Presentation by Seclore Technologies at Zensar #TechShowcase. An iSPIRT ProductNation initiative

Post on 30-Oct-2014

1249 Views

Category:

Technology

1 Downloads

Preview:

Click to see full reader

DESCRIPTION

Presentation by Seclore Technologies at Zensar #TechShowcase. An iSPIRT ProductNation initiative. Started in 2007; they work in the space of information security policy based. Their tag line is security not at the cost of collaboration.

Transcript

Seclore

Overview

April 8, 2023

Corporate Background

High growth information security product company Active operations since 2007, products available since 2010

Promoted by IIT Bombay www.iitb.ac.in Technology commercialization program www.sineiitb.org

Products in the area of IRM and secure outsourcing

Geographic coverage Direct – South Asia, Europe, North America

Indirect – Parts of Africa, parts of South America, North Asia

Key stakeholders include IIT Bombay – Premier research and training organization

Institutional investors – Ventureast, Helion

Private and Confidential 2

Seclore was in 2010 global list of "Hidden Gems" in Identity and Access Management Hidden Gems’ 2010 by Kuppinger Cole, Europe’s leading information security analyst firm, is a report which lists vendors, which

have a significantly differentiated offering and are market leaders in a particular segment

Seclore was among the top 10 finalists in the Innovations Ideas in Practice 2010 by IIT, Bombay Alumni Association, Pune “Innovations – ideas in practice” is an annual event honoring researchers and innovators for creative and innovative work in the

sphere of science and technology

Private and Confidential 3

Awards & Recognition

2012 Seclore was named as the Gartner Cool Vendor for 2012

Gartner's 2012 Cool Vendors focus on delivering better business results through consumption of both services and technology

2012 Seclore was named in the Deloitte Technology Fast 50 for 2012

2010

2010

2009 Seclore was among the top 25 in the Marico Innovation for India 2010 Awards

The TR35 award is for innovators whose inventions and research, Massachusetts Institute of Technology (MIT) finds exciting Technology Review, owned and published by MIT, is the world’s oldest technology magazine

2009

Marquee customers

Private and Confidential 4

Over 3.5 Million users across ~ 370 large enterprises

References and case studies available here

Presence and numbers

Global offices, ~ 100 people technology team focused on Seclore FileSecure

Partnerships with leading SI companies for global implementation, integration and support

Customers spread across timezones, languages and cultures

Private and Confidential 5

Private and Confidential 6

Problems we solve

Problems we solve

Information security during collaboration Normally seen as “mutually conflicting” goals

Security systems perimeter centric – rendered useless when information leaves the perimeter

Information breaches during outsourcing Security, privacy and compliance norms while outsourcing

Present day solutions archaic and centered around “building walls”

Information audits Present systems help IT systems audits and not information audits

Compliance to ISO, HIPAA, PCI, SOX, ...

Private and Confidential 7

Private and Confidential 8

BYOD …

Even Rajnikant cannot stop it

Private and Confidential 9

Collaboration …Is a

Differentiator

of any value chain

Private and Confidential 10

Is making technology availability “socialist”

Data on the cloud …

11

Security in the "new new" world

BYOD External collaboration

Data on cloud

Security Device Control Legal contracts / periodic audits

Encryption

Privacy Device Control Legal contracts / periodic audits

Legal contracts, encryption

Compliance Legal contracts Legal contracts / periodic audits

Legal contracts

Private and Confidential

Private and Confidential 12

What we offer

The dream …

Private and Confidential 13

WHO can usePeople & groups within and outside of the

organization can be defined as rightful users of the information

WHAT can (s)he doIndividual actions like reading, editing,

printing, distributing, copy-pasting, screen grabbing etc. can be controlled

WHEN can (s)he use itInformation usage can be time based e.g.

can only be used by Mr. A till 28th Sept OR only for the 2 days

WHERE can (s)he use it from

Information can be linked to locations e.g. only 3rd floor office by private/public IP addresses

The dream …

Private and Confidential 14

• WHO can use the information

People & groups within and outside of the organization can be defined as rightful users of the information

• WHAT can each person doIndividual actions like reading, editing, printing,

distributing, copy-pasting, screen grabbing etc. can be controlled

• WHEN can he use itInformation usage can be time based e.g. can

only be used by Mr. A till 28th Sept OR only for the 2 days

• WHERE can he use it fromInformation can be linked to locations e.g. only

3rd floor office by private/public IP addresses

IRM allow enterprises to define, implement & audit information usage “policies”. A “policy” defines :

Information Rights Management - defined

Policy definition …

Private and Confidential 16

… Policy definition

Private and Confidential 17

Policy implementation

Private and Confidential 18

Policy implementation

Private and Confidential 19

Policy implementation

Private and Confidential 20

Policy implementation

Private and Confidential 21

Policy enforcement

Private and Confidential 22

Policy enforcement

Private and Confidential 23

Policy enforcement

Private and Confidential 24

Policy enforcement

Private and Confidential 25

Policy audits

Private and Confidential 26

Policy change

Private and Confidential 27

Policy change

Private and Confidential 28

Private and Confidential 29

What others say about us

Customer Speak - Fugro

Private and Confidential 30

Customer Speak - PurpleLeap

Private and Confidential 31

Customer Speak - Asian Paints

Private and Confidential 32

Customer Speak - HDFC Bank

Private and Confidential 33

Customer Speak - Larsen & Toubro

Private and Confidential 34

Analyst Speak - Gartner

Private and Confidential 35

Analyst Speak – Kuppinger Cole

Private and Confidential 36

Industry speak - Deloitte

Private and Confidential 37

Media speak

Private and Confidential 38

Private and Confidential 39

Partnerships & joint offerings

Company Product Product type

FileNet Content Management

Lotus Notes Mail and Messaging

Symantec DLP Data Loss Prevention

McAfee DLP Data Loss Prevention

Websense DLP Data Loss Prevention

SharePoint Content Management

Outlook Mail and Messaging

SAP ERP Transaction backbone

GTB DLP Data Loss Prevention

MyDLP DLP Data Loss Prevention

RSA DLP Data Loss Prevention

Omnidocs Content Management

Integrated Offerings

Private and Confidential 40

Thank you

www.seclore.com @secloretech

top related