Information Rights Management for Banking Seclore FileSecure Provides Intelligent Document & Data Protection that Extends Beyond Enterprise Borders



Similar documents
Seclore FileSecure. Securing Information Wherever it Goes. Extending Information Security Beyond Your Border

White paper: Information Rights Management for IBM FileNet. Page 1

Secure any data, anywhere. The Vera security architecture

SECURE FILE SHARING AND COLLABORATION: THE PATH TO INCREASED PRODUCTIVITY AND REDUCED RISK

SOOKASA WHITEPAPER CASB SECURITY OVERVIEW.

Enterprise Rights Management: Protection beyond the perimeter

Secure Document Sharing & Online Workspaces for Financial Institutions

Secure Data Sharing in the Enterprise

Estate Agents Authority

Cloud Backup and Recovery for Endpoint Devices

Fasoo Data Security Framework

Solving the Online File-Sharing Problem Replacing Rogue Tools with the Right Tools

Moving to the Cloud: What Every CIO Should Know

Security Architecture Whitepaper

Analyzing Security for Retailers An analysis of what retailers can do to improve their network security

The Challenge of Securing and Managing Data While Meeting Compliance

Oracle Documents Cloud Service. Secure Collaboration for the Digital Workplace

Mobilize SharePoint Securely: Top 5 Enterprise Requirements

Cloud Computing: Legal Risks and Best Practices

EXECUTIVE SUMMARY Cloud Backup for Endpoint Devices

Readiness Assessments: Vital to Secure Mobility

White Paper. Anywhere, Any Device File Access with IT in Control. Enterprise File Serving 2.0

SECURE YOUR DATA EXCHANGE WITH SAFE-T BOX

Enterprise Data Protection

How to Provide Secure Single Sign-On and Identity-Based Access Control for Cloud Applications

The BYOD Opportunity. Say Yes to Device Diversity and Enable New Ways to Drive Productivity WHITE PAPER

Where is your Corporate Data Going? 5 tips for selecting an enterprise-grade file sharing solution.

A Websense Research Brief Prevent Data Loss and Comply with Payment Card Industry Data Security Standards

Module 1: Facilitated e-learning

RFI Template for Enterprise MDM Solutions

Only 8% of corporate laptop data is actually backed up to corporate servers. Pixius Advantage Outsourcing Managed Services

Privacy in the Cloud Computing Era. A Microsoft Perspective

Classify, Protect, Audit: New Approach to SAP Data Security. Aparna Jue, SECUDE

Doing Business Faster with Secure File Sharing. A File Sharing Solution Buyer s Guide for Corporate IT

EMC Documentum Information Rights Management

Solve the Dropbox Problem with Enterprise Content Connectors. Whitepaper Solve the Dropbox Problem with Enterprise Content Connectors

Data Protection Act Bring your own device (BYOD)

Enabling Secure, Diverse Communications for B2B and B2C Organizations

Websense Data Security Suite and Cyber-Ark Inter-Business Vault. The Power of Integration

How To Implement Data Loss Prevention

The Impact of HIPAA and HITECH

Executive s Guide to Cloud Access Security Brokers

Data Loss Prevention Whitepaper. When Mobile Device Management Isn t Enough. Your Device Here. Good supports hundreds of devices.

TRITON AP-ENDPOINT STOP ADVANCED THREATS AND SECURE SENSITIVE DATA FOR ROAMING USERS

How To Secure Your Store Data With Fortinet

IBM Data Security Services for endpoint data protection endpoint data loss prevention solution

Compliance in 5 Steps

Teradata and Protegrity High-Value Protection for High-Value Data

DISCOVER, MONITOR AND PROTECT YOUR SENSITIVE INFORMATION Symantec Data Loss Prevention. symantec.com

Managing PHI in the Cloud Best Practices

SECURITY OF HANDHELD DEVICES TAKE CONTROL OF THE MOBILE DEVICE

APERTURE. Safely enable your SaaS applications.

IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:

EXECUTIVE BRIEF SPON. File Synchronization and Sharing Market Forecast, Published May An Osterman Research Executive Brief

Kony Mobile Application Management (MAM)

Chapter 7: Trends in technology impacting SDLC Learning objective Introduction Technology Trends

FIVE KEY CONSIDERATIONS FOR ENABLING PRIVACY IN HEALTH INFORMATION EXCHANGES

How To Protect Your Data From Being Hacked

White paper. Four Best Practices for Secure Web Access

IBM Data Security Services for endpoint data protection endpoint data loss prevention solution

A Websense White Paper Implementing Best Practices for Web 2.0 Security with the Websense Web Security Gateway

Analyzing HTTP/HTTPS Traffic Logs

Adopt a unified, holistic approach to a broad range of data security challenges with IBM Data Security Services.

Logging In: Auditing Cybersecurity in an Unsecure World

Cloud Computing. What is Cloud Computing?

Choosing an MDM Platform

Laserfiche for Federal Government MEET YOUR AGENCY S MISSION

Vs Encryption Suites

HIPAA CRITICAL AREAS TECHNICAL SECURITY FOCUS FOR CLOUD DEPLOYMENT

Brochure. ECM without borders. HP Enterprise Content Management (ECM)

Five Truths. About Enterprise Data Protection THE BEST WAY TO SECURE YOUR DATA AND YOUR BUSINESS DEFENDING THE DATA CMYK

Protecting Your Data On The Network, Cloud And Virtual Servers

WHY CLOUD BACKUP: TOP 10 REASONS

Strengthen security with intelligent identity and access management

V1.4. Spambrella Continuity SaaS. August 2

Enterprise Cloud Backup of Cloud-Based Applications/Platforms

Data Sheet: Archiving Symantec Enterprise Vault for Microsoft Exchange Store, Manage, and Discover Critical Business Information

SOLUTION BRIEF Enterprise Mobility Management. Critical Elements of an Enterprise Mobility Management Suite

Extending Threat Protection and Control to Mobile Workers with Cloud-Based Security Services > White Paper

Transcription:

Information Rights Management for Banking Seclore FileSecure Provides Intelligent Document & Data Protection that Extends Beyond Enterprise Borders A Seclore White Paper

In an era where outsourcing, cloud computing, BYOD, file-sharing, and collaboration with external parties are normal methods of doing business, sensitive information is sent to third parties on a daily basis, often unprotected. As external collaboration increases, so does the organization's exposure to the risk of data leakage. Managing Third-Party and Outsourcing Risks The Outsourcing era is in full swing. Outsourced processes generally include IT support, call centers, collections, printing, card personalization, embossing, and much more. On average, a typical large bank or credit card company collaborates with more than 20,000 third parties and partners. The challenge with outsourcing and external collaboration is still there: once these third parties receive sensitive information, the bank loses all control over it. In some cases, the third party partners and outsource organizations may not possess sufficient security apparatus and infrastructure. In every case, it is very easy for the outsourcer's employees to access and share the customer information. Lack of Innovative Security Stifles Business Agility Many organizations are still reluctantly adopting BYOD, filesharing, cloud computing, and other innovative technologies because of the exposure to a security breach. While these new technologies and processing methods offer great value in the form of cost savings and productivity gains, current security solutions are unable to fully protect the information that is shared. In fact, security concerns are the number one reason hindering the adoption of both BYOD and the Cloud. Industry Use Cases: Where Your Information Assets are Most at Risk Cloud computing, outsourcing, external collaboration with partners, and the use of mobile devices have further blurred the line between the organization and the 'outside world'. Your employees are also likely sharing officially or unofficially - sensitive documents on cloud-based file-sharing environments. Here are some examples of where information is most at risk. Outsourced Printing Most banks outsource their account statement and check printing processes. Huge amounts of sensitive information are sent to the outsourcer without any security or control, beyond encryption during transmission. Most of this data consists of Customer PII (Personally Identifiable Information) and is subject to legal and regulatory obligations. Once this information is on the outsourcers' servers, it is vulnerable. Outsourced Collections Confidential customer information is sent to third-party collections agencies to support the collection process. This sensitive information is readily accessed by the third party agents, who can easily copy and re-distribute the customer files. Credit Risk Documentation Corporations applying for large loans send their confidential data (financial information, business models, and revenue projections) to help the bank analyze the credit risk. Credit analysts analyze the information and decide on an appropriate lending rate of interest and other loan conditions. This information contains highly classified information about an organization and is vulnerable to the risk of a security breach from any of the multiple teams that handle it within the bank. pg 1

Board Communications Board communications including meeting minutes, financial projections, merger and acquisition documents and more are among the most secret information held by any bank and carry the highest liability. It becomes extremely critical to secure this data even from internal unauthorized access, as well as to prevent it from leakage. ipads are the most common devices used in boardrooms these days. Top-secret information shared with the Board stands exposed to significant risk when it is stored on a mobile device or a tablet particularly for personal devices over which the bank has no control. Operational Reports Confidential Operational and MIS reports represent another major security risk if they fall into the wrong hands; this information is also governed by strict regulations and compliance obligations. Operational reports may contain financial data, corporate statistics, sales information, and foreign exchange information all of which is highly sensitive. Banks could suffer from significant litigation exposure if this data is mishandled. Securing Your Information Inside and Outside the Perimeter Banks need a new, integrated approach to protecting information that covers documents flowing within and outside enterprise boundaries. While your information remains exposed to a security risk from employees inside your bank, the magnitude of the risk exposure increases dramatically when confidential information travels to third parties who are outside your security and risk apparatus. In order to mitigate your information security risk, there are three tenet to consider: The Problem with Traditional Perimeter-based Security Tools A serious loophole in traditional 'perimeter-centric' security measures is the focus on everything except the actual information stored in documents. These traditional security systems certainly reduce risk but only inside your enterprise. Firewalls secure networks, Virtual Private Networks (VPNs) secure the transmission channel, encryption tools encrypt the device or the folder and so on. In this entire stack, what is protecting the actual information itself, without a dependency on the network, device, or platform? Once your confidential files leave the perimeter to support external collaboration, they also leave the jurisdiction of your traditional security solutions. These files are free to move about without any protection or security. In addition, perimeter-based security is not information-centric in nature: the information owner has no visibility over who is actually accessing the document, and what the recipient is doing with the document. Clearly, traditional perimeter-based security measures that focus only on securing the organizational perimeter are not enough. These solutions although important only partially reduce the risk of data leakage. Today's information-sharing environment calls for a radical shift in mindset to cope with external collaboration and the ability to adopt new technologies. What is needed is an information-centric approach to security. We are talking about a security mechanism that firewalls the actual file itself, so that access to the information in it remains restricted and controlled regardless of transmission medium or storage mechanism. The file can reside anywhere, on the cloud, on any device, with any team, or even any organization, and it will continue to be protected. 1. Maintaining security and control on information wherever it travels inside and outside the bank 2. Preventing unauthorized users from accessing the information and also preventing authorized users from misusing the information 3. Maintaining complete visibility over all activities performed by all users your own employees and third parties on all sensitive information regardless of where it is stored In essence, it is essential for a bank to extend its security and risk management infrastructure to its vendors, advisors, sub-contractors, and partners. pg 2

Seclore FileSecure: Information Rights Management (IRM) Seclore FileSecure Information Rights Management ensures endto-end protection of information shared within and outside the enterprise. A few benefits of Seclore FileSecure are: Dynamic access controls and usage policies that are automatically enforced and can be modified at anytime from anywhere even after sharing the information Complete boundary-independence and informationcentric security that remains equally effective inside and outside the organization boundary Independence on transmission medium, storage, or access type truly OS and device agnostic Complete real-time audit trail of all activities performed on all information assets by all users anywhere in the world Seclore FileSecure IRM successfully mitigates security risks and allows you to collaborate with external parties; adopt innovative technologies; and achieve business objectives without worrying about security. Seclore FileSecure: Securing Information Wherever It Goes In today's new world, where the proliferation of smart devices, cloud technologies, and outsourcing enables employees and partners to access enterprise information from anywhere, the risk of information loss, intentional or unintended, has multiplied. Internal Employees BYOD Mobile Employees Partners Third Party Workforce Auditors CLOUD CLOUD Suppliers Using Seclore FileSecure provides you with peace of mind, as the information itself is now secure, no matter where it resides, how it is transferred, or how it is shared. pg 3

Why Seclore FileSecure Automatically Enforce Granular Usage Policies Seclore FileSecure's security policies enforces usage policies for over 140 different file types based on four criteria: WHO can access it WHAT they can do it WHEN they can do it WHERE they can do it Users, Teams, Groups Read Only, Edit, Print, Run Macros, Re-distribute, take Screenshots Specific Days, Dates and Times, or a Date Range IP Addresses, a Specific Computer Only Seclore FileSecure protection is applied to all copies of the document regardless of mode of transfer (email, USB, shared folders) or the access device (ipad, ios/android devices, desktop). This information firewall' allows or blocks access depending on the predefined usage permissions. The usage policies applied by Seclore FileSecure remain in effect even after information is sent to external parties. Dynamically Update Usage Permissions You can change (or revoke) usage rights on a document for any user at anytime from anywhere. If a business relationship changes, or the statement printing cycle is complete, you can instantly remove access to that information. Breeze through Audits Seclore FileSecure maintains a complete real-time audit trail of the time, location and other details of the activities performed on the content. You receive complete visibility over the information that you send to your customers, vendors, and contractors. Seclore FileSecure also integrates with SIEM tools and enables easy log retrieval. Seamlessly Integrate with Other Enterprise Systems Your core banking systems, ECM (Enterprise Content Management) systems, and DMS (Document Management Systems) contain extremely sensitive information and intellectual property. Once information is download from these systems, all security and control is lost. Seclore FileSecure offers a robust API and pre-built connectors for your existing investments so that usage controls can be automatically attached to information as it is extracted from these systems. As well, you can automatically attach usage controls to information that is deemed sensitive by your DLP system using a suite of specifically built connectors. About Seclore Seclore offers an innovative solution, FileSecure, which enables organizations to control access to information wherever it goes, both within and outside of the organization s boundaries. The ability to remotely control who can view, edit, copy, and distribute unstructured information empowers organizations to embrace mobility, Cloud, and external collaboration with confidence. The most integrationfriendly solution on the market, Seclore FileSecure extends and enhances the security of information detected and downloaded from DLP, ECM, ERP systems and attached to Mail/Messaging solutions through pre-built connectors. With nearly 4 million users across 420 companies in 22 countries and rapidly growing, Seclore is helping organizations achieve their security, privacy and compliance objectives. pg 4

Securing Information Wherever it Goes www.seclore.com info@seclore.com blog.seclore.com USA West Coast 800 West El Camino Real Suite 180, Mountain View California 94040 +1 415 830 6240 East Coast 420 Lexington Avenue Suite 300, Graybar Building NYC, New York 10170 INDIA Mumbai Corporate Office Excom House Ground Floor, Plot No. 7 & 8 Off. Saki Vihar Road Sakinaka, Mumbai 400 072 +91 22 6130 4200 +91 22 6143 4800 Bengaluru Regional Office 5th Floor, Vakil Square, Bannerghatta Road Opp. Jayadeva Hospital. Bengaluru 560 076 +91 97425 11179 Gurgaon Regional Office OCUS Technopolis, Golf Course Road Sector 54, Gurgaon - 122 001 +91 0124 4626 161