seclore filesecure integrated with ibm filenet
DESCRIPTION
http://www.seclore.com/ibm_filenet.html : Seclore FileSecure extension for IBM FileNet extends the scope and reach of security policies defined within FileNet. Using the extension enterprises can secure documents, images and even drawings when they are downloaded from FileNet.TRANSCRIPT
Seclore FilesecureFileNet Connector
Enhancing security of IBM FILENET
Contents
• Constraints of IBM FileNet security
• The Solution ..• What is Seclore FileSecure• Seclore FileSecure connector for IBM
FileNet• Policy definition• Assigning policies to FileNet folders• Uploading documents• Downloading a file from FileNet folder• Accessing a protected file• Audit trails
• About Seclore
A Process Flow of Product PlanFileNet and securityFileNetUserUser
Edited
Copied
Printed
ViewedUn-protected File
Distributed
FileNet accessed by users
FileNet security is not persistent . Once the file is downloaded locally, it can be edited, copied & distributed.
Contents
• Constraints of IBM FileNet security
• The Solution ..• What is Seclore FileSecure• Seclore FileSecure connector for IBM
FileNet• Policy definition• Assigning policies to FileNet folders• Uploading documents• Downloading a file from FileNet folder• Accessing a protected file• Audit trails
• About Seclore
• WHO can use the information
People & groups within and outside of the organization can be defined as rightful users of the information
• WHAT can each person doIndividual actions like reading, editing, printing,
distributing, copy-pasting, screen grabbing etc. can be controlled
• WHEN can he use itInformation usage can be time based e.g. can
only be used by Mr. A till 28th Sept OR only for the 2 days
• WHERE can he use it fromInformation can be linked to locations e.g. only
3rd floor office by private/public IP addresses
Seclore FileSecure allow enterprises to define, implement & audit information usage “policies”. A “policy” defines :
Seclore FileSecure
• Policies are– Persistent: Implemented on information and all its copies
wherever it is transmitted or stored– Dynamic: Policies can be changed after distributing
information without having access to or redistributing the information
• Policies can be attached to information on– Creation– Placement in a certain location e.g. shared folder– Attachment to email– Uploading to a document management / ECM system– …
Seclore FileSecure
Contents
• Constraints of IBM FileNet security
• The Solution ..• What is Seclore FileSecure• Seclore FileSecure connector for IBM
FileNet• Policy definition• Assigning policies to FileNet folders• Uploading documents• Downloading a file from FileNet folder• Accessing a protected file• Audit trails
• About Seclore
A Process Flow of Product PlanSeclore FileSecure Enabled FileNet
UserUser
FileNetaccessed by users
Files copied out of “FileNet Folder” are persistently protected. Rights to edit, copy, print and distribute are restricted based
on Seclore FileSecure policies
FileNet + Seclore FileSecure
Edited
Copied
Printed
ViewedProtected File
Distributed
Contents
• Constraints of IBM FileNet security
• The Solution ..• What is Seclore FileSecure• Seclore FileSecure connector for IBM
FileNet• Policy definition• Assigning policies to FileNet folders• Uploading documents• Downloading a file from FileNet folder• Accessing a protected file• Audit trails
• About Seclore
Policy definition–WHO, WHAT
1010Policy Admin
People / groups, within / outside the enterprise can be dis-allowed to edit, print, copy, forward etc. via a policy
Policy definition–WHEN, WHERE
1111Policy Admin
A policy can expire information beyond a date / timespan and also restrict its usage to certain computers / networks
Contents
• Constraints of IBM FileNet security
• The Solution ..• What is Seclore FileSecure• Seclore FileSecure connector for IBM
FileNet• Policy definition• Assigning policies to FileNet folders• Uploading documents• Downloading a file from FileNet folder• Accessing a protected file• Audit trails
• About Seclore
Applying Policies…
1313FileNetAdmin
Policies can be applied to folders by the FileNet admin. The admin chooses the folder …
1414FileNetAdmin
Policies are applied…
…Applying Policies
1515
Contents
• Constraints of IBM FileNet security
• The Solution ..• What is Seclore FileSecure• Seclore FileSecure connector for IBM FileNet• Policy definition• Assigning policies to FileNet folders• Uploading documents• Downloading a file from FileNet folder• Accessing a protected file• Audit trails
• About Seclore
1616FileNetAdmin
Add document
Add document…
1717FileNetAdmin
Add document
…Add document
1818FileNetAdmin
Document is uploaded
Document is uploaded
Contents
• Constraints of IBM FileNet security
• The Solution ..• What is Seclore FileSecure• Seclore FileSecure connector for IBM
FileNet• Policy definition• Assigning policies to FileNet folders• Uploading documents• Downloading a file from FileNet
folder• Accessing a protected file• Audit trails
• About Seclore
2020
Download document from FileNet…
User’s Computer
Once the user’s downloads the document from Seclore FileSecure policy protected FileNet folder the file
gets instantly protected
…Download document from FileNet
2121User’s
Computer…file gets instantly protected
Downloaded document from FileNet.
Notice the red lock!
Contents
• Constraints of IBM FileNet security
• The Solution ..• What is Seclore FileSecure• Seclore FileSecure connector for IBM
FileNet• Policy definition• Assigning policies to FileNet folders• Uploading documents• Downloading a file from FileNet folder• Accessing a protected file• Audit trails
• About Seclore
Rights display
2323User’s
ComputerOn clicking a rights display makes the recipient explicitly
aware of his rights to the document
Unauthorized print
2424User’s
ComputerUnauthorized activities like attempts to print …
2525User’s
Computer… are disallowed
Unauthorized print
2626User’s
ComputerUnauthorized activities like attempts to edit & save…
Unauthorized edit & save
2727User’s
Computer… are disallowed
Unauthorized edit & save
2828User’s
Computer
Unauthorized copy
Attempts to copy parts / whole of the document …
2929User’s
Computer… are disallowed
Unauthorized copy
3030User’s
ComputerScreen capture by the Prt Scr key, screen grabbing tools like
Camtasia and screen sharing tools like Webex is blocked
Unauthorized screen grab
Contents
• Constraints of IBM FileNet security
• The Solution ..• What is Seclore FileSecure• Seclore FileSecure connector for IBM
FileNet• Policy definition• Assigning policies to FileNet folders• Uploading documents• Downloading a file from FileNet folder• Accessing a protected file• Audit trails
• About Seclore
3232User’s
ComputerThe audit captures the WHO, WHAT, WHEN and WHERE of the
access attempt. Authorized and unauthorized attempts are captured and reported
Information audit
Contents
• Constraints of IBM FileNet security
• The Solution ..• What is Seclore FileSecure• Seclore FileSecure connector for IBM
FileNet• Policy definition• Assigning policies to FileNet folders• Uploading documents• Downloading a file from FileNet folder• Accessing a protected file• Audit trails
• About Seclore
Corporate Background …
“Seclore is a high growth software product company. Seclore’s technology helps mitigate the risks arising out of information breaches whilst
enhancing collaboration”
6 years old, Headquartered in Mumbai, India
Promoted by IIT Bombay under the SINE program - www.sineiitb.org
Geographical and customer presence in Middle East, ASEAN, SAARC & Europe
Offerings focused on Information Rights Management and Secure Outsourcing
Stake holders including
IIT Bombay – www.iitb.ac.in
ICICI Bank – www.icicibank.com
Ventureast – www.ventureast.net
Technology and service differentiators focusing on minimally intrusive technology, value based pricing and usage without training
About …Value to customers
Security without compromising on collaborationCustomers across
….Diversified business groups
….Large financial services groups
….Engineering and manufacturing organizations
….Defence, Software, BPO, Consulting, Services, ….
What customers say about us …
“We chose Seclore FileSecure due to the flexibility provided by Seclore in terms of solution capabilities and customization. Implementation of Seclore FileSecure has reduced the exposure of critical data for potential misuse or frauds. The business benefits are tremendous.” - Murli Nambiar, Head of Information Security
"Financial services companies like banks, insurance carriers & broking are ‘opening up’ their information systems and processes for participation by customers, partners and vendors. This of course brings in a lot of value chain integration and lowers costs but comes with information security needs which cannot be solved by present day systems. Seclore’s technology for securing documents as they flow within and outside enterprises as well as securing data shared with outsourcing partners is extremely relevant. - C N Ram. Group CIO, Essar group
What industry experts say …
“Information breaches normally result in intellectual property violation which is a serious problem affecting industry today. Seclore’s combination of preventive and corrective methods of handling information breaches is invaluable to any industry” - Haigreve Khaitan (Managing partner – Khaitan and Co)
“Collaboration, security and privacy appear as mutually conflicting goals with most present day technologies. Seclore has resolved this conflict in a very elegant manner with its technology.” - Animesh Parihar (Global Delivery Head – SAP)
Seclore’s approach is different in that they not mandatory rely on such plug-ins but mainly act “below” the application. The client component (which is required to access protected, e.g. encrypted, documents) tries to analyze the activities off the application like access to the file system. One impact of that approach is that a document might be opened with different applications supporting the specific document format.
- Martin Kuppinger, One of the fore-most information security analysts
Deloitte Technology Fast 50 is a ranking compiled every year based on percentage of growth of fiscal year revenue over three years. The companies must also fulfil other criterion of technology orientation.
‘Hidden Gems’ 2010 by Kuppinger Cole, Europe’s leading information security analyst firm is a report
which lists vendors, which have a significantly differentiated offering and are market leaders in a
particular segment.
Awards and recognition …
… Awards and recognition
The TR35 award is for innovators whose inventions and research, Massachusetts Institute of Technology (MIT) finds exciting. Technology Review, owned and published by MIT, is the world’s oldest technology magazine.
“Innovations – ideas in practice” is an annual event honoring researchers and innovators for creative and innovative work in the
sphere of science and technology. The innovation needs to have a high degree of practical relevance to change everyday life.
More Info?
www.seclore.com+91-22-4015-5252