Title: Seclore FileSecure for AutoCAD files
1 Seclore filesecure autocad
2Contents
- Constraints of AutoCad security
- The Solution ..
- What is Seclore FileSecure
- Seclore FileSecure connector for AutoCad
- Assigning policies to AutoCad document
- Accessing a protected AutoCad document
- Audit trails
- Business Scenarios
- About Seclore
3AutoCad and Security
SENDER
RECEIVER
Un-protected File
AutoCad files
Once the AutoCad File is sent it can be Edited,
Copied, Printed, Distributed etc.
4Contents
- Constraints of AutoCad security
- The Solution ..
- What is Seclore FileSecure
- Seclore FileSecure connector for AutoCad
- Assigning policies to AutoCad document
- Accessing a protected AutoCad document
- Audit trails
- Business Scenarios
- About Seclore
5Seclore FileSecure
Seclore FileSecure allow enterprises to define,
implement audit information usage policies. A
policy defines
- WHO can use the information
- People groups within and outside of the
organization can be defined as rightful users of
the information - WHAT can each person do
- Individual actions like reading, editing,
printing, distributing, copy-pasting, screen
grabbing etc. can be controlled - WHEN can he use it
- Information usage can be time based e.g. can only
be used by Mr. A till 28th Sept OR only for the 2
days - WHERE can he use it from
- Information can be linked to locations e.g. only
3rd floor office by private/public IP addresses
6Seclore FileSecure
- Policies are
- Persistent Implemented on information and all
its copies wherever it is transmitted or stored - Dynamic Policies can be changed after
distributing information without having access to
or redistributing the information - Policies can be attached to information on
- Creation
- Placement in a certain location e.g. shared
folder - Attachment to email
- Uploading to a document management / ECM system
7Contents
- Constraints of AutoCad security
- The Solution ..
- What is Seclore FileSecure
- Seclore FileSecure connector for AutoCad
- Assigning policies to AutoCad document
- Accessing a protected AutoCad document
- Audit trails
- Business Scenarios
- About Seclore
8Opening AutoCad document with Seclore FileSecure
SENDER
RECEIVER
Edited
Copied
Printed
Protected AutoCad Document
Viewed
Distributed
When the Seclore FileSecure protected AutoCad
document is sent, the receiver has only
restricted usage rights (e.g. view only, edit
print only, etc)
AutoCad files
9Contents
- Constraints of AutoCad security
- The Solution ..
- What is Seclore FileSecure
- Seclore FileSecure connector for AutoCad
- Assigning policies to AutoCad document
- Accessing a protected AutoCad document
- Audit trails
- Business Scenarios
- About Seclore
10Protection defining usage policy on document
Senders Computer
11 Internal Users
External Users
- Policy is defined as-
- a. WHO - people / groups within or outside
- of the enterprise
Senders Computer
12Senders Computer
- Policy is defined as
- b. WHAT - (VIEW, EDIT, PRINT,
- FORWARD, )
13Senders Computer
Policy is defined as- c. WHEN - date range, time
span,
14Senders Computer
- Policy is defined as-
- d. WHERE - Specific computers, specific
networks, only from the office,
15Contents
- Constraints of AutoCad security
- The Solution ..
- What is Seclore FileSecure
- Seclore FileSecure connector for AutoCad
- Assigning policies to AutoCad document
- Accessing a protected AutoCad document
- Audit trails
- Business Scenarios
- About Seclore
16After the policy is defined, the document gets
protected. Notice the red lock
Senders Computer
17When the user opens the file, he gets to see the
rights that he has on the document
Receivers Computer
18If he tries to print.
Receivers Computer
19He will be restricted from printing !!
Receivers Computer
20If he tries to copy.
Receivers Computer
21He will be restricted from copying data!!
Receivers Computer
22Even print-screen is blocked !!
Receivers Computer
23Contents
- Constraints of AutoCad security
- The Solution ..
- What is Seclore FileSecure
- Seclore FileSecure connector for AutoCad
- Assigning policies to AutoCad document
- Accessing a protected AutoCad document
- Audit trails
- Business Scenarios
- About Seclore
24- The system also maintains a complete audit trail
of all the user actions, time even location !!
Receivers Computer
25Contents
- Constraints of AutoCad security
- The Solution ..
- What is Seclore FileSecure
- Seclore FileSecure connector for AutoCad
- Assigning policies to AutoCad document
- Accessing a protected AutoCad document
- Audit trails
- Business Scenarios
- About Seclore
26Business Case - 1
Do you have confidential CAD drawings which only
a specific employee group, while in employment,
should use?
Seclore FileSecure protects information from
leakage due to malicious intent, errors and
omissions, as well as lack of awareness, by
providing a persistent, information-locked method
of protection. This means that confidential/IP
information remains confidential post
distribution.
CAD drawings, formulation sheets, process
documents and MIS reports are just some examples
of information which are best used only within
the walls of the enterprise Malicious intent,
errors and omissions and lack of awareness could
make this information publicly available leading
to potential losses.
27Business Case - 2
Do you frequently establish
temporary / project-based relationships with
manufactures contractors?
Seclore FileSecure enables you to retract
project files shared with business partners after
a specified period, thus protecting intellectual
property and driving revenues. This means that
collaboration with partners can now become open
and free.
Temporary relationships with manufacturers
contractors for a specific project typically
leads to extensive information sharing during the
execution. After the project ends, the
drawings intellectual property shared continues
to be retained and used by the partner, sometimes
against the enterprise, leading to financial
losses.
28Business Case - 3
Do you send sensitive CAD designs to
manufacturers to execute a business process?
Seclore FileSecure enables you to control the
usage of information sent to vendors and prevent
unauthorized viewing, printing, editing and
distributing of the information.
Information can also be remotely made
unusable in case the relationship ends.
Typically confidential information sent to
manufacturers is governed by non disclosure
agreements without a mechanism to enforce or
track the agreement. Therefore you are dependent
on the vendors' systems and processes for the
confidentiality of your critical information.
Loss of information from the vendor could lead
to reputation and legal risks for your enterprise.
29Contents
- Constraints of AutoCad security
- The Solution ..
- What is Seclore FileSecure
- Seclore FileSecure connector for AutoCad
- Assigning policies to AutoCad document
- Accessing a protected AutoCad document
- Audit trails
- Business Scenarios
- About Seclore
30Corporate Background
Seclore is a high growth software product
company. Seclores technology helps mitigate the
risks arising out of information breaches whilst
enhancing collaboration
- 6 years old, Headquartered in Mumbai, India
- Promoted by IIT Bombay under the SINE program -
www.sineiitb.org - Geographical and customer presence in Middle
East, ASEAN, SAARC Europe - Offerings focused on Information Rights
Management and Secure Outsourcing - Stake holders including
- IIT Bombay www.iitb.ac.in
- ICICI Bank www.icicibank.com
- Ventureast www.ventureast.net
- Technology and service differentiators focusing
on minimally intrusive technology, value based
pricing and usage without training
31.Large financial services groups
Seclore user profile
.Diversified business groups
32What customers say about us
We chose Seclore FileSecure due to the
flexibility provided by Seclore in terms of
solution capabilities and customization.
Implementation of Seclore FileSecure has reduced
the exposure of critical data for potential
misuse or frauds. The business benefits are
tremendous. - Murli Nambiar, Head of
Information Security
"Financial services companies like banks,
insurance carriers broking are opening up
their information systems and processes for
participation by customers, partners and vendors.
This of course brings in a lot of value chain
integration and lowers costs but comes with
information security needs which cannot be solved
by present day systems. Seclores technology for
securing documents as they flow within and
outside enterprises as well as securing data
shared with outsourcing partners is extremely
relevant. - C N Ram. Group CIO, Essar group
33What industry experts say
Seclores approach is different in that they not
mandatory rely on such plug-ins but mainly act
below the application. The client component
(which is required to access protected, e.g.
encrypted, documents) tries to analyze the
activities off the application like access to the
file system. One impact of that approach is that
a document might be opened with different
applications supporting the specific document
format.
- Martin Kuppinger, One of the fore-most
information security analysts
Information breaches normally result in
intellectual property violation which is a
serious problem affecting industry today.
Seclores combination of preventive and
corrective methods of handling information
breaches is invaluable to any industry -
Haigreve Khaitan (Managing partner Khaitan and
Co)
Collaboration, security and privacy appear as
mutually conflicting goals with most present day
technologies. Seclore has resolved this conflict
in a very elegant manner with its technology.
- Animesh Parihar (Global Delivery Head SAP)
34Awards and recognition
Cool Vendors are interesting, new and innovative
vendors which organizations cannot afford to
ignore. Cool Vendors are those vendors that have
caught Gartner's interest because they offer
innovative and intriguing technologies or
solutions.
Deloitte Technology Fast 50 is a ranking compiled
every year based on percentage of growth of
fiscal year revenue over three years. The
companies must also fulfil other criterion of
technology orientation.
35 Awards and recognition
Hidden Gems 2010 by Kuppinger Cole, Europes
leading information security analyst firm is a
report which lists vendors, which have a
significantly differentiated offering and are
market leaders in a particular segment.
The TR35 award is for innovators whose
inventions and research, Massachusetts Institute
of Technology (MIT) finds exciting. Technology
Review, owned and published by MIT, is the
worlds oldest technology magazine.
36 Awards and recognition
Innovations ideas in practice is an annual
event honoring researchers and innovators for
creative and innovative work in the sphere of
science and technology. The innovation needs to
have a high degree of practical relevance to
change everyday life.
37More Info? www.seclore.com 91-22-6130-4200