Seclore FileSecure. Securing Information Wherever it Goes. Extending Information Security Beyond Your Border



Similar documents
Information Rights Management for Banking Seclore FileSecure Provides Intelligent Document & Data Protection that Extends Beyond Enterprise Borders

Enterprise Rights Management: Protection beyond the perimeter

White Paper. Anywhere, Any Device File Access with IT in Control. Enterprise File Serving 2.0

White paper: Information Rights Management for IBM FileNet. Page 1

How To Secure Shareware Kiteworks By Accellion

Secure any data, anywhere. The Vera security architecture

Veritas Enterprise Vault for Microsoft Exchange Server

Symantec Enterprise Vault for Microsoft Exchange

Symantec Enterprise Vault for Microsoft Exchange

Data Sheet: Archiving Symantec Enterprise Vault for Microsoft Exchange Store, Manage, and Discover Critical Business Information

Top. Reasons Legal Firms Select kiteworks by Accellion

How To Support Bring Your Own Device (Byod)

ios 9.3 Enterprise Solution Brief MobileIron and ios 9.3

EMC Documentum Information Rights Management

Secure Cross Border File Protection & Sharing for Enterprise Product Brief CRYPTOMILL INC

Top. Enterprise Reasons to Select kiteworks by Accellion

Symantec Enterprise Vault for Microsoft Exchange Server

Ensuring the security of your mobile business intelligence

MANAGEMENT SOLUTIONS SAFEGUARD BUSINESS CONTINUITY AND PRODUCTIVITY WITH MIMECAST

Kelvin Wee CISA, CISM, CISSP Principal Consultant (DLP Specialist) Asia Pacific and Japan

Fasoo Data Security Framework

SafeNet Data Encryption and Control. Securing data over its lifecycle, wherever it resides from the data center to endpoints and into the cloud

SafeNet Data Encryption and Control. Securing data over its lifecycle, wherever it resides from the data center to endpoints and into the cloud

DATA BREACH RISK INTELLIGENCE FOR HIGHER ED. Financial prioritization of data breach risk in the language of the C-suite

Enterprise Mobility Services

Axway SecureTransport Ad-hoc File Transfer Service

VAULTIVE & MICROSOFT: COMPLEMENTARY ENCRYPTION SOLUTIONS. White Paper

Cloud Backup and Recovery for Endpoint Devices

E-Guide SIX ENTERPRISE CLOUD STORAGE AND FILE-SHARING SERVICES TO CONSIDER

A Buyer's Guide to Data Loss Protection Solutions

Top. Reasons Federal Government Agencies Select kiteworks by Accellion

BlackBerry 10.3 Work and Personal Corporate

Vodafone Global Enterprise Deploy the Apple iphone across your Enterprise with confidence

Total Enterprise Mobility

ShareFile Enterprise. Jaan Feldmann Sergei Sokolov

Solve the Dropbox Problem with Enterprise Content Connectors. Whitepaper Solve the Dropbox Problem with Enterprise Content Connectors

Workspace Manager 2014 Module Comparison Chart

GlobalProtect Overview

IBM Data Security Services for endpoint data protection endpoint data loss prevention solution

Security Overview Enterprise-Class Secure Mobile File Sharing

Mimecast Large File Send

Data Sheet: Archiving Symantec Enterprise Vault for Microsoft Exchange Store, Manage, and Discover Critical Business Information

Symantec Encryption Solutions for , Powered by PGP Technology

IBM Data Security Services for endpoint data protection endpoint data loss prevention solution

management solutions

Secure Mobile Solutions

ShareSync from LR Associates Inc. A business-grade file sync and share service that meets the needs of BOTH users and administrators.

Athena Mobile Device Management from Symantec

Storgrid EFS Access all of your business information securely from any device

IONU PRO Product Overview

Andrej Zdravkovic Regional Vice President, Platform Solutions Intellinet

Kony Mobile Application Management (MAM)

Egnyte Cloud File Server. White Paper

Powered by. FSS Buyer s Guide Why a File Sync & Sharing Solution is Critical for Your Business

Where is your Corporate Data Going? 5 tips for selecting an enterprise-grade file sharing solution.

Symantec App Center. Mobile Application Management and Protection. Data Sheet: Mobile Security and Management

Mobilize your Enterprise in 60 Minutes!

Colligo Briefcase Enterprise. Administrator s Guide

McAfee Data Loss Prevention Endpoint

Business Case for Voltage Secur Mobile Edition

Windows Server 2012 R2 The Essentials Experience

Transporter from Connected Data Date: February 2015 Author: Kerry Dolan, Lab Analyst and Vinny Choinski, Sr. Lab Analyst

OWA vs. MDM. Once important area to consider is the impact on security and compliance policies by users bringing their own devices (BYOD) to work.

GETS AIRWATCH MDM HANDBOOK

Data Loss Prevention & Mobile Device Management

Secure Data Sharing in the Enterprise

Cloud Computing Security: Public vs. Private Cloud Computing

How To Manage A Corporate Device Ownership (Byod) On A Corporate Network (For Employees) On An Iphone Or Ipad Or Ipa (For Non-Usenet) On Your Personal Device

Fileweave. Large File Transfer. Seamless Microsoft Outlook add-in. Simple drag and drop functionality

Laserfiche for Federal Government MEET YOUR AGENCY S MISSION

Safeguard Protected Health Information With Citrix ShareFile

Securing Office 365 with MobileIron

Secure iphone Access to Corporate Web Applications

itg CloudBase is a suite of fully managed Hybrid & Private Cloud Services ready to support your business onwards and upwards into the future.

MaaSter Microsoft Ecosystem Management with MaaS360. Chuck Brown Jimmy Tsang

Getting Started with the iscan Online Data Breach Risk Intelligence Platform

Egress Switch Reader. User Guide 2.3

Data Sheet: Archiving Symantec Enterprise Vault Store, Manage, and Discover Critical Business Information

WatchDox Administrator's Guide. Application Version 3.7.5

EXECUTIVE SUMMARY Cloud Backup for Endpoint Devices

Vs Encryption Suites

SureDrop Secure collaboration. Without compromise.

Storage Made Easy. Cloud File Server Overview

Adobe Developer Workshop Series

APPENDIX B1 - FUNCTIONALITY AND INTEGRATION REQUIREMENTS RESPONSE FORM FOR A COUNTY HOSTED SOLUTION

An Enterprise Approach to Mobile File Access and Sharing

Problem. Solution. Quatrix is professional, secure and easy to use file sharing.

Active Directory Rights Management Services integration (AD RMS)

Mac OS X User Manual Version 2.0

InstaFile. Complete Document management System

Board Portal Essentials for Community Banking

Transcription:

Seclore FileSecure Extending Information Security Beyond Your Border Securing Information Wherever it Goes When your information crosses your border, why shouldn't your security? To effectively function in the business world today, organizations need to share files beyond their perimeter. Currently, the majority of that information is traversing departments and enterprise boundaries without effective controls. Whether it is sharing information with third party partners and outsourcing vendors, utilizing Cloud services such as Dropbox to share files, or downloading files onto laptops and other mobile devices, organizations are losing control over sensitive information. So, how can you encourage external collaboration, safely embrace the use of mobile devices, and leverage cost-saving measures such as the cloud and outsourcing without sacrificing security?

SecloreFileSecure - Extending Information Security Beyond Your Border Easily Define, Enforce, and Remotely Control Granular Usage Polices Seclore FileSecure protects sensitive information regardless of device or location. Whether a file is on a server, in an email, on a mobile device, or copied to a USB memory stick unintentionally left behind in an airport, unauthorized users will not be able to access the information. Since usage policies stay with the file, Seclore FileSecure enables organizations to securely adopt mobile devices, Cloud Computing and external collaboration. You can centrally define, attach, enforce, modify, and audit granular file usage permissions including: WHO can access the file? User or groups within or outside the organization. WHAT can they do with it? View, edit, print, copy content, take screen grabs, work offline. WHEN can they do it? Automatic file expiry, date and time ranges, number of days from first access. WHERE can they do it? Specific computers or devices, specific IP address. Granular Control: Easily define and attach granular information-centric usage controls to a folder, file or documen Secure Information Wherever It Goes The information usage policies can be easily defined and modified by the document owner or administrator at any time, even after information has been distributed beyond the perimeter. The ability to remotely manage access policies means you can instantly block or modify access to a file as business relationships change or devices are lost. Over 60 different file formats can be "Seclored" including files created by Microsoft Office, Open Office, Adobe, Photos, AutoCAD, and text-based file formats. Here are some of the ways the access and usage policies can be attached to a file: Seclore FileSecure email security options in the Microsoft Outlook Ribbon When a file is closed or saved When a file is placed in specially configured hot folder When a file is downloaded from a document management system When the file is attached to an email When it leaves the network When the file is created based on user-defined prompts When discovered by a DLP (Data Loss Prevention) system

SecloreFileSecure - Extending Information Security Beyond Your Border How It Works Here is how Seclore FileSecure works to protect information. First, you protect a file on your computer. While we are depicting the manual option here, other automated protection methods are also available. Then you can share the protected file any way you like: email, file-sharing service, USB drives, or using a CD or DVD. The security is permanently enforced, regardless of what device or platform the recipient uses to access the file. Easily Retrieve Protected Documents On-Demand Viewing "Difficulty in accessing protected documents can bring an entire rights management deployment down to its knees. A welldesigned rights management system should maintain security without hindering the ability of recipients to access protected content. In addition to the full-fledged client that offers all capabilities, Seclore FileSecure also provides a lighter Windows client that can be installed without administrative privileges. Native apps for Mac, ios, and Android are also available. For completely agentless access to protected content, recipients can access files in their browsers using FileSecure Lite Online. " The FileSecure Lite Family: FileSecure Lite for Windows: A light-weight agent that can be installed without any administrative privileges FileSecure Lite for Mac: A native Mac client compatible with OS X Yosemite FileSecure Lite for ios and Android: Apps for ios and Android devices FileSecure Lite Online: A secure online portal for accessing protected files in any browser FileSecure Lite in the itunes App Store Protected content displayed with a watermark List of previously viewed files

SecloreFileSecure - Extending Information Security Beyond Your Border Simplify Audit and Compliance Reporting Seclore FileSecure features automatic tracking and monitoring of files access and usage wherever they travel or reside. Ready access to consolidated data about who viewed the file, what they did with it, what device was used to access the file, and when, makes it easy to address regulatory compliance and audit reporting requirements. Audit Usage of Information: WHO accessed the file, WHAT did the user do, WHEN & WHERE is all captured from distributed usage environments and reported centrally Extend the Security of ECM, DLP, ERP, CRM, Mail, and Messaging Solutions Seclore FileSecure offers a rich suite of pre-built connectors that enable organizations to persistently control over documents and data as they are downloaded from an ECM or ERP system, discovered by a DLP system, or attached to an email. Pre-built connectors that are available for Seclore FileSecure include: In addition to the pre-built connectors, APIs are also available for easy integration with other core systems including custom and inhouse applications. Enterprise Content Management (ECM) Systems Data-Loss Prevention (DLP) Systems ERP, Business Intelligence, and Email Systems GTB Technologies

AFCONS Gnosis is like a sanctum within the organisation and whatever gets into the Knowledge Management portal is considered confidential. People have spent years to build this technology footprint and it is somewhat unique to our organisation. To protect this intellectual property, we needed a tool that would facilitate us in giving rights to specific users something that would allow them to view the documents and not alter, download or kill them. Seclore became useful because once we encrypted the document, it could be decrypted only by an authorised user. And this functionality was extremely useful for us. EVP, (Information & Process Management Group), Afcons The expiry date feature is very exciting, especially when I share documents with outsiders like vendors. The documents automatically lock themselves after a certain date. Head of IT, L&T Among all the evaluated solutions, Seclore FileSecure provided us with maximum flexibility and integration capabilities. About Seclore Seclore offers an innovative solution, Seclore FileSecure, which enables organizations to control access to information wherever it goes, both within and outside of the organization s boundaries. The ability to remotely control who can view, edit, copy, and distribute unstructured information empowers organizations to embrace mobility, Cloud, and external collaboration with confidence. The most integrationfriendly solution on the market, Seclore FileSecure extends and enhances the security of information detected and downloaded from DLP, ECM, ERP systems and attached to Mail/Messaging solutions through pre-built connectors. With nearly 4 million users across 420 companies in 22 countries and rapidly growing, Seclore is helping organizations achieve their security, privacy and compliance objectives. Senior Manager Asian Paints In the world of blurring organizational boundaries and dependence on business providers to process business information, it is imperative for an organisation to ensure that their customer data is safe. Addressing this issue, Seclore FileSecure provided a comprehensive solution to all the information security needs. The software is engineered in a way that it focuses on the solution to deliver business value and not only the technology. CISO, HDFC Life

Contact Us Ready to start securing your information wherever it goes? Call us at: +1 415 830 6240 Email us at: info@seclore.com www.seclore.com info@seclore.com blog.seclore.com Securing Information Wherever it Goes USA West Coast 800 West El Camino Real Suite 180, Mountain View California 94040 +1 415 830 6240 East Coast Graybar Building 420 Lexington Avenue Suite 300 New York City, NY 10170 INDIA Mumbai Corporate Office Excom House Ground Floor, Plot No. 7 & 8 Off. Saki Vihar Road Sakinaka, Mumbai 400 072 +91 22 6130 4200 +91 22 6143 4800 Bengaluru Regional Office 5th Floor, Vakil Square, Bannerghatta Road Opp. Jayadeva Hospital. Bengaluru 560 076 +91 97425 11179 Gurgaon Regional Office OCUS Technopolis, Golf Course Road Sector 54, Gurgaon - 122 001 +91 0124 4626 161