logging in or signing up Lotus_Notes-Seclore-download Seclore Download Post to : URL : Related Presentations : Share Add to Flag Embed Email Send to Blogs and Networks Add to Channel Uploaded from authorPOINT lite Insert YouTube videos in PowerPont slides with aS Desktop Copy embed code: Embed: Flash iPad Dynamic Copy Does not support media & animations Automatically changes to Flash or non-Flash embed WordPress Embed Customize Embed URL: Copy Thumbnail: Copy The presentation is successfully added In Your Favorites. Views: 145 Category: Science & Tech.. License: All Rights Reserved Like it (0) Dislike it (0) Added: May 12, 2011 This Presentation is Public Favorites: 0 Presentation Description No description available. Comments Posting comment... Premium member Presentation Transcript Slide 1: Information Rights Management (IRM): Enhancing Security of Lotus NotesSlide 2: The Problem:Slide 3: A Typical E-Mail Sharing Scenario SENDER RECEIVER It can further be: Edited, Copied, Printed, Distributed, Viewed (by others) Click for NEXT Click for NEXT @ Once the e-mail is sent to the RECEIVER, The SENDER has no control on the e-mailSlide 4: It can further be: Edited, Copied, Printed, Distributed, Viewed (by others) Edited Copied Printed Viewed Un-protected E-mail Distributed Click for NEXT A Typical E-Mail Sharing Scenario It can further be: Edited, Copied, Printed, Distributed, Viewed (by others) !! @ @ @ @ @ @Slide 5: The Solution:Slide 6: Opening E-Mail with Seclore FileSecure SENDER RECEIVER Click for NEXT When the e-mail is sent, Seclore FileSecure protects the e-mail @Slide 7: It can further be: Edited, Copied, Printed, Distributed, Viewed (by others) Edited Copied Printed Viewed Protected E-mail Distributed Click for NEXT Opening E-Mail with Seclore FileSecure The receiver has only restricted usage rights (e.g. view only, edit + print only, etc) @ @ @ @ @ @Slide 8: Feature Lotus Notes Lotus Notes + Seclore FileSecure Access Control Can provide control while the information is within the system only Can provide granular control (view, edit, print, fwd, copy-paste, time and location restrictions etc) Dependency on email infrastructure For security controls to apply, sender and receiver have to both be on Lotus infrastructure (Lotus Domino & Lotus Notes) No dependency on the email server or client infrastructure either on the sender or the receiver side Usage control changes Cannot change controls after the email is sent out Controls can be changed even after the email is sent out in real time, anytime, anywhere Tracking Doesn't provide robust mechanism for email delivery, read receipt, forwarding, etc Complete tracking of receivers usage (view, print, fwd, etc) as well as email delivery, read receipt is robustly providedSlide 9: Some screen shots:Slide 10: Assigning Seclore policies to e-mail in Lotus NotesSlide 11: Sender’s Computer Sender clicks on “secure send” to apply policy to e-mail & attachmentSlide 12: Sender’s Computer Policy is defined as- a. WHO - people / groups within or outside of the enterprise ReceiversSlide 13: Sender’s Computer Policy is defined as b. WHAT - (VIEW, EDIT, PRINT, FORWARD,… )Slide 14: Sender’s computer Policy is defined as- c. WHEN - date range, time span, …Slide 15: Sender’s Computer Policy is defined as- d. WHERE - Specific computers, specific networks, only from the office, …Slide 16: 2. Opening “E-Mail”Slide 17: Receiver opens the protected e-mail Receiver’s ComputerSlide 18: Receiver’s Computer When the receiver opens the e-mail, he gets to see the rights that he has on the e-mailSlide 19: 4. Performing un-authorized actionsSlide 20: Receiver’s Computer If he tries to print….Slide 21: Receiver’s Computer He will be restricted from printing !!Slide 22: Receiver’s Computer If the receiver tries to copy data…Slide 23: Receiver’s Computer He will be restricted from copying data!!Slide 24: Receiver’s Computer Even print-screen is blocked !!Slide 25: Receiver’s Computer The system also maintains a complete audit trail of all the receiver’s actions, time & even location !!Slide 26: About SecloreSlide 27: Corporate Background … “ Seclore is a high growth software product company. Seclore’s technology helps mitigate the risks arising out of information breaches whilst enhancing collaboration” 6 years old, Headquartered in Mumbai, India Geographical and customer presence Middle East, India, ASEAN, Western Europe, North Africa Keywords Information Rights Management, Secure outsourcing Investors The largest private bank in India, one of the foremost R&D institute & professional financial investors Why are we different Minimally intrusive security technology, value based pricing, usage without trainingSlide 28: About … Seclore is a high growth information security product company focussed on providing Security without compromising collaboration Seclore’s flagship product Seclore FileSecure is used by More than 1.5 million users & some of the largest enterprisesSlide 29: For more information- http://www.seclore.com/lotus_notes.html Email: firstname.lastname@example.org You do not have the permission to view this presentation. In order to view it, please contact the author of the presentation.