1 / 37

Seclore FileSecure for AutoCAD files

http://www.seclore.com/autocad.html : AutoCAD users can now benefit from the leading Information Rights Management (IRM) solution for native protection of AutoCAD files. Seclore FileSecure will help engineering companies protect designs and drawings shared with business partners without worrying about data misuse or theft.

gilberteric
Download Presentation

Seclore FileSecure for AutoCAD files

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Seclore filesecure autocad

  2. Contents • Constraints of AutoCad security • The Solution .. • What is Seclore FileSecure • Seclore FileSecure connector for AutoCad • Assigning policies to AutoCad document • Accessing a protected AutoCad document • Audit trails • Business Scenarios • About Seclore

  3. AutoCad and Security RECEIVER SENDER Edited Copied Printed Viewed Distributed Un-protected File AutoCad files Once the AutoCad File is sent it can be Edited, Copied, Printed, Distributed etc….

  4. Contents • Constraints of AutoCad security • The Solution .. • What is Seclore FileSecure • Seclore FileSecure connector for AutoCad • Assigning policies to AutoCad document • Accessing a protected AutoCad document • Audit trails • Business Scenarios • About Seclore

  5. Seclore FileSecure Seclore FileSecure allow enterprises to define, implement & audit information usage “policies”. A “policy” defines : • WHO can use the information People & groups within and outside of the organization can be defined as rightful users of the information • WHATcan each person do Individual actions like reading, editing, printing, distributing, copy-pasting, screen grabbing etc. can be controlled • WHEN can he use it Information usage can be time based e.g. can only be used by Mr. A till 28th Sept OR only for the 2 days • WHERE can he use it from Information can be linked to locations e.g. only 3rd floor office by private/public IP addresses

  6. SecloreFileSecure • Policies are • Persistent: Implemented on information and all its copies wherever it is transmitted or stored • Dynamic: Policies can be changed after distributing information without having access to or redistributing the information • Policies can be attached to information on • Creation • Placement in a certain location e.g. shared folder • Attachment to email • Uploading to a document management / ECM system • …

  7. Contents • Constraints of AutoCad security • The Solution .. • What is Seclore FileSecure • Seclore FileSecure connector for AutoCad • Assigning policies to AutoCad document • Accessing a protected AutoCad document • Audit trails • Business Scenarios • About Seclore

  8. Opening AutoCad document with Seclore FileSecure RECEIVER SENDER Edited Copied Printed Protected AutoCad Document Viewed Distributed AutoCad files When the Seclore FileSecure protected AutoCad document is sent, the receiver has only restricted usage rights (e.g. view only, edit + print only, etc)

  9. Contents • Constraints of AutoCad security • The Solution .. • What is Seclore FileSecure • Seclore FileSecure connector for AutoCad • Assigning policies to AutoCad document • Accessing a protected AutoCad document • Audit trails • Business Scenarios • About Seclore

  10. Sender’s Computer Protection – defining usage policy on document

  11. Internal Users External Users Sender’s Computer Policy is defined as- a. WHO - people / groups within or outside of the enterprise

  12. Sender’s Computer Policy is defined as b. WHAT - (VIEW, EDIT, PRINT, FORWARD,… )

  13. Sender’s Computer Policy is defined as- c. WHEN - date range, time span, …

  14. Sender’s Computer Policy is defined as- d. WHERE - Specific computers, specific networks, only from the office, …

  15. Contents • Constraints of AutoCad security • The Solution .. • What is Seclore FileSecure • Seclore FileSecure connector for AutoCad • Assigning policies to AutoCad document • Accessing a protected AutoCad document • Audit trails • Business Scenarios • About Seclore

  16. Sender’s Computer After the policy is defined, the document gets protected. Notice the “red” lock

  17. Receiver’s Computer When the user opens the file, he gets to see the rights that he has on the document

  18. Receiver’s Computer If he tries to print….

  19. Receiver’s Computer He will be restricted from printing !!

  20. Receiver’s Computer If he tries to copy….

  21. Receiver’s Computer He will be restricted from copying data!!

  22. Receiver’s Computer Even print-screen is blocked !!

  23. Contents • Constraints of AutoCad security • The Solution .. • What is Seclore FileSecure • Seclore FileSecure connector for AutoCad • Assigning policies to AutoCad document • Accessing a protected AutoCad document • Audit trails • Business Scenarios • About Seclore

  24. Receiver’s Computer The system also maintains a complete audit trail of all the user actions, time & even location !!

  25. Contents • Constraints of AutoCad security • The Solution .. • What is Seclore FileSecure • Seclore FileSecure connector for AutoCad • Assigning policies to AutoCad document • Accessing a protected AutoCad document • Audit trails • Business Scenarios • About Seclore

  26. Business Case - 1 Do you have confidential CAD drawings which only a specific employee group, while in employment, should use? Seclore FileSecure protects information from leakage due to malicious intent, errors and omissions, as well as lack of awareness, by providing a persistent, information-locked method of protection. This means that confidential/IP information remains confidential post distribution. CAD drawings, formulation sheets, process documents and MIS reports are just some examples of information which are best used only within the walls of the enterprise Malicious intent, errors and omissions and lack of awareness could make this information publicly available leading to potential losses.

  27. Business Case - 2 Do you frequently establish temporary / project-based relationships with manufactures & contractors? Seclore FileSecure enables you to “retract” project files shared with business partners after a specified period, thus protecting intellectual property and driving revenues. This means that collaboration with partners can now become open and free. Temporary relationships with manufacturers & contractors for a specific project typically leads to extensive information sharing during the execution. After the project ends, the drawings & intellectual property shared continues to be retained and used by the partner, sometimes against the enterprise, leading to financial losses.

  28. Business Case - 3 Do you send sensitive CAD designs to manufacturers to execute a business process? Seclore FileSecure enables you to control the usage of information sent to vendors and prevent unauthorized viewing, printing, editing and distributing of the information. Information can also be remotely made unusable in case the relationship ends. Typically confidential information sent to manufacturers is governed by non disclosure agreements without a mechanism to enforce or track the agreement. Therefore you are dependent on the vendors' systems and processes for the confidentiality of your critical information. Loss of information from the vendor could lead to reputation and legal risks for your enterprise.

  29. Contents • Constraints of AutoCad security • The Solution .. • What is Seclore FileSecure • Seclore FileSecure connector for AutoCad • Assigning policies to AutoCad document • Accessing a protected AutoCad document • Audit trails • Business Scenarios • About Seclore

  30. Corporate Background … “Seclore is a high growth software product company. Seclore’s technology helps mitigate the risks arising out of information breaches whilst enhancing collaboration” 6 years old, Headquartered in Mumbai, India Promoted by IIT Bombay under the SINE program - www.sineiitb.org Geographical and customer presence in Middle East, ASEAN, SAARC & Europe Offerings focused on Information Rights Management and Secure Outsourcing Stake holders including IIT Bombay – www.iitb.ac.in ICICI Bank – www.icicibank.com Ventureast – www.ventureast.net Technology and service differentiators focusing on minimally intrusive technology, value based pricing and usage without training

  31. ….Large financial services groups Seclore user profile… ….Diversified business groups ….Engineering and manufacturing organizations …Government and service providers

  32. What customers say about us … “We chose Seclore FileSecure due to the flexibility provided by Seclore in terms of solution capabilities and customization. Implementation of Seclore FileSecure has reduced the exposure of critical data for potential misuse or frauds. The business benefits are tremendous.” - MurliNambiar, Head of Information Security "Financial services companies like banks, insurance carriers & broking are ‘opening up’ their information systems and processes for participation by customers, partners and vendors. This of course brings in a lot of value chain integration and lowers costs but comes with information security needs which cannot be solved by present day systems. Seclore’s technology for securing documents as they flow within and outside enterprises as well as securing data shared with outsourcing partners is extremely relevant. - C N Ram. Group CIO, Essar group

  33. What industry experts say … Seclore’s approach is different in that they not mandatory rely on such plug-ins but mainly act “below” the application. The client component (which is required to access protected, e.g. encrypted, documents) tries to analyze the activities off the application like access to the file system. One impact of that approach is that a document might be opened with different applications supporting the specific document format. - Martin Kuppinger, One of the fore-most information security analysts “Information breaches normally result in intellectual property violation which is a serious problem affecting industry today. Seclore’s combination of preventive and corrective methods of handling information breaches is invaluable to any industry” - HaigreveKhaitan (Managing partner – Khaitan and Co) “Collaboration, security and privacy appear as mutually conflicting goals with most present day technologies. Seclore has resolved this conflict in a very elegant manner with its technology.” - AnimeshParihar (Global Delivery Head – SAP)

  34. Awards and recognition … Cool Vendors are “interesting, new and innovative vendors” which “organizations cannot afford to ignore”. Cool Vendors are those vendors that have caught Gartner's interest because they offer innovative and intriguing technologies or solutions. Deloitte Technology Fast 50 is a ranking compiled every year based on percentage of growth of fiscal year revenue over three years. The companies must also fulfil other criterion of technology orientation.

  35. … Awards and recognition ‘Hidden Gems’ 2010 by Kuppinger Cole, Europe’s leading information security analyst firm is a report which lists vendors, which have a significantly differentiated offering and are market leaders in a particular segment. The TR35 award is for innovators whose inventions and research, Massachusetts Institute of Technology (MIT) finds exciting. Technology Review, owned and published by MIT, is the world’s oldest technology magazine.

  36. … Awards and recognition “Innovations – ideas in practice” is an annual event honoring researchers and innovators for creative and innovative work in the sphere of science and technology. The innovation needs to have a high degree of practical relevance to change everyday life.

  37. More Info? www.seclore.com +91-22-6130-4200

More Related