SlideShare a Scribd company logo
1 of 38
Seclore Filesecure
      SharePOINT Connector
Enhancing security of MS SharePOINT
Contents
• Constraints with MS SharePoint

• The Solution ..
  •   What is Seclore FileSecure
  •   Seclore FileSecure connector for MS SharePoint
  •   Policy definition
  •   Assigning policies to Sharepoint folders
  •   Uploading documents
  •   Downloading a file from Sharepoint folder
  •   Accessing a protected file
  •   Audit trails


• About Seclore
Sharepoint and security
            A Process Flow of Product Plan
               User
               User                                          Sharepoint




                                Edited


                                Copied



                                Printed

     Un-protected File
                                 Viewed             Distributed



 Sharepoint        Sharepoint security is not persistent . Once the file is
accessed by           downloaded locally, it can be edited, copied &
   users                                distributed.
Contents
• Constraints with MS SharePoint

• The Solution ..
  •   What is Seclore FileSecure
  •   Seclore FileSecure connector for MS SharePoint
  •   Policy definition
  •   Assigning policies to Sharepoint folders
  •   Uploading documents
  •   Downloading a file from Sharepoint folder
  •   Accessing a protected file
  •   Audit trails


• About Seclore
Seclore FileSecure
Seclore FileSecure allow enterprises to define, implement & audit
information usage “policies”. A “policy” defines :

 • WHO can use the information
 People & groups within and outside of the organization
     can be defined as rightful users of the information

 • WHAT can each person do
 Individual actions like reading, editing, printing,
      distributing, copy-pasting, screen grabbing etc.
      can be controlled

 • WHEN can he use it
 Information usage can be time based e.g. can only be
      used by Mr. A till 28th Sept OR only for the 2
      days

 • WHERE can he use it from
 Information can be linked to locations e.g. only 3rd
      floor office by private/public IP addresses
Seclore FileSecure

• Policies are
   – Persistent: Implemented on information and all its copies
     wherever it is transmitted or stored
   – Dynamic: Policies can be changed after distributing information
     without having access to or redistributing the information


• Policies can be attached to information on
   –   Creation
   –   Placement in a certain location e.g. shared folder
   –   Attachment to email
   –   Uploading to a document management / ECM system
   –   …
Contents
• Constraints with MS SharePoint

• The Solution ..
  •   What is Seclore FileSecure
  •   Seclore FileSecure connector for MS SharePoint
  •   Policy definition
  •   Assigning policies to Sharepoint folders
  •   Uploading documents
  •   Downloading a file from Sharepoint folder
  •   Accessing a protected file
  •   Audit trails


• About Seclore
Seclore FileSecure Enabled Sharepoint
                     A Process Flow of Product SharePoint + Seclore
                                               Plan
              User
              User                                          FileSecure




                                Edited


                                Copied



                                Printed

    Protected File
                                 Viewed           Distributed



 Sharepoint      Files copied out of “Sharepoint Folder” are persistently
accessed by      protected. Rights to edit, copy, print and distribute are
   users             restricted based on Seclore FileSecure policies
Contents
• Constraints with MS SharePoint

• The Solution ..
  •   What is Seclore FileSecure
  •   Seclore FileSecure connector for MS SharePoint
  •   Policy definition
  •   Assigning policies to Sharepoint folders
  •   Uploading documents
  •   Downloading a file from Sharepoint folder
  •   Accessing a protected file
  •   Audit trails


• About Seclore
Policy definition–WHO, WHAT




Policy   People / groups, within / outside the enterprise can be
Admin    dis-allowed to edit, print, copy, forward etc. via a policy 10
Policy definition–WHEN, WHERE




            A policy can expire information beyond a date /
 Policy
            timespan and also restrict its usage to certain
 Admin                                                        11
                         computers / networks
Contents
• Constraints with MS SharePoint

• The Solution ..
  •   What is Seclore FileSecure
  •   Seclore FileSecure connector for MS SharePoint
  •   Policy definition
  •   Assigning policies to Sharepoint folders
  •   Uploading documents
  •   Downloading a file from Sharepoint folder
  •   Accessing a protected file
  •   Audit trails


• About Seclore
Applying Policies…




Sharepoint   Policies can be applied to folders by the Sharepoint
  Admin            admin. The admin chooses the folder …            13
…Applying Policies




Sharepoint
                       Policies are applied…
  Admin                                        14
Contents
• Constraints with MS SharePoint

• The Solution ..
  •   What is Seclore FileSecure
  •   Seclore FileSecure connector for MS SharePoint
  •   Policy definition
  •   Assigning policies to Sharepoint folders
  •   Uploading documents
  •   Downloading a file from Sharepoint folder
  •   Accessing a protected file
  •   Audit trails


• About Seclore
                                                       15
Upload document…




Sharepoint
                      Upload document
  Admin                                 16
…Upload document




Sharepoint
                      Upload document
  Admin                                 17
Document is uploaded




Sharepoint
                     Document is uploaded
  Admin                                     18
Contents
• Constraints with MS SharePoint

• The Solution ..
  •   What is Seclore FileSecure
  •   Seclore FileSecure connector for MS SharePoint
  •   Policy definition
  •   Assigning policies to Sharepoint folders
  •   Uploading documents
  •   Downloading a file from Sharepoint folder
  •   Accessing a protected file
  •   Audit trails


• About Seclore
Download document from Sharepoint…




           Once the user’s downloads the document from Seclore
 User’s
            FileSecure policy protected Sharepoint folder the file
Computer                                                           20
                          gets instantly protected
…Download document from Sharepoint


                Downloaded document
                   from Sharepoint
                 Notice the red lock




 User’s
                      …the file is instantly protected
Computer                                                 21
Contents
• Constraints with MS SharePoint

• The Solution ..
  •   What is Seclore FileSecure
  •   Seclore FileSecure connector for MS SharePoint
  •   Policy definition
  •   Assigning policies to Sharepoint folders
  •   Uploading documents
  •   Downloading a file from Sharepoint folder
  •   Accessing a protected file
  •   Audit trails


• About Seclore
Rights display




 User’s        On clicking a rights display makes the recipient
Computer        explicitly aware of his rights to the document    23
Unauthorized print




 User’s
             Unauthorized activities like attempts to print …
Computer                                                        24
Unauthorized print




 User’s
                        … are disallowed
Computer                                   25
Unauthorized copy




 User’s
            Attempts to copy parts / whole of the document …
Computer                                                       26
Unauthorized copy




 User’s
                       … are disallowed
Computer                                  27
Unauthorized screen grab




           Screen capture by the Prt Scr key, screen grabbing tools
 User’s
            like Camtasia and screen sharing tools like Webex is
Computer                                                            28
                                  blocked
Contents
• Constraints with MS SharePoint

• The Solution ..
  •   What is Seclore FileSecure
  •   Seclore FileSecure connector for MS SharePoint
  •   Policy definition
  •   Assigning policies to Sharepoint folders
  •   Uploading documents
  •   Downloading a file from Sharepoint folder
  •   Accessing a protected file
  •   Audit trails


• About Seclore
Information audit




              The audit captures the WHO, WHAT, WHEN and WHERE
 User’s
                of the access attempt. Authorized and unauthorized
Computer                                                           30
                         attempts are captured and reported
Contents
• The Problem with MS SharePoint

• The Solution ..
  •   What is Seclore FileSecure
  •   What is Seclore FileSecure enabled – MS SharePoint
  •   Policy definition
  •   Assigning policies to Sharepoint folders
  •   Uploading documents
  •   Downloading a file from Sharepoint folder
  •   Accessing a protected file
  •   Audit trails


• About Seclore
Corporate Background …
“Seclore is a high growth software product company. Seclore’s technology
    helps mitigate the risks arising out of information breaches whilst
                         enhancing collaboration”


6 years old, Headquartered in Mumbai, India
Promoted by IIT Bombay under the SINE program - www.sineiitb.org
Geographical and customer presence in Middle East, ASEAN, SAARC & Europe
Offerings focused on Information Rights Management and Secure Outsourcing
Stake holders including
   IIT Bombay – www.iitb.ac.in
   ICICI Bank – www.icicibank.com
   Ventureast – www.ventureast.net
Technology and service differentiators focusing on minimally intrusive technology,
   value based pricing and usage without training
About …
               Value to customers
Security without compromising on collaboration
               Customers across
                                  ….Diversified business groups


                              ….Large financial services groups


                 ….Engineering and manufacturing organizations




            ….Defence, Software, BPO, Consulting, Services, ….
What customers say about us …

         “We chose Seclore FileSecure due to the flexibility provided by Seclore in
         terms of solution capabilities and customization. Implementation of
         Seclore FileSecure has reduced the exposure of critical data for potential
         misuse or frauds. The business benefits are tremendous.”
          - Murli Nambiar, Head of Information Security


          "Financial services companies like banks, insurance carriers & broking are
          ‘opening up’ their information systems and processes for participation by
          customers, partners and vendors. This of course brings in a lot of value
          chain integration and lowers costs but comes with information security
          needs which cannot be solved by present day systems. Seclore’s
          technology for securing documents as they flow within and outside
          enterprises as well as securing data shared with outsourcing partners is
          extremely relevant.
            - C N Ram. Group CIO, Essar group
What industry experts say …
                                                          Seclore’s approach is different in that they not mandatory
                                                          rely on such plug-ins but mainly act “below” the
                                                          application. The client component (which is required to
                                                          access protected, e.g. encrypted, documents) tries to
                                                          analyze the activities off the application like access to the
                                                          file system. One impact of that approach is that a
                                                          document might be opened with different applications
                                                          supporting the specific document format.

- Martin Kuppinger, One of the fore-most information security analysts



              “Information breaches normally result in intellectual property violation which is a serious problem
              affecting industry today. Seclore’s combination of preventive and corrective methods of handling
              information breaches is invaluable to any industry”
                - Haigreve Khaitan (Managing partner – Khaitan and Co)




              “Collaboration, security and privacy appear as mutually conflicting goals with most present day
              technologies. Seclore has resolved this conflict in a very elegant manner with its technology.”
               - Animesh Parihar (Global Delivery Head – SAP)
Awards and recognition …



                                                  Deloitte Technology Fast 50 is a ranking compiled
                                                  every year based on percentage of growth of
                                                  fiscal year revenue over three years. The
                                                  companies must also fulfil other criterion of
                                                  technology orientation.




 ‘Hidden Gems’ 2010 by Kuppinger Cole, Europe’s
leading information security analyst firm is a report
      which lists vendors, which have a significantly
  differentiated offering and are market leaders in a
                                  particular segment.
… Awards and recognition




                                 The TR35 award is for innovators whose inventions and research,
                                 Massachusetts Institute of Technology (MIT) finds exciting. Technology
                                 Review, owned and published by MIT, is the world’s oldest technology
                                 magazine.




      “Innovations – ideas in practice” is an annual event honoring
 researchers and innovators for creative and innovative work in the
sphere of science and technology. The innovation needs to have a high
                 degree of practical relevance to change everyday life.
More Info?




www.seclore.com
   +91-22-4015-5252

More Related Content

What's hot

Forrester no more chewy centers- the zero trust model
Forrester   no more chewy centers- the zero trust modelForrester   no more chewy centers- the zero trust model
Forrester no more chewy centers- the zero trust modelCristian Garcia G.
 
Introduction to Time Series Analytics with Microsoft Azure
Introduction to Time Series Analytics with Microsoft AzureIntroduction to Time Series Analytics with Microsoft Azure
Introduction to Time Series Analytics with Microsoft AzureCodit
 
4_Session 1- Universal ZTNA.pptx
4_Session 1- Universal ZTNA.pptx4_Session 1- Universal ZTNA.pptx
4_Session 1- Universal ZTNA.pptxaungyekhant1
 
Microsoft 365 Security and Compliance
Microsoft 365 Security and ComplianceMicrosoft 365 Security and Compliance
Microsoft 365 Security and ComplianceDavid J Rosenthal
 
Policy as Code: IT Governance With HashiCorp Sentinel
Policy as Code: IT Governance With HashiCorp SentinelPolicy as Code: IT Governance With HashiCorp Sentinel
Policy as Code: IT Governance With HashiCorp SentinelMitchell Pronschinske
 
Memebership inference attacks against machine learning models
Memebership inference attacks against machine learning modelsMemebership inference attacks against machine learning models
Memebership inference attacks against machine learning modelsRrubaa Panchendrarajan
 
Forcepoint Advanced Malware Detection
Forcepoint Advanced Malware DetectionForcepoint Advanced Malware Detection
Forcepoint Advanced Malware DetectionForcepoint LLC
 
ICS Network Security Monitoring (NSM)
ICS Network Security Monitoring (NSM)ICS Network Security Monitoring (NSM)
ICS Network Security Monitoring (NSM)Digital Bond
 
IBM Infosphere Guardium - Database Security
IBM Infosphere Guardium - Database SecurityIBM Infosphere Guardium - Database Security
IBM Infosphere Guardium - Database Securityebuc
 
Microsoft AZ-900 Dumps Questions
Microsoft AZ-900 Dumps QuestionsMicrosoft AZ-900 Dumps Questions
Microsoft AZ-900 Dumps QuestionsBraindumps4IT
 
Microsoft Azure Active Directory
Microsoft Azure Active DirectoryMicrosoft Azure Active Directory
Microsoft Azure Active DirectoryDavid J Rosenthal
 
Guardium Presentation
Guardium PresentationGuardium Presentation
Guardium Presentationtsteh
 
Microsoft Azure Information Protection
Microsoft Azure Information Protection Microsoft Azure Information Protection
Microsoft Azure Information Protection Syed Sabhi Haider
 
Why Zero Trust Architecture Will Become the New Normal in 2021
Why Zero Trust Architecture Will Become the New Normal in 2021Why Zero Trust Architecture Will Become the New Normal in 2021
Why Zero Trust Architecture Will Become the New Normal in 2021Cloudflare
 

What's hot (20)

Zero Trust Model Presentation
Zero Trust Model PresentationZero Trust Model Presentation
Zero Trust Model Presentation
 
Forrester no more chewy centers- the zero trust model
Forrester   no more chewy centers- the zero trust modelForrester   no more chewy centers- the zero trust model
Forrester no more chewy centers- the zero trust model
 
Introduction to Time Series Analytics with Microsoft Azure
Introduction to Time Series Analytics with Microsoft AzureIntroduction to Time Series Analytics with Microsoft Azure
Introduction to Time Series Analytics with Microsoft Azure
 
4_Session 1- Universal ZTNA.pptx
4_Session 1- Universal ZTNA.pptx4_Session 1- Universal ZTNA.pptx
4_Session 1- Universal ZTNA.pptx
 
Microsoft 365 Security and Compliance
Microsoft 365 Security and ComplianceMicrosoft 365 Security and Compliance
Microsoft 365 Security and Compliance
 
Policy as Code: IT Governance With HashiCorp Sentinel
Policy as Code: IT Governance With HashiCorp SentinelPolicy as Code: IT Governance With HashiCorp Sentinel
Policy as Code: IT Governance With HashiCorp Sentinel
 
Security and compliance in Office 365 -Part 1
Security and compliance in Office 365 -Part 1Security and compliance in Office 365 -Part 1
Security and compliance in Office 365 -Part 1
 
Memebership inference attacks against machine learning models
Memebership inference attacks against machine learning modelsMemebership inference attacks against machine learning models
Memebership inference attacks against machine learning models
 
Forcepoint Advanced Malware Detection
Forcepoint Advanced Malware DetectionForcepoint Advanced Malware Detection
Forcepoint Advanced Malware Detection
 
Symantec Data Loss Prevention 9
Symantec Data Loss Prevention 9Symantec Data Loss Prevention 9
Symantec Data Loss Prevention 9
 
Quiz master
Quiz masterQuiz master
Quiz master
 
Office 365 Security Best Practices
Office 365 Security Best PracticesOffice 365 Security Best Practices
Office 365 Security Best Practices
 
Data Leakage Prevention (DLP)
Data Leakage Prevention (DLP)Data Leakage Prevention (DLP)
Data Leakage Prevention (DLP)
 
ICS Network Security Monitoring (NSM)
ICS Network Security Monitoring (NSM)ICS Network Security Monitoring (NSM)
ICS Network Security Monitoring (NSM)
 
IBM Infosphere Guardium - Database Security
IBM Infosphere Guardium - Database SecurityIBM Infosphere Guardium - Database Security
IBM Infosphere Guardium - Database Security
 
Microsoft AZ-900 Dumps Questions
Microsoft AZ-900 Dumps QuestionsMicrosoft AZ-900 Dumps Questions
Microsoft AZ-900 Dumps Questions
 
Microsoft Azure Active Directory
Microsoft Azure Active DirectoryMicrosoft Azure Active Directory
Microsoft Azure Active Directory
 
Guardium Presentation
Guardium PresentationGuardium Presentation
Guardium Presentation
 
Microsoft Azure Information Protection
Microsoft Azure Information Protection Microsoft Azure Information Protection
Microsoft Azure Information Protection
 
Why Zero Trust Architecture Will Become the New Normal in 2021
Why Zero Trust Architecture Will Become the New Normal in 2021Why Zero Trust Architecture Will Become the New Normal in 2021
Why Zero Trust Architecture Will Become the New Normal in 2021
 

Viewers also liked

Bo p, disequlibrium
Bo p, disequlibriumBo p, disequlibrium
Bo p, disequlibriumwwgreatmutha
 
Xabier,itzea,peio and asier n
Xabier,itzea,peio and asier nXabier,itzea,peio and asier n
Xabier,itzea,peio and asier nartxandape
 
吳威龍
吳威龍吳威龍
吳威龍輝 哲
 
Introduction to Message-Oriented Middleware
Introduction to Message-Oriented MiddlewareIntroduction to Message-Oriented Middleware
Introduction to Message-Oriented MiddlewareEdward Curry
 
Simple machines ly kell & mckenzie
Simple machines ly kell & mckenzieSimple machines ly kell & mckenzie
Simple machines ly kell & mckenziesmbass62
 
Pathways through Participation - Final report launch presentation
Pathways through Participation - Final report launch presentationPathways through Participation - Final report launch presentation
Pathways through Participation - Final report launch presentationTimJHughes
 
Cartelera de cine Roxy Valladolid 29 junio 2012 Ocio y Rutas Valladolid
Cartelera de cine Roxy Valladolid 29 junio 2012 Ocio y Rutas ValladolidCartelera de cine Roxy Valladolid 29 junio 2012 Ocio y Rutas Valladolid
Cartelera de cine Roxy Valladolid 29 junio 2012 Ocio y Rutas ValladolidOcio y Rutas Valladolid
 
MediaCat dergisi, Event Marketing eki 2009/06
MediaCat dergisi, Event Marketing eki 2009/06MediaCat dergisi, Event Marketing eki 2009/06
MediaCat dergisi, Event Marketing eki 2009/06Hakan Turkkusu
 
Alegaciones a la nueva plaza de Director del Área de Seguridad Ciudadana, Mov...
Alegaciones a la nueva plaza de Director del Área de Seguridad Ciudadana, Mov...Alegaciones a la nueva plaza de Director del Área de Seguridad Ciudadana, Mov...
Alegaciones a la nueva plaza de Director del Área de Seguridad Ciudadana, Mov...UPyDMajadahonda
 
التشخيص الميداني حول ظاهرة تشغيل الأطفال بأسفي2012 2013 دراسة للنقابة الوطنية...
التشخيص الميداني حول ظاهرة تشغيل الأطفال بأسفي2012 2013 دراسة للنقابة الوطنية...التشخيص الميداني حول ظاهرة تشغيل الأطفال بأسفي2012 2013 دراسة للنقابة الوطنية...
التشخيص الميداني حول ظاهرة تشغيل الأطفال بأسفي2012 2013 دراسة للنقابة الوطنية...CMCF(Centre Maroco-Coréen de Formation en TICE)
 
Pecutan terakhir
Pecutan terakhirPecutan terakhir
Pecutan terakhir123syahier
 
229232801 cooperare-judiciară-in-materie-penală-culegere-de-practică-judiciar...
229232801 cooperare-judiciară-in-materie-penală-culegere-de-practică-judiciar...229232801 cooperare-judiciară-in-materie-penală-culegere-de-practică-judiciar...
229232801 cooperare-judiciară-in-materie-penală-culegere-de-practică-judiciar...exodumuser
 

Viewers also liked (20)

Bo p, disequlibrium
Bo p, disequlibriumBo p, disequlibrium
Bo p, disequlibrium
 
130624 auto layout
130624 auto layout130624 auto layout
130624 auto layout
 
Xabier,itzea,peio and asier n
Xabier,itzea,peio and asier nXabier,itzea,peio and asier n
Xabier,itzea,peio and asier n
 
吳威龍
吳威龍吳威龍
吳威龍
 
Introduction to Message-Oriented Middleware
Introduction to Message-Oriented MiddlewareIntroduction to Message-Oriented Middleware
Introduction to Message-Oriented Middleware
 
Simple machines ly kell & mckenzie
Simple machines ly kell & mckenzieSimple machines ly kell & mckenzie
Simple machines ly kell & mckenzie
 
Space/Narrative PPT
Space/Narrative PPTSpace/Narrative PPT
Space/Narrative PPT
 
Pathways through Participation - Final report launch presentation
Pathways through Participation - Final report launch presentationPathways through Participation - Final report launch presentation
Pathways through Participation - Final report launch presentation
 
sci
scisci
sci
 
Farsund digitalworkshop
Farsund digitalworkshopFarsund digitalworkshop
Farsund digitalworkshop
 
Cartelera de cine Roxy Valladolid 29 junio 2012 Ocio y Rutas Valladolid
Cartelera de cine Roxy Valladolid 29 junio 2012 Ocio y Rutas ValladolidCartelera de cine Roxy Valladolid 29 junio 2012 Ocio y Rutas Valladolid
Cartelera de cine Roxy Valladolid 29 junio 2012 Ocio y Rutas Valladolid
 
Tutoria herramientas
Tutoria herramientasTutoria herramientas
Tutoria herramientas
 
MediaCat dergisi, Event Marketing eki 2009/06
MediaCat dergisi, Event Marketing eki 2009/06MediaCat dergisi, Event Marketing eki 2009/06
MediaCat dergisi, Event Marketing eki 2009/06
 
Teste em 1º periodo 16-17 1-
Teste em   1º periodo 16-17  1-Teste em   1º periodo 16-17  1-
Teste em 1º periodo 16-17 1-
 
Presentazione mosi
Presentazione mosiPresentazione mosi
Presentazione mosi
 
Alegaciones a la nueva plaza de Director del Área de Seguridad Ciudadana, Mov...
Alegaciones a la nueva plaza de Director del Área de Seguridad Ciudadana, Mov...Alegaciones a la nueva plaza de Director del Área de Seguridad Ciudadana, Mov...
Alegaciones a la nueva plaza de Director del Área de Seguridad Ciudadana, Mov...
 
التشخيص الميداني حول ظاهرة تشغيل الأطفال بأسفي2012 2013 دراسة للنقابة الوطنية...
التشخيص الميداني حول ظاهرة تشغيل الأطفال بأسفي2012 2013 دراسة للنقابة الوطنية...التشخيص الميداني حول ظاهرة تشغيل الأطفال بأسفي2012 2013 دراسة للنقابة الوطنية...
التشخيص الميداني حول ظاهرة تشغيل الأطفال بأسفي2012 2013 دراسة للنقابة الوطنية...
 
Top 10 tech tools
Top 10 tech toolsTop 10 tech tools
Top 10 tech tools
 
Pecutan terakhir
Pecutan terakhirPecutan terakhir
Pecutan terakhir
 
229232801 cooperare-judiciară-in-materie-penală-culegere-de-practică-judiciar...
229232801 cooperare-judiciară-in-materie-penală-culegere-de-practică-judiciar...229232801 cooperare-judiciară-in-materie-penală-culegere-de-practică-judiciar...
229232801 cooperare-judiciară-in-materie-penală-culegere-de-practică-judiciar...
 

Similar to Seclore File Secure Sharepoint Walkthrough

Irmintroductionforautocad 110415002444-phpapp02
Irmintroductionforautocad 110415002444-phpapp02Irmintroductionforautocad 110415002444-phpapp02
Irmintroductionforautocad 110415002444-phpapp02gilberteric
 
Seclore FileSecure IBM Filenet Walkthrough
Seclore FileSecure IBM Filenet WalkthroughSeclore FileSecure IBM Filenet Walkthrough
Seclore FileSecure IBM Filenet Walkthroughsiddarthc
 
Intelligent Security, Compliance and Privacy in Office 365
Intelligent Security, Compliance and Privacy in Office 365Intelligent Security, Compliance and Privacy in Office 365
Intelligent Security, Compliance and Privacy in Office 365Miguel Isidoro
 
Seclore FileSecure HotFolder Walkthrough
Seclore FileSecure HotFolder WalkthroughSeclore FileSecure HotFolder Walkthrough
Seclore FileSecure HotFolder Walkthroughsiddarthc
 
What's new with Security & Compliance for SharePoint, OneDrive, and Teams
What's new with Security & Compliance for SharePoint, OneDrive, and TeamsWhat's new with Security & Compliance for SharePoint, OneDrive, and Teams
What's new with Security & Compliance for SharePoint, OneDrive, and TeamsDrew Madelung
 
ESDDC - Making Secured Content Discoverable in SharePoint
ESDDC - Making Secured Content Discoverable in SharePointESDDC - Making Secured Content Discoverable in SharePoint
ESDDC - Making Secured Content Discoverable in SharePointJonathan Ralton
 
Infoaxon extended enterprise
Infoaxon extended enterpriseInfoaxon extended enterprise
Infoaxon extended enterpriseNavnit Saurabh
 
SIKM Boston - Making Secured Content Discoverable in SharePoint
SIKM Boston - Making Secured Content Discoverable in SharePointSIKM Boston - Making Secured Content Discoverable in SharePoint
SIKM Boston - Making Secured Content Discoverable in SharePointJonathan Ralton
 
Best practices for security and governance in share point 2013 published
Best practices for security and governance in share point 2013   publishedBest practices for security and governance in share point 2013   published
Best practices for security and governance in share point 2013 publishedAntonioMaio2
 
March 2023 CIAOPS Need to Know Webinar
March 2023 CIAOPS Need to Know WebinarMarch 2023 CIAOPS Need to Know Webinar
March 2023 CIAOPS Need to Know WebinarRobert Crane
 
Enterprise File Synchronization and Sharing - Biscom Verosync
Enterprise File Synchronization and Sharing - Biscom VerosyncEnterprise File Synchronization and Sharing - Biscom Verosync
Enterprise File Synchronization and Sharing - Biscom VerosyncBiscomMarketing
 
Integrating and positioning IBM Connections in an existing information manage...
Integrating and positioning IBM Connections in an existing information manage...Integrating and positioning IBM Connections in an existing information manage...
Integrating and positioning IBM Connections in an existing information manage...Femke Goedhart
 
5 Reason – To Use Seclore for Microsoft Teams
5 Reason – To Use Seclore for Microsoft Teams5 Reason – To Use Seclore for Microsoft Teams
5 Reason – To Use Seclore for Microsoft TeamsSeclore
 
File Security in Microsoft SharePoint and OneDrive
File Security in Microsoft SharePoint and OneDriveFile Security in Microsoft SharePoint and OneDrive
File Security in Microsoft SharePoint and OneDriveDavid J Rosenthal
 
Deploying & Managing OneDrive
Deploying & Managing OneDriveDeploying & Managing OneDrive
Deploying & Managing OneDriveDrew Madelung
 
Working securely with Microsoft Teams - Techorama 2021
Working securely with Microsoft Teams - Techorama 2021Working securely with Microsoft Teams - Techorama 2021
Working securely with Microsoft Teams - Techorama 2021Albert Hoitingh
 
Community IT innovators Webinar - Taking another look at SharePoint
Community IT innovators Webinar - Taking another look at SharePointCommunity IT innovators Webinar - Taking another look at SharePoint
Community IT innovators Webinar - Taking another look at SharePointCommunity IT Innovators
 

Similar to Seclore File Secure Sharepoint Walkthrough (20)

Irmintroductionforautocad 110415002444-phpapp02
Irmintroductionforautocad 110415002444-phpapp02Irmintroductionforautocad 110415002444-phpapp02
Irmintroductionforautocad 110415002444-phpapp02
 
Seclore FileSecure IBM Filenet Walkthrough
Seclore FileSecure IBM Filenet WalkthroughSeclore FileSecure IBM Filenet Walkthrough
Seclore FileSecure IBM Filenet Walkthrough
 
Intelligent Security, Compliance and Privacy in Office 365
Intelligent Security, Compliance and Privacy in Office 365Intelligent Security, Compliance and Privacy in Office 365
Intelligent Security, Compliance and Privacy in Office 365
 
Seclore FileSecure HotFolder Walkthrough
Seclore FileSecure HotFolder WalkthroughSeclore FileSecure HotFolder Walkthrough
Seclore FileSecure HotFolder Walkthrough
 
Document management and collaboration system
Document management and collaboration systemDocument management and collaboration system
Document management and collaboration system
 
What's new with Security & Compliance for SharePoint, OneDrive, and Teams
What's new with Security & Compliance for SharePoint, OneDrive, and TeamsWhat's new with Security & Compliance for SharePoint, OneDrive, and Teams
What's new with Security & Compliance for SharePoint, OneDrive, and Teams
 
ESDDC - Making Secured Content Discoverable in SharePoint
ESDDC - Making Secured Content Discoverable in SharePointESDDC - Making Secured Content Discoverable in SharePoint
ESDDC - Making Secured Content Discoverable in SharePoint
 
Infoaxon extended enterprise
Infoaxon extended enterpriseInfoaxon extended enterprise
Infoaxon extended enterprise
 
SIKM Boston - Making Secured Content Discoverable in SharePoint
SIKM Boston - Making Secured Content Discoverable in SharePointSIKM Boston - Making Secured Content Discoverable in SharePoint
SIKM Boston - Making Secured Content Discoverable in SharePoint
 
The Untethered Enterprise - Synchronizing Content Across Multiple Storage Pla...
The Untethered Enterprise - Synchronizing Content Across Multiple Storage Pla...The Untethered Enterprise - Synchronizing Content Across Multiple Storage Pla...
The Untethered Enterprise - Synchronizing Content Across Multiple Storage Pla...
 
Best practices for security and governance in share point 2013 published
Best practices for security and governance in share point 2013   publishedBest practices for security and governance in share point 2013   published
Best practices for security and governance in share point 2013 published
 
March 2023 CIAOPS Need to Know Webinar
March 2023 CIAOPS Need to Know WebinarMarch 2023 CIAOPS Need to Know Webinar
March 2023 CIAOPS Need to Know Webinar
 
Enterprise File Synchronization and Sharing - Biscom Verosync
Enterprise File Synchronization and Sharing - Biscom VerosyncEnterprise File Synchronization and Sharing - Biscom Verosync
Enterprise File Synchronization and Sharing - Biscom Verosync
 
Integrating and positioning IBM Connections in an existing information manage...
Integrating and positioning IBM Connections in an existing information manage...Integrating and positioning IBM Connections in an existing information manage...
Integrating and positioning IBM Connections in an existing information manage...
 
5 Reason – To Use Seclore for Microsoft Teams
5 Reason – To Use Seclore for Microsoft Teams5 Reason – To Use Seclore for Microsoft Teams
5 Reason – To Use Seclore for Microsoft Teams
 
File Security in Microsoft SharePoint and OneDrive
File Security in Microsoft SharePoint and OneDriveFile Security in Microsoft SharePoint and OneDrive
File Security in Microsoft SharePoint and OneDrive
 
Deploying & Managing OneDrive
Deploying & Managing OneDriveDeploying & Managing OneDrive
Deploying & Managing OneDrive
 
Working securely with Microsoft Teams - Techorama 2021
Working securely with Microsoft Teams - Techorama 2021Working securely with Microsoft Teams - Techorama 2021
Working securely with Microsoft Teams - Techorama 2021
 
Community IT innovators Webinar - Taking another look at SharePoint
Community IT innovators Webinar - Taking another look at SharePointCommunity IT innovators Webinar - Taking another look at SharePoint
Community IT innovators Webinar - Taking another look at SharePoint
 
CloudStorage_M.A.Acar
CloudStorage_M.A.AcarCloudStorage_M.A.Acar
CloudStorage_M.A.Acar
 

Recently uploaded

Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 

Recently uploaded (20)

Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 

Seclore File Secure Sharepoint Walkthrough

  • 1. Seclore Filesecure SharePOINT Connector Enhancing security of MS SharePOINT
  • 2. Contents • Constraints with MS SharePoint • The Solution .. • What is Seclore FileSecure • Seclore FileSecure connector for MS SharePoint • Policy definition • Assigning policies to Sharepoint folders • Uploading documents • Downloading a file from Sharepoint folder • Accessing a protected file • Audit trails • About Seclore
  • 3. Sharepoint and security A Process Flow of Product Plan User User Sharepoint Edited Copied Printed Un-protected File Viewed Distributed Sharepoint Sharepoint security is not persistent . Once the file is accessed by downloaded locally, it can be edited, copied & users distributed.
  • 4. Contents • Constraints with MS SharePoint • The Solution .. • What is Seclore FileSecure • Seclore FileSecure connector for MS SharePoint • Policy definition • Assigning policies to Sharepoint folders • Uploading documents • Downloading a file from Sharepoint folder • Accessing a protected file • Audit trails • About Seclore
  • 5. Seclore FileSecure Seclore FileSecure allow enterprises to define, implement & audit information usage “policies”. A “policy” defines : • WHO can use the information People & groups within and outside of the organization can be defined as rightful users of the information • WHAT can each person do Individual actions like reading, editing, printing, distributing, copy-pasting, screen grabbing etc. can be controlled • WHEN can he use it Information usage can be time based e.g. can only be used by Mr. A till 28th Sept OR only for the 2 days • WHERE can he use it from Information can be linked to locations e.g. only 3rd floor office by private/public IP addresses
  • 6. Seclore FileSecure • Policies are – Persistent: Implemented on information and all its copies wherever it is transmitted or stored – Dynamic: Policies can be changed after distributing information without having access to or redistributing the information • Policies can be attached to information on – Creation – Placement in a certain location e.g. shared folder – Attachment to email – Uploading to a document management / ECM system – …
  • 7. Contents • Constraints with MS SharePoint • The Solution .. • What is Seclore FileSecure • Seclore FileSecure connector for MS SharePoint • Policy definition • Assigning policies to Sharepoint folders • Uploading documents • Downloading a file from Sharepoint folder • Accessing a protected file • Audit trails • About Seclore
  • 8. Seclore FileSecure Enabled Sharepoint A Process Flow of Product SharePoint + Seclore Plan User User FileSecure Edited Copied Printed Protected File Viewed Distributed Sharepoint Files copied out of “Sharepoint Folder” are persistently accessed by protected. Rights to edit, copy, print and distribute are users restricted based on Seclore FileSecure policies
  • 9. Contents • Constraints with MS SharePoint • The Solution .. • What is Seclore FileSecure • Seclore FileSecure connector for MS SharePoint • Policy definition • Assigning policies to Sharepoint folders • Uploading documents • Downloading a file from Sharepoint folder • Accessing a protected file • Audit trails • About Seclore
  • 10. Policy definition–WHO, WHAT Policy People / groups, within / outside the enterprise can be Admin dis-allowed to edit, print, copy, forward etc. via a policy 10
  • 11. Policy definition–WHEN, WHERE A policy can expire information beyond a date / Policy timespan and also restrict its usage to certain Admin 11 computers / networks
  • 12. Contents • Constraints with MS SharePoint • The Solution .. • What is Seclore FileSecure • Seclore FileSecure connector for MS SharePoint • Policy definition • Assigning policies to Sharepoint folders • Uploading documents • Downloading a file from Sharepoint folder • Accessing a protected file • Audit trails • About Seclore
  • 13. Applying Policies… Sharepoint Policies can be applied to folders by the Sharepoint Admin admin. The admin chooses the folder … 13
  • 14. …Applying Policies Sharepoint Policies are applied… Admin 14
  • 15. Contents • Constraints with MS SharePoint • The Solution .. • What is Seclore FileSecure • Seclore FileSecure connector for MS SharePoint • Policy definition • Assigning policies to Sharepoint folders • Uploading documents • Downloading a file from Sharepoint folder • Accessing a protected file • Audit trails • About Seclore 15
  • 16. Upload document… Sharepoint Upload document Admin 16
  • 17. …Upload document Sharepoint Upload document Admin 17
  • 18. Document is uploaded Sharepoint Document is uploaded Admin 18
  • 19. Contents • Constraints with MS SharePoint • The Solution .. • What is Seclore FileSecure • Seclore FileSecure connector for MS SharePoint • Policy definition • Assigning policies to Sharepoint folders • Uploading documents • Downloading a file from Sharepoint folder • Accessing a protected file • Audit trails • About Seclore
  • 20. Download document from Sharepoint… Once the user’s downloads the document from Seclore User’s FileSecure policy protected Sharepoint folder the file Computer 20 gets instantly protected
  • 21. …Download document from Sharepoint Downloaded document from Sharepoint Notice the red lock User’s …the file is instantly protected Computer 21
  • 22. Contents • Constraints with MS SharePoint • The Solution .. • What is Seclore FileSecure • Seclore FileSecure connector for MS SharePoint • Policy definition • Assigning policies to Sharepoint folders • Uploading documents • Downloading a file from Sharepoint folder • Accessing a protected file • Audit trails • About Seclore
  • 23. Rights display User’s On clicking a rights display makes the recipient Computer explicitly aware of his rights to the document 23
  • 24. Unauthorized print User’s Unauthorized activities like attempts to print … Computer 24
  • 25. Unauthorized print User’s … are disallowed Computer 25
  • 26. Unauthorized copy User’s Attempts to copy parts / whole of the document … Computer 26
  • 27. Unauthorized copy User’s … are disallowed Computer 27
  • 28. Unauthorized screen grab Screen capture by the Prt Scr key, screen grabbing tools User’s like Camtasia and screen sharing tools like Webex is Computer 28 blocked
  • 29. Contents • Constraints with MS SharePoint • The Solution .. • What is Seclore FileSecure • Seclore FileSecure connector for MS SharePoint • Policy definition • Assigning policies to Sharepoint folders • Uploading documents • Downloading a file from Sharepoint folder • Accessing a protected file • Audit trails • About Seclore
  • 30. Information audit The audit captures the WHO, WHAT, WHEN and WHERE User’s of the access attempt. Authorized and unauthorized Computer 30 attempts are captured and reported
  • 31. Contents • The Problem with MS SharePoint • The Solution .. • What is Seclore FileSecure • What is Seclore FileSecure enabled – MS SharePoint • Policy definition • Assigning policies to Sharepoint folders • Uploading documents • Downloading a file from Sharepoint folder • Accessing a protected file • Audit trails • About Seclore
  • 32. Corporate Background … “Seclore is a high growth software product company. Seclore’s technology helps mitigate the risks arising out of information breaches whilst enhancing collaboration” 6 years old, Headquartered in Mumbai, India Promoted by IIT Bombay under the SINE program - www.sineiitb.org Geographical and customer presence in Middle East, ASEAN, SAARC & Europe Offerings focused on Information Rights Management and Secure Outsourcing Stake holders including IIT Bombay – www.iitb.ac.in ICICI Bank – www.icicibank.com Ventureast – www.ventureast.net Technology and service differentiators focusing on minimally intrusive technology, value based pricing and usage without training
  • 33. About … Value to customers Security without compromising on collaboration Customers across ….Diversified business groups ….Large financial services groups ….Engineering and manufacturing organizations ….Defence, Software, BPO, Consulting, Services, ….
  • 34. What customers say about us … “We chose Seclore FileSecure due to the flexibility provided by Seclore in terms of solution capabilities and customization. Implementation of Seclore FileSecure has reduced the exposure of critical data for potential misuse or frauds. The business benefits are tremendous.” - Murli Nambiar, Head of Information Security "Financial services companies like banks, insurance carriers & broking are ‘opening up’ their information systems and processes for participation by customers, partners and vendors. This of course brings in a lot of value chain integration and lowers costs but comes with information security needs which cannot be solved by present day systems. Seclore’s technology for securing documents as they flow within and outside enterprises as well as securing data shared with outsourcing partners is extremely relevant. - C N Ram. Group CIO, Essar group
  • 35. What industry experts say … Seclore’s approach is different in that they not mandatory rely on such plug-ins but mainly act “below” the application. The client component (which is required to access protected, e.g. encrypted, documents) tries to analyze the activities off the application like access to the file system. One impact of that approach is that a document might be opened with different applications supporting the specific document format. - Martin Kuppinger, One of the fore-most information security analysts “Information breaches normally result in intellectual property violation which is a serious problem affecting industry today. Seclore’s combination of preventive and corrective methods of handling information breaches is invaluable to any industry” - Haigreve Khaitan (Managing partner – Khaitan and Co) “Collaboration, security and privacy appear as mutually conflicting goals with most present day technologies. Seclore has resolved this conflict in a very elegant manner with its technology.” - Animesh Parihar (Global Delivery Head – SAP)
  • 36. Awards and recognition … Deloitte Technology Fast 50 is a ranking compiled every year based on percentage of growth of fiscal year revenue over three years. The companies must also fulfil other criterion of technology orientation. ‘Hidden Gems’ 2010 by Kuppinger Cole, Europe’s leading information security analyst firm is a report which lists vendors, which have a significantly differentiated offering and are market leaders in a particular segment.
  • 37. … Awards and recognition The TR35 award is for innovators whose inventions and research, Massachusetts Institute of Technology (MIT) finds exciting. Technology Review, owned and published by MIT, is the world’s oldest technology magazine. “Innovations – ideas in practice” is an annual event honoring researchers and innovators for creative and innovative work in the sphere of science and technology. The innovation needs to have a high degree of practical relevance to change everyday life.
  • 38. More Info? www.seclore.com +91-22-4015-5252