Title: Seclore FileSecure IRM connector for IBM Lotus Notes - Email Security Solution
1Information Rights Management (IRM) Enhancing
Security of Lotus Notes
2The Problem
3A Typical E-Mail Sharing Scenario
SENDER
RECEIVER
Click for NEXT
Click for NEXT
It can further be Edited, Copied,
Printed, Distributed, Viewed (by others)
Once the e-mail is sent to the RECEIVER, The
SENDER has no control on the e-mail
4A Typical E-Mail Sharing Scenario
Un-protected E-mail
Click for NEXT
It can further be Edited, Copied,
Printed, Distributed, Viewed (by others)
It can further be Edited, Copied, Printed,
Distributed, Viewed (by others) !!
5The Solution
6Opening E-Mail with Seclore FileSecure
SENDER
RECEIVER
Click for NEXT
When the e-mail is sent, Seclore FileSecure
protects the e-mail
7Opening E-Mail with Seclore FileSecure
Protected E-mail
Click for NEXT
It can further be Edited, Copied,
Printed, Distributed, Viewed (by others)
The receiver has only restricted usage rights
(e.g. view only, edit print only, etc)
8Feature Lotus Notes Lotus Notes Seclore FileSecure
Access Control Can provide control while the information is within the system only Can provide granular control (view, edit, print, fwd, copy-paste, time and location restrictions etc)
Dependency on email infrastructure For security controls to apply, sender and receiver have to both be on Lotus infrastructure (Lotus Domino Lotus Notes) No dependency on the email server or client infrastructure either on the sender or the receiver side
Usage control changes Cannot change controls after the email is sent out Controls can be changed even after the email is sent out in real time, anytime, anywhere
Tracking Doesn't provide robust mechanism for email delivery, read receipt, forwarding, etc Complete tracking of receivers usage (view, print, fwd, etc) as well as email delivery, read receipt is robustly provided
9Some screen shots
10- Assigning Seclore policies to e-mail in Lotus
Notes
11Senders Computer
Sender clicks on secure send to apply policy to
e-mail attachment
12 Receivers
Senders Computer
- Policy is defined as-
- a. WHO - people / groups within or outside
- of the enterprise
13Senders Computer
- Policy is defined as
- b. WHAT - (VIEW, EDIT, PRINT,
- FORWARD, )
14Senders computer
Policy is defined as- c. WHEN - date range, time
span,
15Senders Computer
- Policy is defined as-
- d. WHERE - Specific computers, specific
networks, only from the office,
162. Opening E-Mail
17Receiver opens the protected e-mail
ReceiversComputer
18ReceiversComputer
When the receiver opens the e-mail, he gets to
see the rights that he has on the e-mail
194. Performing un-authorized actions
20ReceiversComputer
If he tries to print.
21ReceiversComputer
He will be restricted from printing !!
22ReceiversComputer
If the receiver tries to copy data
23ReceiversComputer
He will be restricted from copying data!!
24ReceiversComputer
Even print-screen is blocked !!
25ReceiversComputer
- The system also maintains a complete audit trail
of all the receivers actions, time even
location !!
26About Seclore
27Corporate Background
Seclore is a high growth software product
company. Seclores technology helps mitigate the
risks arising out of information breaches whilst
enhancing collaboration
6 years old, Headquartered in Mumbai,
India Geographical and customer presence Middle
East, India, ASEAN, Western Europe, North
Africa Keywords Information Rights Management,
Secure outsourcing Investors The largest private
bank in India, one of the foremost RD institute
professional financial investors Why are we
different Minimally intrusive security
technology, value based pricing, usage without
training
28About
Seclore is a high growth information security
product company focussed on providing Security
without compromising collaboration Seclores
flagship product Seclore FileSecure is used by
More than 1.5 million users some of the largest
enterprises
29For more information- http//www.seclore.com/lotu
s_notes.html Email info_at_seclore.com