Seclore Overview Monday, June 6, 2022
Oct 30, 2014
Seclore
Overview
April 8, 2023
Corporate Background
High growth information security product company Active operations since 2007, products available since 2010
Promoted by IIT Bombay www.iitb.ac.in Technology commercialization program www.sineiitb.org
Products in the area of IRM and secure outsourcing
Geographic coverage Direct – South Asia, Europe, North America
Indirect – Parts of Africa, parts of South America, North Asia
Key stakeholders include IIT Bombay – Premier research and training organization
Institutional investors – Ventureast, Helion
Private and Confidential 2
Seclore was in 2010 global list of "Hidden Gems" in Identity and Access Management Hidden Gems’ 2010 by Kuppinger Cole, Europe’s leading information security analyst firm, is a report which lists vendors, which
have a significantly differentiated offering and are market leaders in a particular segment
Seclore was among the top 10 finalists in the Innovations Ideas in Practice 2010 by IIT, Bombay Alumni Association, Pune “Innovations – ideas in practice” is an annual event honoring researchers and innovators for creative and innovative work in the
sphere of science and technology
Private and Confidential 3
Awards & Recognition
2012 Seclore was named as the Gartner Cool Vendor for 2012
Gartner's 2012 Cool Vendors focus on delivering better business results through consumption of both services and technology
2012 Seclore was named in the Deloitte Technology Fast 50 for 2012
2010
2010
2009 Seclore was among the top 25 in the Marico Innovation for India 2010 Awards
The TR35 award is for innovators whose inventions and research, Massachusetts Institute of Technology (MIT) finds exciting Technology Review, owned and published by MIT, is the world’s oldest technology magazine
2009
Marquee customers
Private and Confidential 4
Over 3.5 Million users across ~ 370 large enterprises
References and case studies available here
Presence and numbers
Global offices, ~ 100 people technology team focused on Seclore FileSecure
Partnerships with leading SI companies for global implementation, integration and support
Customers spread across timezones, languages and cultures
Private and Confidential 5
Private and Confidential 6
Problems we solve
Problems we solve
Information security during collaboration Normally seen as “mutually conflicting” goals
Security systems perimeter centric – rendered useless when information leaves the perimeter
Information breaches during outsourcing Security, privacy and compliance norms while outsourcing
Present day solutions archaic and centered around “building walls”
Information audits Present systems help IT systems audits and not information audits
Compliance to ISO, HIPAA, PCI, SOX, ...
Private and Confidential 7
Private and Confidential 8
BYOD …
Even Rajnikant cannot stop it
Private and Confidential 9
Collaboration …Is a
Differentiator
of any value chain
Private and Confidential 10
Is making technology availability “socialist”
Data on the cloud …
11
Security in the "new new" world
BYOD External collaboration
Data on cloud
Security Device Control Legal contracts / periodic audits
Encryption
Privacy Device Control Legal contracts / periodic audits
Legal contracts, encryption
Compliance Legal contracts Legal contracts / periodic audits
Legal contracts
Private and Confidential
Private and Confidential 12
What we offer
The dream …
Private and Confidential 13
WHO can usePeople & groups within and outside of the
organization can be defined as rightful users of the information
WHAT can (s)he doIndividual actions like reading, editing,
printing, distributing, copy-pasting, screen grabbing etc. can be controlled
WHEN can (s)he use itInformation usage can be time based e.g.
can only be used by Mr. A till 28th Sept OR only for the 2 days
WHERE can (s)he use it from
Information can be linked to locations e.g. only 3rd floor office by private/public IP addresses
The dream …
Private and Confidential 14
• WHO can use the information
People & groups within and outside of the organization can be defined as rightful users of the information
• WHAT can each person doIndividual actions like reading, editing, printing,
distributing, copy-pasting, screen grabbing etc. can be controlled
• WHEN can he use itInformation usage can be time based e.g. can
only be used by Mr. A till 28th Sept OR only for the 2 days
• WHERE can he use it fromInformation can be linked to locations e.g. only
3rd floor office by private/public IP addresses
IRM allow enterprises to define, implement & audit information usage “policies”. A “policy” defines :
Information Rights Management - defined
Policy definition …
Private and Confidential 16
… Policy definition
Private and Confidential 17
Policy implementation
Private and Confidential 18
Policy implementation
Private and Confidential 19
Policy implementation
Private and Confidential 20
Policy implementation
Private and Confidential 21
Policy enforcement
Private and Confidential 22
Policy enforcement
Private and Confidential 23
Policy enforcement
Private and Confidential 24
Policy enforcement
Private and Confidential 25
Policy audits
Private and Confidential 26
Policy change
Private and Confidential 27
Policy change
Private and Confidential 28
Private and Confidential 29
What others say about us
Customer Speak - Fugro
Private and Confidential 30
Customer Speak - PurpleLeap
Private and Confidential 31
Customer Speak - Asian Paints
Private and Confidential 32
Customer Speak - HDFC Bank
Private and Confidential 33
Customer Speak - Larsen & Toubro
Private and Confidential 34
Analyst Speak - Gartner
Private and Confidential 35
Analyst Speak – Kuppinger Cole
Private and Confidential 36
Industry speak - Deloitte
Private and Confidential 37
Media speak
Private and Confidential 38
Private and Confidential 39
Partnerships & joint offerings
Company Product Product type
FileNet Content Management
Lotus Notes Mail and Messaging
Symantec DLP Data Loss Prevention
McAfee DLP Data Loss Prevention
Websense DLP Data Loss Prevention
SharePoint Content Management
Outlook Mail and Messaging
SAP ERP Transaction backbone
GTB DLP Data Loss Prevention
MyDLP DLP Data Loss Prevention
RSA DLP Data Loss Prevention
Omnidocs Content Management
Integrated Offerings
Private and Confidential 40
Thank you
www.seclore.com @secloretech