1 / 36

Seclore FileSecure integrates with Microsoft Outlook

http://www.seclore.com/outlook.html : Seclore FileSecure connector for Microsoft Outlook provides the ability to not only securely protect and transmit emails but also control the usage actions of the receiver. The receivers individual actions like viewing, editing, printing, forwarding can be granular controlled on a per email per user basis.

gilberteric
Download Presentation

Seclore FileSecure integrates with Microsoft Outlook

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Seclore Filesecure MICROSOFT OUTLOOK Enhancing security of MS OUTLOOK

  2. Contents • Constraints of MS OUTLOOK security • The Solution .. • What is Seclore FileSecure • Seclore FileSecure connector for Microsoft Outlook • Assigning policies to E-mail in Microsoft Outlook • Opening Email • Accessing a protected file • Audit trails • Seclore FileSecure + MS Outlook Features • About Seclore

  3. MS Outlook and Security A Typical E-Mail Sharing Scenario RECEIVER SENDER It can further be: Edited, Copied, Printed, Distributed, Viewed(by others) Once the file is sent to the RECEIVER, The SENDER has no control on the file It can further be: Edited, Copied, Printed, Distributed, Viewed (by others) !!

  4. Contents • Constraints of MS OUTLOOK security • The Solution .. • What is Seclore FileSecure • Seclore FileSecure connector for Microsoft Outlook • Assigning policies to E-mail in Microsoft Outlook • Opening Email • Accessing a protected file • Audit trails • Seclore FileSecure + MS Outlook Features • About Seclore

  5. Seclore FileSecure Seclore FileSecure allow enterprises to define, implement & audit information usage “policies”. A “policy” defines : • WHO can use the information People & groups within and outside of the organization can be defined as rightful users of the information • WHAT can each person do Individual actions like reading, editing, printing, distributing, copy-pasting, screen grabbing etc. can be controlled • WHEN can he use it Information usage can be time based e.g. can only be used by Mr. A till 28th Sept OR only for the 2 days • WHERE can he use it from Information can be linked to locations e.g. only 3rd floor office by private/public IP addresses

  6. Seclore FileSecure • Policies are • Persistent: Implemented on information and all its copies wherever it is transmitted or stored • Dynamic: Policies can be changed after distributing information without having access to or redistributing the information • Policies can be attached to information on • Creation • Placement in a certain location e.g. shared folder • Attachment to email • Uploading to a document management / ECM system • …

  7. Contents • Constraints of MS OUTLOOK security • The Solution .. • What is Seclore FileSecure • Seclore FileSecure connector for Microsoft Outlook • Assigning policies to E-mail in Microsoft Outlook • Opening Email • Accessing a protected file • Audit trails • Seclore FileSecure + MS Outlook Features • About Seclore

  8. Opening E-Mail with Seclore FileSecure RECEIVER SENDER When the e-mail is sent, Seclore FileSecure protects the e-mail attachment and e-mail content. The receiver has only restricted usage rights (e.g. view only, edit + print only, etc)

  9. Contents • Constraints of MS OUTLOOK security • The Solution .. • What is Seclore FileSecure • Seclore FileSecure connector for Microsoft Outlook • Assigning policies to E-mail in Microsoft Outlook • Opening Email • Accessing a protected file • Audit trails • Seclore FileSecure + MS Outlook Features • About Seclore

  10. Sender’s Computer Sender clicks on “secure send” to apply policy to e-mail & attachment

  11. Receivers Sender’s Computer Policy is defined as- a. WHO - people / groups within or outside of the enterprise

  12. Sender’s Computer Policy is defined as b. WHAT - (VIEW, EDIT, PRINT, FORWARD,… )

  13. Sender’s Computer Policy is defined as- c. WHEN - date range, time span, …

  14. Sender’s Computer Policy is defined as- d. WHERE - Specific computers, specific networks, only from the office, …

  15. Contents • Constraints of MS OUTLOOK security • The Solution .. • What is Seclore FileSecure • Seclore FileSecure connector for Microsoft Outlook • Assigning policies to E-mail in Microsoft Outlook • Opening Email • Accessing a protected file • Audit trails • Seclore FileSecure + MS Outlook Features • About Seclore

  16. Receiver’s Computer Receiver opens the protected e-mail

  17. Contents • Constraints of MS OUTLOOK security • The Solution .. • What is Seclore FileSecure • Seclore FileSecure connector for Microsoft Outlook • Assigning policies to E-mail in Microsoft Outlook • Opening Email • Accessing a protected file • Audit trails • Seclore FileSecure + MS Outlook Features • About Seclore

  18. Receiver’s Computer When the receiver opens the e-mail, he gets to see the rights that he has on the e-mail

  19. Receiver’s Computer If he tries to print….

  20. Receiver’s Computer He will be restricted from printing !!

  21. Receiver’s Computer If the receiver tries to copy data…

  22. Receiver’s Computer He will be restricted from copying data!!

  23. Receiver’s Computer Even print-screen is blocked !!

  24. Contents • Constraints of MS OUTLOOK security • The Solution .. • What is Seclore FileSecure • Seclore FileSecure connector for Microsoft Outlook • Assigning policies to E-mail in Microsoft Outlook • Opening Email • Accessing a protected file • Audit trails • Seclore FileSecure + MS Outlook Features • About Seclore

  25. Receiver’s Computer The system also maintains a complete audit trail of all the receiver’s actions, time & even location !!

  26. Contents • Constraints of MS OUTLOOK security • The Solution .. • What is Seclore FileSecure • Seclore FileSecure connector for Microsoft Outlook • Assigning policies to E-mail in Microsoft Outlook • Opening Email • Accessing a protected file • Audit trails • Seclore FileSecure + MS Outlook Features • About Seclore

  27. Contents • Constraints of MS OUTLOOK security • The Solution .. • What is Seclore FileSecure • Seclore FileSecure connector for Microsoft Outlook • Assigning policies to E-mail in Microsoft Outlook • Opening Email • Accessing a protected file • Audit trails • Seclore FileSecure + MS Outlook Features • About Seclore

  28. Corporate Background … “Seclore is a high growth software product company. Seclore’s technology helps mitigate the risks arising out of information breaches whilst enhancing collaboration” 6 years old, Headquartered in Mumbai, India Promoted by IIT Bombay under the SINE program - www.sineiitb.org Geographical and customer presence in Middle East, ASEAN, SAARC & Europe Offerings focused on Information Rights Management and Secure Outsourcing Stake holders including IIT Bombay – www.iitb.ac.in ICICI Bank – www.icicibank.com Ventureast – www.ventureast.net Technology and service differentiators focusing on minimally intrusive technology, value based pricing and usage without training

  29. ….Large financial services groups Seclore user profile… ….Diversified business groups ….Engineering and manufacturing organizations …Government and service providers

  30. What customers say about us … “We chose Seclore FileSecure due to the flexibility provided by Seclore in terms of solution capabilities and customization. Implementation of Seclore FileSecure has reduced the exposure of critical data for potential misuse or frauds. The business benefits are tremendous.” - Murli Nambiar, Head of Information Security "Financial services companies like banks, insurance carriers & broking are ‘opening up’ their information systems and processes for participation by customers, partners and vendors. This of course brings in a lot of value chain integration and lowers costs but comes with information security needs which cannot be solved by present day systems. Seclore’s technology for securing documents as they flow within and outside enterprises as well as securing data shared with outsourcing partners is extremely relevant. - C N Ram. Group CIO, Essar group

  31. What industry experts say … Seclore’s approach is different in that they not mandatory rely on such plug-ins but mainly act “below” the application. The client component (which is required to access protected, e.g. encrypted, documents) tries to analyze the activities off the application like access to the file system. One impact of that approach is that a document might be opened with different applications supporting the specific document format. - Martin Kuppinger, One of the fore-most information security analysts “Information breaches normally result in intellectual property violation which is a serious problem affecting industry today. Seclore’s combination of preventive and corrective methods of handling information breaches is invaluable to any industry” - Haigreve Khaitan (Managing partner – Khaitan and Co) “Collaboration, security and privacy appear as mutually conflicting goals with most present day technologies. Seclore has resolved this conflict in a very elegant manner with its technology.” - Animesh Parihar (Global Delivery Head – SAP)

  32. Awards and recognition … Cool Vendors are “interesting, new and innovative vendors” which “organizations cannot afford to ignore”. Cool Vendors are those vendors that have caught Gartner's interest because they offer innovative and intriguing technologies or solutions. Deloitte Technology Fast 50 is a ranking compiled every year based on percentage of growth of fiscal year revenue over three years. The companies must also fulfil other criterion of technology orientation.

  33. … Awards and recognition ‘Hidden Gems’ 2010 by Kuppinger Cole, Europe’s leading information security analyst firm is a report which lists vendors, which have a significantly differentiated offering and are market leaders in a particular segment. The TR35 award is for innovators whose inventions and research, Massachusetts Institute of Technology (MIT) finds exciting. Technology Review, owned and published by MIT, is the world’s oldest technology magazine.

  34. … Awards and recognition “Innovations – ideas in practice” is an annual event honoring researchers and innovators for creative and innovative work in the sphere of science and technology. The innovation needs to have a high degree of practical relevance to change everyday life.

  35. More Info? www.seclore.com +91-22-6130-4200 36

More Related