Seclore has been playing a forefront role in information security. It strategically adopts a holistic view to comprehend customersâ pain points in data security to define the best approach to close the gaps. Amit Malhotra, VP, Sales India, Middle East & Africa, Seclore, shares information related to services being offered by Seclore in an exclusive interview with Elets News Network (ENN)
Please walk us through your products and services. What measures have been initiated by Seclore to address the challenges posed by increased cyber threat?
Seclore is a fully automated, secure and advanced Enterprise Digital Rights Management (EDRM) solution. It enables organisations to control the usage of information wherever it travels or is stored. The ability to enforce and audit who can view, edit, copy, screen capture, and redistribute files, from which device, and for how long, empowers organisations to embrace external collaboration with confidence.
Two years ago, we observed a major security gap in leading organisations when they collaborated with external vendors, contractors & suppliers. Another significant area of concern was unprotected file downloads taking place from the existing Enterprise Resource Planning (ERP) and Enterprise Content Management (ECM) systems and a lack of control over sensitive information when disseminated over emails and through Enterprise File Synchronisation and Share (EFSS) solutions.
To make it easy to automatically âattachâ persistent file-centric security to documents and email text, Seclore developed pre-built connectors for the existing Information Technology (IT) systems, including email, ECM,Â EFSS, Data Loss Prevention (DLP) and ERP solutions. Additionally, Seclore has developed an innovative policy federation capability so that organisations can seamlessly leverage and augment the existing access control policies already existing in other systems. The connectors and policy federation mean that Seclore enables companies to protect files faster than anyone in the market. Today, we enable effortless and secure collaboration for over 1,000 healthcare, pharma, legal, manufacturing, and Banking, Financial services and Insurance (BFSI) companies worldwide.
With the increased usage of unapproved wireless devices in the workplace network, the phenomenon of âShadow ITâ has increased rapidly. In the light of the above, how is Seclore securing the data?
Bring Your Own Device (BYOD) in workplaces is a modern day reality and organisations need to have an effective policy in place to ensure confident adoption of new productivity enablers. The same thing is now happening with the EFSS solutions; employees are using a variety of methods to share and access information that is outside the traditional âcontrolâ of IT.
Seclore EDRM protects files, irrespective of how they are shared (email, USB and fileÂ sharing services) and on whatever device they are accessed from. The granular usage controls and advanced capabilities ensure that files are secure not only while they are in transit, but also while the files are being worked on, and wherever they are stored. You can even control which devices a file can be accessed from, meaning you can lock down access to files from defined IP addresses. That means you can control and ensure that sensitive information on mobile devices, personal laptops, USB drives and home computers is totally secure.
We are living in the time when corporate espionage has emerged as a booming business and numerous cases of leak of classified information have emerged. As a key player in the information security, do you think Indian healthcare service providers comprehend the magnitude of this risk, especially when health data can play such a crucial role in the national agenda?
The Pharmaceutical Industry today spends more on Research and Development (R&D) than any other sector. Five of the top ten R&D budgets globally are spent by pharmaceutical companies. A big aspect of their business involves external collaboration and outsourcing of operations. However, pharma companies are in a varying degree of maturity in developing a policy for data-centric security. Hence, corporate espionage and security breaches have become commonplace occurrences, costing the pharmaceutical companies millions in lost revenue and market advantage.
We have provided consultancy to various healthcare and pharma providers, both in India & globally, to ensure the safety and security of their intellectual property (for example, product dossiers, R&D data, classified information on drug formulation, etc.), as they collaborate with external parties, such as Contract Research Organisations (CROs), Active Pharmaceutical Ingredients (API) manufacturers, laboratories, universityÂ scientists and clinical trial companies. This has helped organisations achieve truly comprehensive, persistent datacentric file security and governance.
|Â New Workplace-Based IT Challenges|
Â â¢ Effective policies needed to ensure confident adoption of new productivity enablers
Â â¢ IT security issues arising due to the concept bring your own device (BYOD)
Â â¢ Increased IT risk due to a variety of methods to share and access information
We have also initiated discussions with several government agencies and healthcare bodies to start a dialogue towards a comprehensive national healthcare data-centric policy in order to ensure that the breaches are minimised. This is increasingly becoming critical in view of the huge digital push initiated by the Government across sectors.
|Â Seclore – Key Takeaways|
Â â¢ Empowers organisations to forge external collaborations securely
Â â¢ Enables organisations to adopt data-centric security
Â â¢ Has developed an innovative policy federation capability to leverage existing access control policies
Â â¢ Has developed prebuilt connectors for the existing IT systems
What business and pricing models are being followed by Seclore while providing services to customers?
Seclore adopts a holistic view when it comes to pricing & services. We first spend time understanding our customersâ business, drill deep to discover critical risk factors and use cases, and work to leverage theÂ existing IT systems. In order to plug every potential leakage point, we partner closely with the customer to comprehend the degree of collaboration with external vendors and suppliers before recommending the âbest approachâ towards datacentric file security.
Depending upon the actual use case, we recommend the number of individual protector licenses, and connecter licenses with the existing IT systems to the customer.
What measures are being undertaken by Seclore to scale up its technologies and solutions? Please provide details.
By leveraging pre-built connectors and our unique policy federation, we can automatically protect more files faster than anyone, enabling organisations to rapidly close security gaps. We are consistently developing additional capabilities that also advance the security and ease of use in EDRM. Some recent examples, such as Bring Your Own Key (BYOK) capabilities, two-factor authentication to further lock down server-to-server communication, email protector auto discovery, and enhanced agentless access to protected documents.
In general, our focus on datacentric security ensures that any type of document will remain protected, wherever it travels or is stored. Partnering closely with customers, we combine deep industry expertise and uniquely open and scalable persistent data-centric technology to seamlessly extend their security infrastructure beyond the organisation.
As a result, every day, over 6 million users across 1,000 companies in 29 countries âSecloreâ their documents. They have come to rely on Secloreâs fully automated, secure, and advanced EDRM solutions to accelerate the adoption of datacentric security and close their collaboration security gaps.