1 / 33

Securing Information Wherever it Goes

Securing Information Wherever it Goes. Trends in Enterprise Digital Rights Management. The Headlines Say it All. Mining company.com. The Bank of England inadvertently sent highly sensitive financial information the wrong email address . March, 2015.

pepper
Télécharger la présentation

Securing Information Wherever it Goes

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Securing Information Wherever it Goes Trends in Enterprise Digital Rights Management

  2. The Headlines Say it All Mining company.com TheBank of Englandinadvertently sent highly sensitive financial information the wrong email address. March, 2015 Liebherr Lawsuit Filed Against Employees Over Stolen Truck Design Documents. May 2015 China's J-20 and J-31 stealth fighters based on F-35 documents stolen from Lockheed Martin. January, 2015 Ex-Nike designers, destined for Adidas, stole 'treasure trove of Nike product designs.' December, 2014 Lawsuit contends that partner, Fisker, fraudulently agreed to take on Tesla’s design contract to gain access to confidential design information. January 2015 JP Morgan Chase acknowledged a massive data breach that affected 76 million households and 7 million small businesses. January, 2015 Seclore Company Confidential

  3. Enterprise Digital Rights Management – 5 Years Ago • Challenges for large scale rollout • Limitations on supported formats/ applications/OS • Cumbersome policy definition and administration • Friction for external users – agents /authentication • Stand-alone and manual protection; Integration with other enterprise IT systems limited Seclore Company Confidential

  4. Enterprirse Digital Rights Management Today with Seclore • File format/application independence • Application wrapping infrastructure reduces dependency on format / application and reduces overall R&D costs • Policy federation • Federation of existing access policies removes the need to define and manage new security policies • External user friendliness • No prerequisite for agents • Federation capabilities for internal and external identity sources • Easy on boarding for external users • Automated Protection via Integration • Integration with existing IT infrastructure reduces dependency on users to protect files Seclore Company Confidential

  5. Traditional Security Approach: Protect the Perimeter Email SSL Anti-virus Devices Networks UTM Disk Encryption Anti-spyware People Applications Application Firewall DLP PIM Seclore Company Confidential

  6. Unprotected IP is Flowing Outside of Your Organization How many of your files are being sent to third parties via email or other file-sharing services? Seclore Company Confidential

  7. What and Where is the Problem? FILE-SHARE CONTRACTOR SUPPLIER EMAIL COMPETITOR PRODUCT MGR PROSPECT GOOGLE DRIVE BLACK MARKET ENGINEER PROTECTED UNPROTECTED & UNTRACKABLE Seclore Company Confidential

  8. Where Is Your Company Still at Risk? Price Lists Sent to Distributors Bids Sent to Prospects Financial Reports Sent to Business Units M & A and Board Documents Shared with Advisors Employee Data Shared Across Business Units Roadmaps Shared With Prospects Content Shared from Knowledgebase IP/Technical Specifications Shared with Suppliers and Contractors QA Reports Shared with Suppliers Seclore Company Confidential

  9. What’s the Impact? Customer Information is Stolen Customer Base Decreases Revenue Decreases: 5%?...10%?...20%? Market Share Decreases: 5%?...8%?...10%? Market Value Decreases: 2%?...5%?...10%? Can your company afford NOT to protect customer data? Seclore Company Confidential

  10. What’s the Impact? Intellectual Property Gets Into Competitors’ Hands Competitive Advantage Decreases Revenue Decreases: 5%?...10%?...20%? Market Share Decreases: 5%?...8%?...10%? Market Value Decreases: 2%?...5%?...10%? Can your company afford NOT to protect its IP? Seclore Company Confidential

  11. What’s the Impact? Employee Files Lost Legal Fees: $500K?...$1M?...$5M? Productivity Loss: 2%?...5%?...10%? Customer Loss: 1%?...2%? Market Value Loss: 2%?...4%? Can your company afford NOT to protect employee files? Seclore Company Confidential

  12. What’s the Impact? Price List Sent to Wrong Distributor Forced to Match Discount Revenue Decreases: 0.25%?...0.5%?...1%? Market Value Decreases: 0.5%?...0.8%? Can your company afford price lists going to the wrong vendor? Seclore Company Confidential

  13. Seclore Protects Your Files Wherever They Go No matter how your files are shared, you have complete control of who accesses them and what rights they have. Seclore Company Confidential

  14. Utilize Any File-Sharing Technology Without Risk Protection endures with the file regardless of how it is shared or how it is accessed. Seclore Company Confidential

  15. Business Case - 1 Do you have confidential information which only a specific employee group, while in employment, should use? • Research data • Business plans • Forward-looking financial statements • Product documents • Internal quality reports

  16. Business Case - 2 Do you frequently establish temporary/project-based relationships with partners and contractors? Do you share confidential information with outsource vendors? • Mergers & Acquisitions (M & A) • Business Process Outsourcing • Checkbookprinting, Statement printing, Credit card printing Policy printing, Customer communication – Insurance • Recharge voucher printing - Telecom • Sub-Contracting • Manufacturing components of car or other products • Payroll processing

  17. Business Case - 3 Do you receive confidential information (and the associated liability) from customers ? • Personally Identifiable Information (PII) • Citizen information • Large project financing for banks • Vendor registration process for large corporations

  18. Business Case - 4 Do you generate revenue by providing reports & other information? • Subscribed reports • Paid research • Financial analysis • Industry specific research • Training/course materials

  19. Today’s Imperatives… Data needs to travel Need for External Collaboration Corporate boundaries are diminishing Your Confidential Information Often Travels Outside Your Network DOES YOUR SECURITY? Seclore Company Confidential

  20. Flexible, Granular Usage Policies WHO can access the file? • Permanence:Protection persists with the file forever • Remote Control: File rights can be changed from anywhere in the world • Audit Trail: All activities are tracked Specific Users/groups within and outside the organization WHAT rights do they have? View, edit, print, copy content, take screen grabs, work offline WHEN can they do it? Automatic file expiry, date and time ranges, number of days from first access WHERE can they do it? Specific computers, devices, IP addresses Seclore Company Confidential

  21. Easily Associate Rights with Files • Multiple methods for attaching rights to files • One-click to add protection as files are created or emailed • Automated when files are downloaded from exiting systems or placed in a specific folder Seclore Company Confidential

  22. One-Click Email Protection Seclore Company Confidential

  23. Easily On-Board New Users Seclore Company Confidential

  24. Other Capabilities That Simplify Adoption & Use • Automated Licensing: • Dynamically assigns a license to any user needing to protect a file • Eliminates manual licensing admin process • Ensures sensitive files can be protected without hindering productivity • On-Demand Access Request: • Occurs when a protected file is sent to a group and a recipient is not yet on-boarded • New recipient easily requests access • File owner approves & registers user with one click • One-Click Permission Modification: • Rapidly change permissions on previously protected files by clicking on the file Seclore Company Confidential

  25. Protect Standard Files with Full Rights (4 Ws) Able to protect 60+ file types with who, what, where, when coverage • PDF • Word • Excel • PowerPoint • Images • 2D AutoCAD • Text • And More….

  26. Any File Can Be Protected with 3 Ws • Ability to apply usage controls to any file including proprietary formats and industry-specific file types • Control who, where and when policies • Ensures more of an organization’s sensitive information is secure 3D CAD Multi-Media CATIA Pro/E Seclore Company Confidential

  27. Recipients Can Easily Access Protected Files • Seamless User Authentication • For internal users - integrate with AD and other IAM / SSO tools • For external users - utilize Okta, Ping, other ID methods or Seclore’s built-in identity service • Use Protected File in Native Application • File opens in native application – rights continue to control file usage (e.g. MS-Office, Acrobat Reader, AutoCAD, OpenOffice) • File extension is maintained Browser-Based Access No software download needed to access protected files Seclore Company Confidential

  28. Automatically Audits Usage of Information Automatically captures and consolidates file usage data from distributed environments: WHO accessed the file, WHAT the user did with the file, WHEN and from WHERE Seclore Company Confidential

  29. Automate Protection - Add Rights Management to Existing Systems with Pre-Built Connectors • Automatically attach policies to files as they are downloaded or viewed • Pre-built connectors for DLP, ERP, ECM, EFSS and more • Policy Federation: Leverage access policies already defined within existing systems Seclore Company Confidential

  30. Automate File Protection with Pre-Built Connectors Enterprise Content Management: IBM ECM IBM Case Management IBM Connections MS SharePoint NewgenOmnidocsEMC Documentum Data Loss Prevention: McAfee DLP Symantec DLP GTB DLP MyDLP Mail & Messaging: IBM Notes MS Exchange ERP: SAP ERP Enterprise File Sync and Share: Box EFSS Identity Federation Systems: SiteMinder Ping Tivoli Active Directory Seclore Company Confidential

  31. How Enterprise Digital Rights Management Works VIEW Corporate VPN Supplier Network Author Supplier VIEW ONLY RIGHTS Internet Reviewer VIEW & EDIT RIGHTS Contractor NO RIGHTS Content Manager SeclorePolicy Server Seclore Company Confidential

  32. Corporate Highlights • Focused on Information-Centric Security • High growth - 250,000,000 documents protected, 4,000,000 million users, 400 customers, 29 countries • Global presence – Mountain View, New York, Mumbai, London, Singapore, Dubai • 4 supported languages • 200+ employees Hidden Gems Award Seclore Company Confidential

  33. Thank You! www.seclore.com | info@seclore.com | http://blog.seclore.com Seclore Company Confidential

More Related