50. Policy definition–WHEN, WHERE 11 Policy Admin A policy can expire information beyond a date / timespan and also restrict its usage to certain computers / networks
88. 25 User’s Computer Screen capture by the PrtScr key, screen grabbing tools like Camtasia and screen sharing tools like Webex is blocked Unauthorized screen grab
109. About … Value to customers Security without compromising on collaboration Customers across ….Diversified business groups ….Large financial services groups ….Engineering and manufacturing organizations ….Defence, Software, BPO, Consulting, Services, ….
110. What customers say about us … “We chose Seclore FileSecure due to the flexibility provided by Seclore in terms of solution capabilities and customization. Implementation of Seclore FileSecure has reduced the exposure of critical data for potential misuse or frauds. The business benefits are tremendous.” - Murli Nambiar, Head of Information Security "Financial services companies like banks, insurance carriers & broking are ‘opening up’ their information systems and processes for participation by customers, partners and vendors. This of course brings in a lot of value chain integration and lowers costs but comes with information security needs which cannot be solved by present day systems. Seclore’s technology for securing documents as they flow within and outside enterprises as well as securing data shared with outsourcing partners is extremely relevant. - C N Ram. Group CIO, Essar group
111. What industry experts say … Seclore’s approach is different in that they not mandatory rely on such plug-ins but mainly act “below” the application. The client component (which is required to access protected, e.g. encrypted, documents) tries to analyze the activities off the application like access to the file system. One impact of that approach is that a document might be opened with different applications supporting the specific document format. - Martin Kuppinger, One of the fore-most information security analysts “Information breaches normally result in intellectual property violation which is a serious problem affecting industry today. Seclore’s combination of preventive and corrective methods of handling information breaches is invaluable to any industry” - Haigreve Khaitan (Managing partner – Khaitan and Co) “Collaboration, security and privacy appear as mutually conflicting goals with most present day technologies. Seclore has resolved this conflict in a very elegant manner with its technology.” - Animesh Parihar (Global Delivery Head – SAP)
112. Deloitte Technology Fast 50 is a ranking compiled every year based on percentage of growth of fiscal year revenue over three years. The companies must also fulfil other criterion of technology orientation. ‘Hidden Gems’ 2010 by Kuppinger Cole, Europe’s leading information security analyst firm is a report which lists vendors, which have a significantly differentiated offering and are market leaders in a particular segment. Awards and recognition …
113. … Awards and recognition The TR35 award is for innovators whose inventions and research, Massachusetts Institute of Technology (MIT) finds exciting. Technology Review, owned and published by MIT, is the world’s oldest technology magazine. “Innovations – ideas in practice” is an annual event honoring researchers and innovators for creative and innovative work in the sphere of science and technology. The innovation needs to have a high degree of practical relevance to change everyday life.