0% found this document useful (0 votes)
27 views

Seclore Presentation-Latest

Uploaded by

Daniyal Ba
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
27 views

Seclore Presentation-Latest

Uploaded by

Daniyal Ba
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 12

Seclore Data Centric Security

Mohamed Djenane, Senior Technology Consultant


[email protected]
Head Office in HQ California - San Jose

Dedicated to Digital Rights Management

Most comprehensive and Integrated DRM Solution

• File Encryption
• File Access Control
• File Activity Monitoring
• Email Protection/Encryption
• Document Dynamic watermark
SECLORE

2
Classification

• Tag and Classify Files, Documents, and email


• Visual Labeling
• Doesn’t secure files

DATA CENTRIC DLP


• Discover, Detect, and Stops files from leaving perimeter
SECURITY •

Overhead on IT administrators
Doesn’t help with securing external collaboration
FOUNDATION
PILLARS
DRM
• Protects files in transit, at rest, and at work
• Protects files wherever they travel
• Designed to augment & complement above solutions

© 2020 Seclore, Inc. Company Proprietary Information 3


Secure Collaboration Data Governance, Compliance,
(internal & External) Remote work force
Regulations

TYPICAL
CHALLENGES

© 2020 Seclore, Inc. Company Proprietary Information


Authentication

HOW IRM WORKS


Authorization

Encryption

© 2020 Seclore, Inc. Company Proprietary Information


Internal - Time Frame –

AD, LDAP, etc. i.e. 5 Days


WHO External – Specific Date and Time –
WHEN
can access can they
the file? 30th September, at 3:00 PM do it?
SIM

SECLORE
RIGHTS IP Based restriction –
Read. Edit.
MANAGEMENT Print. Copy.
Share. Offline. Local Network access only
Macros. Screenshot.
WHAT Etc. Device Based restriction – WHERE
rights do can they
they have? First device used do it?

© 2020 Seclore, Inc. Company Proprietary Information


REPEATED TEXT AND
LINES

BLENDED SOLID TEXT

DEFAULT INFO – USER


MAIL ID & NAME,
CLASSIFICATION,
CURRENT TIMESTAMP

© 2020 Seclore, Inc. Company Proprietary Information


SECLORE
DASHBOARD

Track who is doing Automatically track both Ideal for audits and
what on data authorized activities and regulatory compliance
wherever it travels unauthorized usage reporting
attempts
© 2020 Seclore, Inc. Company Proprietary Information 12
Classification Tools
(BoldonJames, Titus etc.)

ECM / DMS Systems


(SharePoint, IBM FileNet)

Email Automation
(MS Exchange, Seclore MTA)

Manual
(Right-click, Outlook, Client API)
INTEGRATION
Seclore
POINTS DLP / Discovery Tools
Data Centric
Security Platform

FileServer
(HotFolder Enterprise Mngr)

API
(ERP,Inc.
© 2020 Seclore, Legacy files)
Company Proprietary Information
Desktop Client
Windows & MAC
Clients

Internal Corporate
Network
Mobile Access

METHODS OF Android & iOS


Apps

CONSUMPTION
Clientless Access
Internet
Browser based
External Editor

© 2020 Seclore, Inc. Company Proprietary Information


SIM
(Repository to handle external IAM SYSTEMS
users)

AD SSO/PING 3rd Party

KEY MANAGEMENT

PolicyServer
(Central Repository of all HSM External Key Mngt.
Policies, Encryption Keys,
POLICY SERVER Activities etc.)
DATABASE
ARCHITECTURE Load Balancer /
Reverse Proxy
Stores all the Seclore data.
Policies, Encryption keys,
User activities etc.

ANALYTICS

Lite Online
(Browserbased Editor for
protected documents)
© 2020 Seclore, Inc. Company Proprietary Information
SIEM BI
Q&A

© 2020 Seclore, Inc. Company Proprietary Information 25

You might also like