1 / 2

Seclore Data-Centric Security Platform

Increase the value of your Data-Centric Security investments with Seclore Unified Data Policy Manager. For more details, visit https://www.seclore.com/ ttttttttttttttttttttt

Télécharger la présentation

Seclore Data-Centric Security Platform

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Seclore Data-Centric Security Platform Synchronize your Data-Centric Security Solutions for Stronger Self-Defense Many organizations are looking at how to build a Data-Centric Security infrastructure to efficiently eliminate security gaps, especially in the light of new regulations. New regulations such as GDPR, NIST, etc., require sensitive data to remain protected whether the data is in your custody or in the custody of an authorized third-party. Unfortunately, many current Data- Centric Security tools work in isolation (e.g., Data Loss Prevention, Rights Management and Data Classification) and only partially meet these security regulations requirements. While bringing together multiple best- of-breed solutions is ideal, it is difficult and costly for organizations to integrate them into a cohesive and automated infrastructure. As well, in an ideal state, organizations should be able to leverage existing infrastructure, such as Content Management, Email and File-sharing solutions to automatically apply Data- Centric Security to documents as they are downloaded and shared. the highest level of security to sensitive data through automation. integration provides the flexibility to leverage existing best-of-breed solutions while allowing you to future proof your infrastructure for new, innovative Data- Centric Security technologies. A Comprehensive, Flexible Approach to Data-Centric Security A comprehensive Data-Centric Security strategy includes four basic components: Discover, Identify, Protect and Analyze. The tools to perform these functions include Data Loss Prevention (DLP), Data Classification, Rights Management (RM) and Security Information and Event Management (SIEM) systems. Ideally, you want the flexibility to select best-of-breed solutions, however, they work in silos and the integration costs along with policy management challenges and impacts on user productivity, are problematic. Leverage Existing Enterprise Systems to Automate Protection and Tracking The Seclore Unified Policy Manager also makes it easy to add Data- Centric Security to existing content management, email and file sharing systems through a library of connectors and integrations. Through these integrations, granular usage controls are automatically applied to documents DATA-CENTRICSECURITYSOLUTIONS Seclore Data Classification Seclore Rights Management Seamless Integration of Best-Of Breed Technologies The Seclore Unified Policy Manager’s open architecture, seamlessly integrates DLP, Data Classification, Rights Management and SIEM systems to build an iron-clad Data-Centric Security framework that leverages metadata to automate processes between the systems. This tight ConnectorsConnectors ENTERPRISESYSTEMS Encryption&KeyMgmtUsageData UNIFIED POLICY MANAGER ConnectorsConnectors Discovery (DLP, CASB, etc.) Seclore Dashboard IdentityManagement PolicyManagement Data The Key to Orchestration: Seclore Unified Policy Manager At the core of the Seclore Data-Centric Security Platform is the Seclore Unified Policy Manager. It’s seamless integration, synchronization and automation of leading Data-Centric Security tools into a cohesive framework eases the administrative overhead and maximizes productivity while ensuring Analytics Repositories (ERP, ECM, etc.) Messaging & Collaboration Security & IAM Endpoint Security Selcore Unified Policy Manager’s capability enables you to map and synchronize Data-Centric Security tools by pulling the policies together in one cohesive infrastructure.

  2. as they are downloaded and shared, ensuring sensitive information is consistently protected and tracked. policies from other systems (e.g. ECM, ERP, Data Classification, DLP, EFSS) to the granular usage controls in the Seclore Rights Management solution. unauthorized attempts are automatically tracked and collected by the Seclore Unified Policy Manager. Alerts on document usage can be sent to the document owner and insights are available on the Seclore Dashboard for easy viewing and analysis. In addition, the Seclore Unified Policy Manager can export document usage activity logs to a SIEM system. The aggregate of the information provides important forensic and usage trends, as well as streamlined audit and compliance reporting. Map Policies and Identities From Third-Party Systems for Easy Implementation Two powerful capabilities, Identity and Policy Federation, are also part of the Seclore Unified Policy Manager. Identity Federation makes it easy for internal and external users to authenticate to ensure adoption and use. Policy Federation reduces administration costs and sets the stage for automation by mapping Identify Suspicious Activities Through Tracking and Reporting Seclore Unified Policy Manager tracks and delivers intelligent insights into how sensitive data is being used, whether it resides in your vendor or partner networks, public networks, the cloud or on mobile devices. As activity is performed on a protected document, both authorized actions and Data-Centric Security Integration Use Case Examples Here is how various Data-Centric Security tools can work together using the Seclore Data-Centric Security Platform to better address your security and regulatory compliance challenges: Technologies Sample Data-Centric Security Use Case Benefit Before: Sensitive data is discovered by the DLP system. The file is blocked from being sent out and requires an individual to review it. After: Based on the DLP discovery rules, Seclore Unified Policy Manager automatically applies the relevant Rights Management policy to the discovered document so that the document can be sent out protected and without human intervention. Ensures efficient flow of information while removing the security risk. Improves the efficiency of security operations to free up valuable resources. Data Loss Prevention + Rights Management Before: A document is classified as “Confidential” by a user and needs to be shared with an authorized individual external to the company, however the external user is not blocked from misuse of the information. After: The Seclore Unified Policy Manager can automatically attach granular Rights Management usage controls to the document based on the Classification label, giving the company on-going control over the document usage (forward, print, etc.). Automatically adds granular protection to the document to match the level of the sensitivity of the document to ensure secure external collaboration, tracking, and revocation of document use. Data Classification + Rights Management Before: Sometimes DLP rules can be triggered by innocent data, hindering productivity and collaboration. After: DLP policies are mapped to Rights Management usage policies that persistently control and track what users can do with the document. Usage logs are exported to a SIEM system to streamline audit and compliance reporting. reporting and identify abnormalities. Increases productivity and security, reduces user friction, simplifies compliance reporting, and provides proactive insights on problematic behavior. Data Loss Prevention + Rights Management + SIEM USA – West Coast Headquarters 691 S. Milpitas Blvd Suite 217 Milpitas, CA 9035 1-844-473-2567 Europe Seclore GmbH Marie-Curie-Straße 8 D-79539 Lörrach Germany +49 151 1918 5673 India Excom House Ground Floor Plot No. 7 & 8, Off. Saki Vihar Road Sakinaka, Mumbai 400 072 +91 22 6130 4200 +91 22 6143 4800 Saudi Arabia 5th Floor, Altamyoz Tower Olaya Street P.O. Box. 8374 Riyadh 11482 +966-11-212-1346 +966-504-339-765 Singapore Seclore Asia Pte. Ltd. AXA Tower, 8 Shenton Way Level 34-01 Singapore – 068811 +65 8292 1930 +65 9180 2700 UAE Seclore Technologies FZ-LLC Executive Office 14, DIC Building 1 FirstSteps@DIC Dubai Internet City PO Box 73030 Dubai, UAE +9714-440-1348 +97150-909-5650 +97155-792-3262 USA – East Coast Graybar Building 420 Lexington Avenue Suite 300 New York, NY 10170 Securing Information Wherever it Goes © 2019 Seclore, Inc. All Rights Reserved.

More Related