Title: Seclore FileSecure integrates with Microsoft Outlook
1 Seclore Filesecure MICROSOFT OUTLOOK Enhancing
security of MS OUTLOOK
2Contents
- Constraints of MS OUTLOOK security
- The Solution ..
- What is Seclore FileSecure
- Seclore FileSecure connector for Microsoft
Outlook - Assigning policies to E-mail in Microsoft Outlook
- Opening Email
- Accessing a protected file
- Audit trails
- Seclore FileSecure MS Outlook Features
- About Seclore
3MS Outlook and Security
A Typical E-Mail Sharing Scenario
SENDER
RECEIVER
It can further be Edited, Copied,
Printed, Distributed, Viewed (by others)
Once the file is sent to the RECEIVER, The
SENDER has no control on the file It can further
be Edited, Copied, Printed, Distributed, Viewed
(by others) !!
4Contents
- Constraints of MS OUTLOOK security
- The Solution ..
- What is Seclore FileSecure
- Seclore FileSecure connector for Microsoft
Outlook - Assigning policies to E-mail in Microsoft Outlook
- Opening Email
- Accessing a protected file
- Audit trails
- Seclore FileSecure MS Outlook Features
- About Seclore
5Seclore FileSecure
Seclore FileSecure allow enterprises to define,
implement audit information usage policies. A
policy defines
- WHO can use the information
- People groups within and outside of the
organization can be defined as rightful users of
the information - WHAT can each person do
- Individual actions like reading, editing,
printing, distributing, copy-pasting, screen
grabbing etc. can be controlled - WHEN can he use it
- Information usage can be time based e.g. can only
be used by Mr. A till 28th Sept OR only for the 2
days - WHERE can he use it from
- Information can be linked to locations e.g. only
3rd floor office by private/public IP addresses
6Seclore FileSecure
- Policies are
- Persistent Implemented on information and all
its copies wherever it is transmitted or stored - Dynamic Policies can be changed after
distributing information without having access to
or redistributing the information - Policies can be attached to information on
- Creation
- Placement in a certain location e.g. shared
folder - Attachment to email
- Uploading to a document management / ECM system
7Contents
- Constraints of MS OUTLOOK security
- The Solution ..
- What is Seclore FileSecure
- Seclore FileSecure connector for Microsoft
Outlook - Assigning policies to E-mail in Microsoft Outlook
- Opening Email
- Accessing a protected file
- Audit trails
- Seclore FileSecure MS Outlook Features
- About Seclore
8Opening E-Mail with Seclore FileSecure
SENDER
RECEIVER
When the e-mail is sent, Seclore FileSecure
protects the e-mail attachment and e-mail
content. The receiver has only restricted usage
rights (e.g. view only, edit print only, etc)
9Contents
- Constraints of MS OUTLOOK security
- The Solution ..
- What is Seclore FileSecure
- Seclore FileSecure connector for Microsoft
Outlook - Assigning policies to E-mail in Microsoft Outlook
- Opening Email
- Accessing a protected file
- Audit trails
- Seclore FileSecure MS Outlook Features
- About Seclore
10 Senders Computer
Sender clicks on secure send to apply policy to
e-mail attachment
11 Receivers
Senders Computer
Policy is defined as- a. WHO - people / groups
within or outside of the enterprise
12 Senders Computer
Policy is defined as b. WHAT - (VIEW, EDIT,
PRINT, FORWARD, )
13 Senders Computer
Policy is defined as- c. WHEN - date range, time
span,
14 Senders Computer
Policy is defined as- d. WHERE - Specific
computers, specific networks, only from the
office,
15Contents
- Constraints of MS OUTLOOK security
- The Solution ..
- What is Seclore FileSecure
- Seclore FileSecure connector for Microsoft
Outlook - Assigning policies to E-mail in Microsoft Outlook
- Opening Email
- Accessing a protected file
- Audit trails
- Seclore FileSecure MS Outlook Features
- About Seclore
16Receiver opens the protected e-mail
Receivers Computer
17Contents
- Constraints of MS OUTLOOK security
- The Solution ..
- What is Seclore FileSecure
- Seclore FileSecure connector for Microsoft
Outlook - Assigning policies to E-mail in Microsoft Outlook
- Opening Email
- Accessing a protected file
- Audit trails
- Seclore FileSecure MS Outlook Features
- About Seclore
18Receivers Computer
When the receiver opens the e-mail, he gets to
see the rights that he has on the e-mail
19Receivers Computer
If he tries to print.
20Receivers Computer
He will be restricted from printing !!
21Receivers Computer
If the receiver tries to copy data
22Receivers Computer
He will be restricted from copying data!!
23Receivers Computer
Even print-screen is blocked !!
24Contents
- Constraints of MS OUTLOOK security
- The Solution ..
- What is Seclore FileSecure
- Seclore FileSecure connector for Microsoft
Outlook - Assigning policies to E-mail in Microsoft Outlook
- Opening Email
- Accessing a protected file
- Audit trails
- Seclore FileSecure MS Outlook Features
- About Seclore
25Receivers Computer
The system also maintains a complete audit trail
of all the receivers actions, time even
location !!
26Contents
- Constraints of MS OUTLOOK security
- The Solution ..
- What is Seclore FileSecure
- Seclore FileSecure connector for Microsoft
Outlook - Assigning policies to E-mail in Microsoft Outlook
- Opening Email
- Accessing a protected file
- Audit trails
- Seclore FileSecure MS Outlook Features
- About Seclore
27(No Transcript)
28Contents
- Constraints of MS OUTLOOK security
- The Solution ..
- What is Seclore FileSecure
- Seclore FileSecure connector for Microsoft
Outlook - Assigning policies to E-mail in Microsoft Outlook
- Opening Email
- Accessing a protected file
- Audit trails
- Seclore FileSecure MS Outlook Features
- About Seclore
29Corporate Background
Seclore is a high growth software product
company. Seclores technology helps mitigate the
risks arising out of information breaches whilst
enhancing collaboration
6 years old, Headquartered in Mumbai,
India Promoted by IIT Bombay under the SINE
program - www.sineiitb.org Geographical and
customer presence in Middle East, ASEAN, SAARC
Europe Offerings focused on Information Rights
Management and Secure Outsourcing Stake holders
including IIT Bombay www.iitb.ac.in ICICI
Bank www.icicibank.com Ventureast
www.ventureast.net Technology and service
differentiators focusing on minimally intrusive
technology, value based pricing and usage without
training
30.Large financial services groups
Seclore user profile
.Diversified business groups
.Engineering and manufacturing organizations
Government and service providers
31What customers say about us
We chose Seclore FileSecure due to the
flexibility provided by Seclore in terms of
solution capabilities and customization.
Implementation of Seclore FileSecure has reduced
the exposure of critical data for potential
misuse or frauds. The business benefits are
tremendous. - Murli Nambiar, Head of
Information Security
"Financial services companies like banks,
insurance carriers broking are opening up
their information systems and processes for
participation by customers, partners and vendors.
This of course brings in a lot of value chain
integration and lowers costs but comes with
information security needs which cannot be solved
by present day systems. Seclores technology for
securing documents as they flow within and
outside enterprises as well as securing data
shared with outsourcing partners is extremely
relevant. - C N Ram. Group CIO, Essar group
32What industry experts say
Seclores approach is different in that they not
mandatory rely on such plug-ins but mainly act
below the application. The client component
(which is required to access protected, e.g.
encrypted, documents) tries to analyze the
activities off the application like access to the
file system. One impact of that approach is that
a document might be opened with different
applications supporting the specific document
format.
- Martin Kuppinger, One of the fore-most
information security analysts
Information breaches normally result in
intellectual property violation which is a
serious problem affecting industry today.
Seclores combination of preventive and
corrective methods of handling information
breaches is invaluable to any industry -
Haigreve Khaitan (Managing partner Khaitan and
Co)
Collaboration, security and privacy appear as
mutually conflicting goals with most present day
technologies. Seclore has resolved this conflict
in a very elegant manner with its technology.
- Animesh Parihar (Global Delivery Head SAP)
33Awards and recognition
Cool Vendors are interesting, new and innovative
vendors which organizations cannot afford to
ignore. Cool Vendors are those vendors that have
caught Gartner's interest because they offer
innovative and intriguing technologies or
solutions.
Deloitte Technology Fast 50 is a ranking compiled
every year based on percentage of growth of
fiscal year revenue over three years. The
companies must also fulfil other criterion of
technology orientation.
34 Awards and recognition
Hidden Gems 2010 by Kuppinger Cole, Europes
leading information security analyst firm is a
report which lists vendors, which have a
significantly differentiated offering and are
market leaders in a particular segment.
The TR35 award is for innovators whose
inventions and research, Massachusetts Institute
of Technology (MIT) finds exciting. Technology
Review, owned and published by MIT, is the
worlds oldest technology magazine.
35 Awards and recognition
Innovations ideas in practice is an annual
event honoring researchers and innovators for
creative and innovative work in the sphere of
science and technology. The innovation needs to
have a high degree of practical relevance to
change everyday life.
36More Info? www.seclore.com 91-22-6130-4200
36