A Seclore White Paper April 2014 2014 CXO Briefing: Innovative Method for Securing Information That Moves Beyond the Perimeter of Your Organization How switching to an information-centric security strategy will enable your organization to readily address your security, privacy and compliance requirements The Reality: Sensitive Information Flows Unprotected Beyond The Perimeter of Your Organization Every Day To effectively function in the business world today, organizations need to share information beyond their perimeter. Currently, the majority of that information is traversing enterprise boundaries without effective controls. Consider your own organization; you likely have employees… Ÿ Sharing sensitive information with third party partners and outsourcers Ÿ Utilizing Cloud services such as Dropbox to share files for collaboration Ÿ Accessing and downloading files onto laptops and other mobile devices Ÿ Passing off information on memory sticks Ÿ Relying on NDA's to secure confidential information and intellectual property While the IT investment has been on security solutions that protect the perimeter from attack, the truth is that nearly every organizations is sending sensitive information unprotected beyond the boundary of the enterprise every day. So, how can you encourage external collaboration, safely embrace the use of mobile devices, and leverage cost saving measures such as the cloud and outsourcing without sacrificing security? Lost or stolen devices is the number one cause of security breaches. Annual Study on Data Security and Privacy by Ponemon Institute, March, 2014 A New and Innovative Approach: Security That Stays with Information Wherever it Goes Seclore FileSecure protects sensitive information regardless of device or location. Whether a file is on a server, in an email, uploaded to Dropbox, on a mobile device, or copied to a USB Memory Stick (unintentionally left behind in an airport), unauthorized users will not be able to access the information. Because usage policies stay with the information, Seclore FileSecure enables organizations to securely adopt mobile devices, Cloud computing and external collaboration. 2 Easily Define, Enforce, and Remotely Modify Granular Information Usage Controls FileSecure secures the content, not the network, media, or device. You can easily define, attach, enforce, modify, and audit granular information usage permissions including: Ÿ Who can open and use the information (people, groups) Ÿ What action they can perform on the file (view, print, edit, copy, re-distribute) Ÿ When they can access the information (pre-set expirations or remotely revoked), Ÿ Where information can be accessed from(by private and public IP addresses) TOP SECRET POLICY 1 WHAT View only Edit, Print Screen Capture CONFIDENTIAL R POLICY 2 WHO Internal Users External Users RESTRICTED POLICY 3 WHEN Date Time No of days WHERE Specific computer Network PUBLIC POLICY 4 As well, the information usage policies can be easily defined and modified by the document owner or administrator at any time, even after a file has been distributed beyond the perimeter. The ability to remotely manage access policies means you can instantly block or modify access to information as business relationships change or devices are lost. Simplify Audit and Compliance Reporting Seclore FileSecure features automatic tracking and monitoring of files access and usage wherever they travel or reside. Ready access to consolidated data about who viewed the information, what they did with the information, what device was used to access the information, and when, makes it easy to address regulatory compliance and audit reporting requirements. Increase Business Agility without Sacrificing Security The ability to automatically control access to and the usage of information, both within and outside of your organization, will enable your organization to confidently utilize mobile devices, leverage the savings of the Cloud, and embrace external collaboration without sacrificing the security of highly confidential information. 3 About Seclore Seclore offers an innovative solution, FileSecure, which enables organizations to control access to information wherever it goes, both within and outside of the organization's boundaries. The ability to remotely control who can view, edit, copy, and distribute information empowers organizations to embrace mobility, Cloud, and external collaboration with confidence. Easy to deploy and use, Seclore FileSecure also extends and enhances the security of files detected and downloaded from DLP, ECM, ERP and Mail/Messaging solutions through pre-built connectors. With nearly 4 million users across 350 companies in 22 countries, Seclore is helping organizations achieve their security, privacy and compliance objectives. Visit us at www.seclore.com for more information. Securing Information Wherever it Goes www.seclore.com | [email protected] | blog.seclore.com
© Copyright 2024 ExpyDoc