+ All Categories
Home > Documents > Replacing File and Email Encryption with Rights Management€¦ · Why Basic File and Email...

Replacing File and Email Encryption with Rights Management€¦ · Why Basic File and Email...

Date post: 10-Oct-2020
Category:
Upload: others
View: 2 times
Download: 0 times
Share this document with a friend
4
Replacing File and Email Encryption with Rights Management
Transcript
Page 1: Replacing File and Email Encryption with Rights Management€¦ · Why Basic File and Email Encryption Are No Longer Enough File and Email Encryption will protect information when

Replacing File and Email Encryption with Rights Management

Page 2: Replacing File and Email Encryption with Rights Management€¦ · Why Basic File and Email Encryption Are No Longer Enough File and Email Encryption will protect information when

Why Basic File and Email Encryption Are No Longer EnoughFile and Email Encryption will protect information when it is stored and transmitted. However, as soon as the file is decrypted by the recipient – your sensitive document can now be easily shared with other unauthorized users. The recipient can easily cut/paste content from the decrypted document into an unprotected document, perform edits, screen share, and print the document, basically negating the effects of basic File and Email Encryption.

As well, File and Email Encryption solutions do not provide tracking of the document usage, a key requirement for many of the new regulations such as GDPR, NIST and state-level data privacy laws.

The on/off state of these basic encryption technologies opens to the door to the mis-use of information.

Upgrading to Rights Management – Protect Data at-Rest, in-Transit, and at-WorkRights Management enables organizations to move beyond File and Email Encryption to persistently control and track the use of information at a granular level including:

• Fully control what the recipient can do with the document, even after it has been opened and is being utilized in an application such as MS Word, Excel, PDF, and more

• Control if the recipient can view, print, screen share, and cut/paste content

• Revoke access to the document (and all copies) once it has been shared with an authorized recipient

• Tracked all authorized and unauthorized usage attempts for subsequent analysis and compliance reporting

WHERE can they do it?Specific Computers or Devices, Specific Geographic Locations based on IP Addresses

WHEN can they do it?Automatic File Expiry, Date and Time Ranges, Number of Days from First Access

WHO can access the file?User or Groups Within or Outside the Organization

WHAT can they do with it?View, Edit, Print, Copy Content, Take Screen Grabs, Work Offline

File and Email Encryption solutions are used by many organizations to protect sensitive documents that are shared with other users. When the recipient receives the file, they need to authenticate their identity and can then open (decrypt) the file to view or work on the document. However, new regulatory requirements which require greater control and tracking of sensitive documents – and the reality that once a file is decrypted it can be mis-used – are causing organizations to review whether File and Email Encryption solutions are adequate for their data protection and tracking requirements.

Page 3: Replacing File and Email Encryption with Rights Management€¦ · Why Basic File and Email Encryption Are No Longer Enough File and Email Encryption will protect information when

Detailed usage logs can be viewed through the Seclore Dashboard or exported to the organization’s favored SIEM solution for use behavior analytics and compliance reporting.

To fully protect sensitive information wherever it travels and persistently control and track usage while the document is being utilized, you should upgrade your File and Email Encryption technologies to Seclore Rights Management.

More information can be found at www.seclore.com or email us at [email protected].

Business Use Cases Driving the Need to Upgrade to Rights ManagementYou will want to look at replacing your File and Email Encryption solution if you are:

• Sharing information with sub-contractors, vendors, clients, and other third parties

• Wanting to revoke access to sensitive information shared during collaboration, both with employees who are leaving the organization and other third-parties such as outsourcers, vendors, and sub-contractors

• Required to control and report on sensitive information shared with downstream suppliers and outsourcers to address regulatory compliance (GDPR, New York Data Privacy Regulations, NIST and more)

• Wanting to avoid the security risks inherent when adopting innovative technologies such as cloud, BYOD, and enterprise file sharing.

Seclore Rights Management – Taking Data Protection to the Next Level

Seclore makes it easy to centrally define, enforce, modify, and track granular file usage permissions including who can access the file, what they can do with the file, where they can access the file (by device, IP address), and when.

A fully browser-based solution, Seclore Rights Management has been designed to make it easy for both employees and external third-parties to administer policies, protect documents, and utilize the secured documents on their preferred device.

A part of the Seclore Data-Centric Security Platform, Seclore Rights Management connects easily with other Data-Centric Security solutions (DLP, CASB, Data Classification) and existing Enterprise Systems (ECM, EFSS, email, ERP) to automatically protect documents as they are discovered, classified, downloaded and shared. Support for leading directories and SSO technologies makes it easy for any user to authenticate and engage with the protected document.

Page 4: Replacing File and Email Encryption with Rights Management€¦ · Why Basic File and Email Encryption Are No Longer Enough File and Email Encryption will protect information when

About SecloreSeclore offers the market’s first fully browser-based Data-Centric Security Platform, which gives organizations the agility to utilize best-of-breed solutions to discover, identify, protect, and audit the usage of data wherever it goes, both within and outside of the organization’s boundaries. The ability to automate the data-centric security process enables organizations to fully protect information with minimal friction and cost. Over 6000 companies in 29 countries are using Seclore to achieve their data security, governance, and compliance objectives.

Learn how easy it now is to keep your most sensitive data safe, and compliant.Contact us at: [email protected] or CALL 1-844-4-SECLORE.

© 2018 Seclore, Inc. All Rights Reserved.

USA – West Coast691 S. Milpitas BlvdSuite 217 Milpitas, CA 90351-844-473-2567

USA – East CoastGraybar Building420 Lexington Avenue Suite 300New York, NY 10170

UAESeclore Technologies FZ-LLCExecutive Office 14, DIC Building 1 FirstSteps@DICDubai Internet CityPO Box 73030Dubai, UAE+9714-440-1348+97150-909-5650+97155-792-3262

EuropeSeclore GmbHChrischonagasse 479594 InzlingenGermany

IndiaExcom House Ground Floor Plot No. 7 & 8, Off. Saki Vihar Road Sakinaka, Mumbai 400 072 +91 22 6130 4200+91 22 6143 4800

Saudi Arabia5th Floor, Altamyoz Tower Olaya StreetP.O. Box. 8374Riyadh 11482+966-11-212-1346+966-504-339-765

Singapore8, Eu Tong Sen Street #12 99 The Central Singapore 059818 Office: +65 6224 1009Tel.: +65 8292 1930


Recommended