Seclore FileSecure integrates with Microsoft Outlook - PowerPoint PPT Presentation

About This Presentation
Title:

Seclore FileSecure integrates with Microsoft Outlook

Description:

: Seclore FileSecure connector for Microsoft Outlook provides the ability to not only securely protect and transmit emails but also control the usage actions of the receiver. The receivers individual actions like viewing, editing, printing, forwarding can be granular controlled on a per email per user basis. – PowerPoint PPT presentation

Number of Views:197
Updated: 13 February 2013
Slides: 37
Provided by: gilberteric1

less

Transcript and Presenter's Notes

Title: Seclore FileSecure integrates with Microsoft Outlook


1
Seclore Filesecure MICROSOFT OUTLOOK Enhancing
security of MS OUTLOOK
2
Contents
  • Constraints of MS OUTLOOK security
  • The Solution ..
  • What is Seclore FileSecure
  • Seclore FileSecure connector for Microsoft
    Outlook
  • Assigning policies to E-mail in Microsoft Outlook
  • Opening Email
  • Accessing a protected file
  • Audit trails
  • Seclore FileSecure MS Outlook Features
  • About Seclore

3
MS Outlook and Security
A Typical E-Mail Sharing Scenario
SENDER
RECEIVER
It can further be Edited, Copied,
Printed, Distributed, Viewed (by others)
Once the file is sent to the RECEIVER, The
SENDER has no control on the file It can further
be Edited, Copied, Printed, Distributed, Viewed
(by others) !!
4
Contents
  • Constraints of MS OUTLOOK security
  • The Solution ..
  • What is Seclore FileSecure
  • Seclore FileSecure connector for Microsoft
    Outlook
  • Assigning policies to E-mail in Microsoft Outlook
  • Opening Email
  • Accessing a protected file
  • Audit trails
  • Seclore FileSecure MS Outlook Features
  • About Seclore

5
Seclore FileSecure
Seclore FileSecure allow enterprises to define,
implement audit information usage policies. A
policy defines
  • WHO can use the information
  • People groups within and outside of the
    organization can be defined as rightful users of
    the information
  • WHAT can each person do
  • Individual actions like reading, editing,
    printing, distributing, copy-pasting, screen
    grabbing etc. can be controlled
  • WHEN can he use it
  • Information usage can be time based e.g. can only
    be used by Mr. A till 28th Sept OR only for the 2
    days
  • WHERE can he use it from
  • Information can be linked to locations e.g. only
    3rd floor office by private/public IP addresses

6
Seclore FileSecure
  • Policies are
  • Persistent Implemented on information and all
    its copies wherever it is transmitted or stored
  • Dynamic Policies can be changed after
    distributing information without having access to
    or redistributing the information
  • Policies can be attached to information on
  • Creation
  • Placement in a certain location e.g. shared
    folder
  • Attachment to email
  • Uploading to a document management / ECM system

7
Contents
  • Constraints of MS OUTLOOK security
  • The Solution ..
  • What is Seclore FileSecure
  • Seclore FileSecure connector for Microsoft
    Outlook
  • Assigning policies to E-mail in Microsoft Outlook
  • Opening Email
  • Accessing a protected file
  • Audit trails
  • Seclore FileSecure MS Outlook Features
  • About Seclore

8
Opening E-Mail with Seclore FileSecure
SENDER
RECEIVER
When the e-mail is sent, Seclore FileSecure
protects the e-mail attachment and e-mail
content. The receiver has only restricted usage
rights (e.g. view only, edit print only, etc)
9
Contents
  • Constraints of MS OUTLOOK security
  • The Solution ..
  • What is Seclore FileSecure
  • Seclore FileSecure connector for Microsoft
    Outlook
  • Assigning policies to E-mail in Microsoft Outlook
  • Opening Email
  • Accessing a protected file
  • Audit trails
  • Seclore FileSecure MS Outlook Features
  • About Seclore

10
Senders Computer
Sender clicks on secure send to apply policy to
e-mail attachment
11
Receivers
Senders Computer
Policy is defined as- a. WHO - people / groups
within or outside of the enterprise
12
Senders Computer
Policy is defined as b. WHAT - (VIEW, EDIT,
PRINT, FORWARD, )
13
Senders Computer
Policy is defined as- c. WHEN - date range, time
span,
14
Senders Computer
Policy is defined as- d. WHERE - Specific
computers, specific networks, only from the
office,
15
Contents
  • Constraints of MS OUTLOOK security
  • The Solution ..
  • What is Seclore FileSecure
  • Seclore FileSecure connector for Microsoft
    Outlook
  • Assigning policies to E-mail in Microsoft Outlook
  • Opening Email
  • Accessing a protected file
  • Audit trails
  • Seclore FileSecure MS Outlook Features
  • About Seclore

16
Receiver opens the protected e-mail
Receivers Computer
17
Contents
  • Constraints of MS OUTLOOK security
  • The Solution ..
  • What is Seclore FileSecure
  • Seclore FileSecure connector for Microsoft
    Outlook
  • Assigning policies to E-mail in Microsoft Outlook
  • Opening Email
  • Accessing a protected file
  • Audit trails
  • Seclore FileSecure MS Outlook Features
  • About Seclore

18
Receivers Computer
When the receiver opens the e-mail, he gets to
see the rights that he has on the e-mail
19
Receivers Computer
If he tries to print.
20
Receivers Computer
He will be restricted from printing !!
21
Receivers Computer
If the receiver tries to copy data
22
Receivers Computer
He will be restricted from copying data!!
23
Receivers Computer
Even print-screen is blocked !!
24
Contents
  • Constraints of MS OUTLOOK security
  • The Solution ..
  • What is Seclore FileSecure
  • Seclore FileSecure connector for Microsoft
    Outlook
  • Assigning policies to E-mail in Microsoft Outlook
  • Opening Email
  • Accessing a protected file
  • Audit trails
  • Seclore FileSecure MS Outlook Features
  • About Seclore

25
Receivers Computer
The system also maintains a complete audit trail
of all the receivers actions, time even
location !!
26
Contents
  • Constraints of MS OUTLOOK security
  • The Solution ..
  • What is Seclore FileSecure
  • Seclore FileSecure connector for Microsoft
    Outlook
  • Assigning policies to E-mail in Microsoft Outlook
  • Opening Email
  • Accessing a protected file
  • Audit trails
  • Seclore FileSecure MS Outlook Features
  • About Seclore

27
(No Transcript)
28
Contents
  • Constraints of MS OUTLOOK security
  • The Solution ..
  • What is Seclore FileSecure
  • Seclore FileSecure connector for Microsoft
    Outlook
  • Assigning policies to E-mail in Microsoft Outlook
  • Opening Email
  • Accessing a protected file
  • Audit trails
  • Seclore FileSecure MS Outlook Features
  • About Seclore

29
Corporate Background
Seclore is a high growth software product
company. Seclores technology helps mitigate the
risks arising out of information breaches whilst
enhancing collaboration
6 years old, Headquartered in Mumbai,
India Promoted by IIT Bombay under the SINE
program - www.sineiitb.org Geographical and
customer presence in Middle East, ASEAN, SAARC
Europe Offerings focused on Information Rights
Management and Secure Outsourcing Stake holders
including IIT Bombay www.iitb.ac.in ICICI
Bank www.icicibank.com Ventureast
www.ventureast.net Technology and service
differentiators focusing on minimally intrusive
technology, value based pricing and usage without
training
30
.Large financial services groups
Seclore user profile
.Diversified business groups
.Engineering and manufacturing organizations
Government and service providers
31
What customers say about us
We chose Seclore FileSecure due to the
flexibility provided by Seclore in terms of
solution capabilities and customization.
Implementation of Seclore FileSecure has reduced
the exposure of critical data for potential
misuse or frauds. The business benefits are
tremendous. - Murli Nambiar, Head of
Information Security
"Financial services companies like banks,
insurance carriers broking are opening up
their information systems and processes for
participation by customers, partners and vendors.
This of course brings in a lot of value chain
integration and lowers costs but comes with
information security needs which cannot be solved
by present day systems. Seclores technology for
securing documents as they flow within and
outside enterprises as well as securing data
shared with outsourcing partners is extremely
relevant. - C N Ram. Group CIO, Essar group
32
What industry experts say
Seclores approach is different in that they not
mandatory rely on such plug-ins but mainly act
below the application. The client component
(which is required to access protected, e.g.
encrypted, documents) tries to analyze the
activities off the application like access to the
file system. One impact of that approach is that
a document might be opened with different
applications supporting the specific document
format.
- Martin Kuppinger, One of the fore-most
information security analysts
Information breaches normally result in
intellectual property violation which is a
serious problem affecting industry today.
Seclores combination of preventive and
corrective methods of handling information
breaches is invaluable to any industry -
Haigreve Khaitan (Managing partner Khaitan and
Co)
Collaboration, security and privacy appear as
mutually conflicting goals with most present day
technologies. Seclore has resolved this conflict
in a very elegant manner with its technology.
- Animesh Parihar (Global Delivery Head SAP)
33
Awards and recognition
Cool Vendors are interesting, new and innovative
vendors which organizations cannot afford to
ignore. Cool Vendors are those vendors that have
caught Gartner's interest because they offer
innovative and intriguing technologies or
solutions.
Deloitte Technology Fast 50 is a ranking compiled
every year based on percentage of growth of
fiscal year revenue over three years. The
companies must also fulfil other criterion of
technology orientation.
34
Awards and recognition
Hidden Gems 2010 by Kuppinger Cole, Europes
leading information security analyst firm is a
report which lists vendors, which have a
significantly differentiated offering and are
market leaders in a particular segment.
The TR35 award is for innovators whose
inventions and research, Massachusetts Institute
of Technology (MIT) finds exciting. Technology
Review, owned and published by MIT, is the
worlds oldest technology magazine.
35
Awards and recognition
Innovations ideas in practice is an annual
event honoring researchers and innovators for
creative and innovative work in the sphere of
science and technology. The innovation needs to
have a high degree of practical relevance to
change everyday life.
36
More Info? www.seclore.com 91-22-6130-4200
36
Write a Comment
User Comments (0)
About PowerShow.com