Seclore FileSecure for AutoCAD files - PowerPoint PPT Presentation

About This Presentation
Title:

Seclore FileSecure for AutoCAD files

Description:

: AutoCAD users can now benefit from the leading Information Rights Management (IRM) solution for native protection of AutoCAD files. Seclore FileSecure will help engineering companies protect designs and drawings shared with business partners without worrying about data misuse or theft. – PowerPoint PPT presentation

Number of Views:104
Slides: 38
Provided by: gilberteric1

less

Transcript and Presenter's Notes

Title: Seclore FileSecure for AutoCAD files


1
Seclore filesecure autocad
2
Contents
  • Constraints of AutoCad security
  • The Solution ..
  • What is Seclore FileSecure
  • Seclore FileSecure connector for AutoCad
  • Assigning policies to AutoCad document
  • Accessing a protected AutoCad document
  • Audit trails
  • Business Scenarios
  • About Seclore

3
AutoCad and Security
SENDER
RECEIVER
Un-protected File
AutoCad files
Once the AutoCad File is sent it can be Edited,
Copied, Printed, Distributed etc.
4
Contents
  • Constraints of AutoCad security
  • The Solution ..
  • What is Seclore FileSecure
  • Seclore FileSecure connector for AutoCad
  • Assigning policies to AutoCad document
  • Accessing a protected AutoCad document
  • Audit trails
  • Business Scenarios
  • About Seclore

5
Seclore FileSecure
Seclore FileSecure allow enterprises to define,
implement audit information usage policies. A
policy defines
  • WHO can use the information
  • People groups within and outside of the
    organization can be defined as rightful users of
    the information
  • WHAT can each person do
  • Individual actions like reading, editing,
    printing, distributing, copy-pasting, screen
    grabbing etc. can be controlled
  • WHEN can he use it
  • Information usage can be time based e.g. can only
    be used by Mr. A till 28th Sept OR only for the 2
    days
  • WHERE can he use it from
  • Information can be linked to locations e.g. only
    3rd floor office by private/public IP addresses

6
Seclore FileSecure
  • Policies are
  • Persistent Implemented on information and all
    its copies wherever it is transmitted or stored
  • Dynamic Policies can be changed after
    distributing information without having access to
    or redistributing the information
  • Policies can be attached to information on
  • Creation
  • Placement in a certain location e.g. shared
    folder
  • Attachment to email
  • Uploading to a document management / ECM system

7
Contents
  • Constraints of AutoCad security
  • The Solution ..
  • What is Seclore FileSecure
  • Seclore FileSecure connector for AutoCad
  • Assigning policies to AutoCad document
  • Accessing a protected AutoCad document
  • Audit trails
  • Business Scenarios
  • About Seclore

8
Opening AutoCad document with Seclore FileSecure
SENDER
RECEIVER
Edited
Copied
Printed
Protected AutoCad Document
Viewed
Distributed
When the Seclore FileSecure protected AutoCad
document is sent, the receiver has only
restricted usage rights (e.g. view only, edit
print only, etc)
AutoCad files
9
Contents
  • Constraints of AutoCad security
  • The Solution ..
  • What is Seclore FileSecure
  • Seclore FileSecure connector for AutoCad
  • Assigning policies to AutoCad document
  • Accessing a protected AutoCad document
  • Audit trails
  • Business Scenarios
  • About Seclore

10
Protection defining usage policy on document
Senders Computer
11
Internal Users
External Users
  • Policy is defined as-
  • a. WHO - people / groups within or outside
  • of the enterprise

Senders Computer
12
Senders Computer
  • Policy is defined as
  • b. WHAT - (VIEW, EDIT, PRINT,
  • FORWARD, )

13
Senders Computer
Policy is defined as- c. WHEN - date range, time
span,
14
Senders Computer
  • Policy is defined as-
  • d. WHERE - Specific computers, specific
    networks, only from the office,

15
Contents
  • Constraints of AutoCad security
  • The Solution ..
  • What is Seclore FileSecure
  • Seclore FileSecure connector for AutoCad
  • Assigning policies to AutoCad document
  • Accessing a protected AutoCad document
  • Audit trails
  • Business Scenarios
  • About Seclore

16
After the policy is defined, the document gets
protected. Notice the red lock
Senders Computer
17
When the user opens the file, he gets to see the
rights that he has on the document
Receivers Computer
18
If he tries to print.
Receivers Computer
19
He will be restricted from printing !!
Receivers Computer
20
If he tries to copy.
Receivers Computer
21
He will be restricted from copying data!!
Receivers Computer
22
Even print-screen is blocked !!
Receivers Computer
23
Contents
  • Constraints of AutoCad security
  • The Solution ..
  • What is Seclore FileSecure
  • Seclore FileSecure connector for AutoCad
  • Assigning policies to AutoCad document
  • Accessing a protected AutoCad document
  • Audit trails
  • Business Scenarios
  • About Seclore

24
  • The system also maintains a complete audit trail
    of all the user actions, time even location !!

Receivers Computer
25
Contents
  • Constraints of AutoCad security
  • The Solution ..
  • What is Seclore FileSecure
  • Seclore FileSecure connector for AutoCad
  • Assigning policies to AutoCad document
  • Accessing a protected AutoCad document
  • Audit trails
  • Business Scenarios
  • About Seclore

26
Business Case - 1
Do you have confidential CAD drawings which only
a specific employee group, while in employment,
should use?
Seclore FileSecure protects information from
leakage due to malicious intent, errors and
omissions, as well as lack of awareness, by
providing a persistent, information-locked method
of protection. This means that confidential/IP
information remains confidential post
distribution.
CAD drawings, formulation sheets, process
documents and MIS reports are just some examples
of information which are best used only within
the walls of the enterprise Malicious intent,
errors and omissions and lack of awareness could
make this information publicly available leading
to potential losses.
27
Business Case - 2
Do you frequently establish
temporary / project-based relationships with
manufactures contractors?
Seclore FileSecure enables you to retract
project files shared with business partners after
a specified period, thus protecting intellectual
property and driving revenues. This means that
collaboration with partners can now become open
and free.
Temporary relationships with manufacturers
contractors for a specific project typically
leads to extensive information sharing during the
execution. After the project ends, the
drawings intellectual property shared continues
to be retained and used by the partner, sometimes
against the enterprise, leading to financial
losses.
28
Business Case - 3
Do you send sensitive CAD designs to
manufacturers to execute a business process?
Seclore FileSecure enables you to control the
usage of information sent to vendors and prevent
unauthorized viewing, printing, editing and
distributing of the information.
Information can also be remotely made
unusable in case the relationship ends.
Typically confidential information sent to
manufacturers is governed by non disclosure
agreements without a mechanism to enforce or
track the agreement. Therefore you are dependent
on the vendors' systems and processes for the
confidentiality of your critical information.
Loss of information from the vendor could lead
to reputation and legal risks for your enterprise.
29
Contents
  • Constraints of AutoCad security
  • The Solution ..
  • What is Seclore FileSecure
  • Seclore FileSecure connector for AutoCad
  • Assigning policies to AutoCad document
  • Accessing a protected AutoCad document
  • Audit trails
  • Business Scenarios
  • About Seclore

30
Corporate Background
Seclore is a high growth software product
company. Seclores technology helps mitigate the
risks arising out of information breaches whilst
enhancing collaboration
  • 6 years old, Headquartered in Mumbai, India
  • Promoted by IIT Bombay under the SINE program -
    www.sineiitb.org
  • Geographical and customer presence in Middle
    East, ASEAN, SAARC Europe
  • Offerings focused on Information Rights
    Management and Secure Outsourcing
  • Stake holders including
  • IIT Bombay www.iitb.ac.in
  • ICICI Bank www.icicibank.com
  • Ventureast www.ventureast.net
  • Technology and service differentiators focusing
    on minimally intrusive technology, value based
    pricing and usage without training

31
.Large financial services groups
Seclore user profile
.Diversified business groups
32
What customers say about us
We chose Seclore FileSecure due to the
flexibility provided by Seclore in terms of
solution capabilities and customization.
Implementation of Seclore FileSecure has reduced
the exposure of critical data for potential
misuse or frauds. The business benefits are
tremendous. - Murli Nambiar, Head of
Information Security
"Financial services companies like banks,
insurance carriers broking are opening up
their information systems and processes for
participation by customers, partners and vendors.
This of course brings in a lot of value chain
integration and lowers costs but comes with
information security needs which cannot be solved
by present day systems. Seclores technology for
securing documents as they flow within and
outside enterprises as well as securing data
shared with outsourcing partners is extremely
relevant. - C N Ram. Group CIO, Essar group
33
What industry experts say
Seclores approach is different in that they not
mandatory rely on such plug-ins but mainly act
below the application. The client component
(which is required to access protected, e.g.
encrypted, documents) tries to analyze the
activities off the application like access to the
file system. One impact of that approach is that
a document might be opened with different
applications supporting the specific document
format.
- Martin Kuppinger, One of the fore-most
information security analysts
Information breaches normally result in
intellectual property violation which is a
serious problem affecting industry today.
Seclores combination of preventive and
corrective methods of handling information
breaches is invaluable to any industry -
Haigreve Khaitan (Managing partner Khaitan and
Co)
Collaboration, security and privacy appear as
mutually conflicting goals with most present day
technologies. Seclore has resolved this conflict
in a very elegant manner with its technology.
- Animesh Parihar (Global Delivery Head SAP)
34
Awards and recognition
Cool Vendors are interesting, new and innovative
vendors which organizations cannot afford to
ignore. Cool Vendors are those vendors that have
caught Gartner's interest because they offer
innovative and intriguing technologies or
solutions.
Deloitte Technology Fast 50 is a ranking compiled
every year based on percentage of growth of
fiscal year revenue over three years. The
companies must also fulfil other criterion of
technology orientation.
35
Awards and recognition
Hidden Gems 2010 by Kuppinger Cole, Europes
leading information security analyst firm is a
report which lists vendors, which have a
significantly differentiated offering and are
market leaders in a particular segment.
The TR35 award is for innovators whose
inventions and research, Massachusetts Institute
of Technology (MIT) finds exciting. Technology
Review, owned and published by MIT, is the
worlds oldest technology magazine.
36
Awards and recognition
Innovations ideas in practice is an annual
event honoring researchers and innovators for
creative and innovative work in the sphere of
science and technology. The innovation needs to
have a high degree of practical relevance to
change everyday life.
37
More Info? www.seclore.com 91-22-6130-4200
Write a Comment
User Comments (0)
About PowerShow.com