Seclore FileSecure for AutoCAD files
-
Upload
gilberteric-eric -
Category
Documents
-
view
260 -
download
5
description
Transcript of Seclore FileSecure for AutoCAD files
Click to edit Master subtitle style
Seclore filesecureautocad
Contents
• Constraints of AutoCad security
• The Solution ..• What is Seclore FileSecure• Seclore FileSecure connector for AutoCad• Assigning policies to AutoCad document• Accessing a protected AutoCad document• Audit trails• Business Scenarios
• About Seclore
AutoCad and Security
Edited
Copied
Printed
ViewedUn-protected File
Distributed
AutoCad files
Once the AutoCad File is sent it can be Edited, Copied, Printed, Distributed etc….
SENDERRECEIVER
Contents
• Constraints of AutoCad security
• The Solution ..• What is Seclore FileSecure• Seclore FileSecure connector for AutoCad• Assigning policies to AutoCad document• Accessing a protected AutoCad document• Audit trails• Business Scenarios
• About Seclore
• WHO can use the information
People & groups within and outside of the organization can be defined as rightful users of the information
• WHAT can each person doIndividual actions like reading, editing, printing,
distributing, copy-pasting, screen grabbing etc. can be controlled
• WHEN can he use itInformation usage can be time based e.g. can
only be used by Mr. A till 28th Sept OR only for the 2 days
• WHERE can he use it fromInformation can be linked to locations e.g. only
3rd floor office by private/public IP addresses
Seclore FileSecure allow enterprises to define, implement & audit information usage “policies”. A “policy” defines :
Seclore FileSecure
• Policies are– Persistent: Implemented on information and all its copies
wherever it is transmitted or stored– Dynamic: Policies can be changed after distributing
information without having access to or redistributing the information
• Policies can be attached to information on– Creation– Placement in a certain location e.g. shared folder– Attachment to email– Uploading to a document management / ECM system– …
Seclore FileSecure
Contents
• Constraints of AutoCad security
• The Solution ..• What is Seclore FileSecure• Seclore FileSecure connector for
AutoCad• Assigning policies to AutoCad document• Accessing a protected AutoCad document• Audit trails• Business Scenarios
• About Seclore
Opening AutoCad document with Seclore FileSecureSENDERRECEIVER
When the Seclore FileSecure protected AutoCad document is sent, the receiver has only restricted usage rights (e.g. view only, edit +
print only, etc)
Edited
Copied
Printed
Viewed
Protected AutoCadDocument
Distributed
AutoCad files
Contents
• Constraints of AutoCad security
• The Solution ..• What is Seclore FileSecure• Seclore FileSecure connector for AutoCad• Assigning policies to AutoCad
document• Accessing a protected AutoCad document• Audit trails• Business Scenarios
• About Seclore
Protection – defining usage policy on documentSender’s
Computer
Policy is defined as-a. WHO - people / groups within or outside
of the enterprise
Sender’sComputer
Internal Users
External Users
Sender’sComputer Policy is defined as
b. WHAT - (VIEW, EDIT, PRINT, FORWARD,… )
Sender’sComputer
Policy is defined as-c. WHEN - date range, time span, …
Sender’sComputer
Policy is defined as- d. WHERE - Specific computers, specific networks, only
from the office, …
Contents
• Constraints of AutoCad security
• The Solution ..• What is Seclore FileSecure• Seclore FileSecure connector for AutoCad• Assigning policies to AutoCad document• Accessing a protected AutoCad
document• Audit trails• Business Scenarios
• About Seclore
After the policy is defined, the document gets protected. Notice the “red” lock
Sender’sComputer
When the user opens the file, he gets to see the rights that he has on the document
Receiver’s Computer
If he tries to print…. Receiver’s
Computer
He will be restricted from printing !! Receiver’s
Computer
If he tries to copy…. Receiver’s
Computer
He will be restricted from copying data!! Receiver’s
Computer
Even print-screen is blocked !! Receiver’s
Computer
Contents
• Constraints of AutoCad security
• The Solution ..• What is Seclore FileSecure• Seclore FileSecure connector for AutoCad• Assigning policies to AutoCad document• Accessing a protected AutoCad document• Audit trails• Business Scenarios
• About Seclore
The system also maintains a complete audit trail of all the user actions, time & even location !!
Receiver’s Computer
Contents
• Constraints of AutoCad security
• The Solution ..• What is Seclore FileSecure• Seclore FileSecure connector for AutoCad• Assigning policies to AutoCad document• Accessing a protected AutoCad document• Audit trails• Business Scenarios
• About Seclore
Business Case - 1
Do you have confidential CAD drawings which only a specific employee group, while in employment, should use?
CAD drawings, formulation sheets, process documents and MIS reports are just some examples of information which are best used only within the walls of the enterprise
Malicious intent, errors and omissions and lack of awareness could make this information publicly available leading topotential losses.
Seclore FileSecure protects information from leakage due to malicious intent, errors and omissions, as well as lack of awareness, by providing a persistent, information-locked method of protection.
This means that confidential/IP information remains confidential post distribution.
Business Case - 2
Do you frequently establish temporary / project-based relationships with manufactures & contractors?
Temporary relationships with manufacturers & contractors for a specific project typically leads to extensive information sharing during the execution.
After the project ends, the drawings & intellectual property shared continues to be retained and used by the partner, sometimes against the enterprise, leading to financial losses.
Seclore FileSecure enables you to “retract” project files shared with business partners after a specified period, thus protecting intellectual property and driving revenues.
This means that collaboration with partners can now become open and free.
Business Case - 3
Do you send sensitive CAD designs to manufacturers to execute a
business process?
Typically confidential information sent to manufacturers is governed by non disclosure agreements without a mechanism to enforce or track the agreement. Therefore you are dependent on the vendors' systems and processes for the confidentiality of your critical information.
Loss of information from the vendor could lead to reputation and legal risks for your enterprise.
Seclore FileSecure enables you to control the usage of information sent to vendors and prevent unauthorized viewing, printing, editing and distributing of the information.
Information can also be remotely made unusable in case the relationship ends.
Contents
• Constraints of AutoCad security
• The Solution ..• What is Seclore FileSecure• Seclore FileSecure connector for AutoCad• Assigning policies to AutoCad document• Accessing a protected AutoCad document• Audit trails• Business Scenarios
• About Seclore
Corporate Background …
“Seclore is a high growth software product company. Seclore’s technology helps mitigate the risks arising out of information breaches whilst
enhancing collaboration”
6 years old, Headquartered in Mumbai, IndiaPromoted by IIT Bombay under the SINE program - www.sineiitb.org Geographical and customer presence in Middle East, ASEAN, SAARC & Europe
Offerings focused on Information Rights Management and Secure Outsourcing
Stake holders including
IIT Bombay – www.iitb.ac.in
ICICI Bank – www.icicibank.com
Ventureast – www.ventureast.net
Technology and service differentiators focusing on minimally intrusive technology, value based pricing and usage without training
Seclore user profile…….Diversified business groups
….Engineering and manufacturing organizations
…Government and service providers
What customers say about us …
“We chose Seclore FileSecure due to the flexibility provided by Seclore in terms of solution capabilities and customization. Implementation of Seclore FileSecure has reduced the exposure of critical data for potential misuse or frauds. The business benefits are tremendous.” - Murli Nambiar, Head of Information Security
"Financial services companies like banks, insurance carriers & broking are ‘opening up’ their information systems and processes for participation by customers, partners and vendors. This of course brings in a lot of value chain integration and lowers costs but comes with information security needs which cannot be solved by present day systems. Seclore’s technology for securing documents as they flow within and outside enterprises as well as securing data shared with outsourcing partners is extremely relevant. - C N Ram. Group CIO, Essar group
What industry experts say …
“Information breaches normally result in intellectual property violation which is a serious problem affecting industry today. Seclore’s combination of preventive and corrective methods of handling information breaches is invaluable to any industry” - Haigreve Khaitan (Managing partner – Khaitan and Co)
“Collaboration, security and privacy appear as mutually conflicting goals with most present day technologies. Seclore has resolved this conflict in a very elegant manner with its technology.” - Animesh Parihar (Global Delivery Head – SAP)
Seclore’s approach is different in that they not mandatory rely on such plug-ins but mainly act “below” the application. The client component (which is required to access protected, e.g. encrypted, documents) tries to analyze the activities off the application like access to the file system. One impact of that approach is that a document might be opened with different applications supporting the specific document format.
- Martin Kuppinger, One of the fore-most information security analysts
Deloitte Technology Fast 50 is a ranking compiled every year based on percentage of growth of fiscal year revenue over three years. The companies must also fulfil other criterion of technology orientation.
Awards and recognition …
Cool Vendors are “interesting, new and innovative vendors” which “organizations cannot afford to ignore”. Cool Vendors are those vendors that have caught Gartner's interest because they offer innovative and intriguing technologies or solutions.
… Awards and recognition
The TR35 award is for innovators whose inventions and research, Massachusetts Institute of Technology (MIT) finds exciting. Technology Review, owned and published by MIT, is the world’s oldest technology magazine.
‘Hidden Gems’ 2010 by Kuppinger Cole, Europe’s leading information security analyst firm is a report which lists vendors, which have a significantly differentiated offering and are market leaders in a particular segment.
“Innovations – ideas in practice” is an annual event honoring researchers and innovators for creative and innovative work in the sphere of science and technology. The innovation needs to have a high degree of practical relevance to change everyday life.
… Awards and recognition
More Info?
www.seclore.com+91-22-6130-4200
3737