepoint folders
• Uploading documents
• Downloading a file from Sharepoint folder
• Accessing a protected file
• Audit trails
• About Seclore
13. Applying Policies…
Sharepoint Policies can be applied to folders by the Sharepoint
Admin admin. The admin chooses the folder … 13
15. Contents
• Constraints with MS SharePoint
• The Solution ..
• What is Seclore FileSecure
• Seclore FileSecure connector for MS SharePoint
• Policy definition
• Assigning policies to Sharepoint folders
• Uploading documents
• Downloading a file from Sharepoint folder
• Accessing a protected file
• Audit trails
• About Seclore
15
19. Contents
• Constraints with MS SharePoint
• The Solution ..
• What is Seclore FileSecure
• Seclore FileSecure connector for MS SharePoint
• Policy definition
• Assigning policies to Sharepoint folders
• Uploading documents
• Downloading a file from Sharepoint folder
• Accessing a protected file
• Audit trails
• About Seclore
20. Download document from Sharepoint…
Once the user’s downloads the document from Seclore
User’s
FileSecure policy protected Sharepoint folder the file
Computer 20
gets instantly protected
21. …Download document from Sharepoint
Downloaded document
from Sharepoint
Notice the red lock
User’s
…the file is instantly protected
Computer 21
22. Contents
• Constraints with MS SharePoint
• The Solution ..
• What is Seclore FileSecure
• Seclore FileSecure connector for MS SharePoint
• Policy definition
• Assigning policies to Sharepoint folders
• Uploading documents
• Downloading a file from Sharepoint folder
• Accessing a protected file
• Audit trails
• About Seclore
23. Rights display
User’s On clicking a rights display makes the recipient
Computer explicitly aware of his rights to the document 23
28. Unauthorized screen grab
Screen capture by the Prt Scr key, screen grabbing tools
User’s
like Camtasia and screen sharing tools like Webex is
Computer 28
blocked
29. Contents
• Constraints with MS SharePoint
• The Solution ..
• What is Seclore FileSecure
• Seclore FileSecure connector for MS SharePoint
• Policy definition
• Assigning policies to Sharepoint folders
• Uploading documents
• Downloading a file from Sharepoint folder
• Accessing a protected file
• Audit trails
• About Seclore
30. Information audit
The audit captures the WHO, WHAT, WHEN and WHERE
User’s
of the access attempt. Authorized and unauthorized
Computer 30
attempts are captured and reported
31. Contents
• The Problem with MS SharePoint
• The Solution ..
• What is Seclore FileSecure
• What is Seclore FileSecure enabled – MS SharePoint
• Policy definition
• Assigning policies to Sharepoint folders
• Uploading documents
• Downloading a file from Sharepoint folder
• Accessing a protected file
• Audit trails
• About Seclore
32. Corporate Background …
“Seclore is a high growth software product company. Seclore’s technology
helps mitigate the risks arising out of information breaches whilst
enhancing collaboration”
6 years old, Headquartered in Mumbai, India
Promoted by IIT Bombay under the SINE program - www.sineiitb.org
Geographical and customer presence in Middle East, ASEAN, SAARC & Europe
Offerings focused on Information Rights Management and Secure Outsourcing
Stake holders including
IIT Bombay – www.iitb.ac.in
ICICI Bank – www.icicibank.com
Ventureast – www.ventureast.net
Technology and service differentiators focusing on minimally intrusive technology,
value based pricing and usage without training
33. About …
Value to customers
Security without compromising on collaboration
Customers across
….Diversified business groups
….Large financial services groups
….Engineering and manufacturing organizations
….Defence, Software, BPO, Consulting, Services, ….
34. What customers say about us …
“We chose Seclore FileSecure due to the flexibility provided by Seclore in
terms of solution capabilities and customization. Implementation of
Seclore FileSecure has reduced the exposure of critical data for potential
misuse or frauds. The business benefits are tremendous.”
- Murli Nambiar, Head of Information Security
"Financial services companies like banks, insurance carriers & broking are
‘opening up’ their information systems and processes for participation by
customers, partners and vendors. This of course brings in a lot of value
chain integration and lowers costs but comes with information security
needs which cannot be solved by present day systems. Seclore’s
technology for securing documents as they flow within and outside
enterprises as well as securing data shared with outsourcing partners is
extremely relevant.
- C N Ram. Group CIO, Essar group
35. What industry experts say …
Seclore’s approach is different in that they not mandatory
rely on such plug-ins but mainly act “below” the
application. The client component (which is required to
access protected, e.g. encrypted, documents) tries to
analyze the activities off the application like access to the
file system. One impact of that approach is that a
document might be opened with different applications
supporting the specific document format.
- Martin Kuppinger, One of the fore-most information security analysts
“Information breaches normally result in intellectual property violation which is a serious problem
affecting industry today. Seclore’s combination of preventive and corrective methods of handling
information breaches is invaluable to any industry”
- Haigreve Khaitan (Managing partner – Khaitan and Co)
“Collaboration, security and privacy appear as mutually conflicting goals with most present day
technologies. Seclore has resolved this conflict in a very elegant manner with its technology.”
- Animesh Parihar (Global Delivery Head – SAP)
36. Awards and recognition …
Deloitte Technology Fast 50 is a ranking compiled
every year based on percentage of growth of
fiscal year revenue over three years. The
companies must also fulfil other criterion of
technology orientation.
‘Hidden Gems’ 2010 by Kuppinger Cole, Europe’s
leading information security analyst firm is a report
which lists vendors, which have a significantly
differentiated offering and are market leaders in a
particular segment.
37. … Awards and recognition
The TR35 award is for innovators whose inventions and research,
Massachusetts Institute of Technology (MIT) finds exciting. Technology
Review, owned and published by MIT, is the world’s oldest technology
magazine.
“Innovations – ideas in practice” is an annual event honoring
researchers and innovators for creative and innovative work in the
sphere of science and technology. The innovation needs to have a high
degree of practical relevance to change everyday life.