SecLore Information Security

advertisement
Question : Why do F1 cars have the biggest brakes ?
Answer : Because they need to go the fastest.
rotect Infrastructure or protect information ??
essons from Wikileaks
Presentation at NullCon 2011, Goa
Vishal Gupta
Seclore
Information exchange in the collaborative world
Information
exchanged
between
ofemployees
the
Information
is exchanged
between
employees
vendors
&
customers
What
happens
if an
employee
with
privileged
access
leaves
to organisation
joinvendor
a&
competitor
?
What
happens
ifisinformation
shared
withEmployees
a&vendor
is
lost
by
the
?
VENDORS
CUSTOMERS
Enterprise
Firewalls
Competitors
TELEMARKETER
VPN
SSL
UTM
Firewall
…
The compromise ...
Decreasing control and protection over data
Increasing risks of systems and data
Decreasing availability of systems and data
Data Center
Enterprise
Enterprise
+
Partners
The world
Underlying Issues
Share it = It becomes his (also)
Ownership and usage cannot be separated
Shared once = Shared forever
Impossible to “recall” information
Out of the firewall = Free for all
Technology & processes are only applicable within
The Result
Information lifecycle …
Create
Store
Transmit & collaborate
Desktops
Shared
folders
Laptops
Removable
media
Laptops
Instant
Messaging
DLP Anti-virus
Online
workspaces
Anti-…
Hard disk encryption
NTFS
Desktops
Document
retention
Remote
desktops
Email
Removable
media
Delete
Backup
Content
Management
Mobile
devices
Use Archive & Backup
Mobile
devices
Archive
DLP
Vaults
Security
SSL
UTM
IDM
Digital shredders
Application security
Heterogeneous policies … Heterogeneous infrastructure
Unstructured information security
Option 1 : Control Distribution
...
Security
Collaboration
Unstructured information security
Option 2 : Control Usage
...
Right
Person
Security
Right
Action
Right
Time
Right
Location
Collaboration
Information Rights Management
IRM systems allow enterprises to define, implement & audit information
usage “policies”. A “policy” defines :
• WHO can use the information
People & groups within and outside of the organization
can be defined as rightful users of the information
• WHAT can each person do
Individual actions like reading, editing, printing,
distributing, copy-pasting, screen grabbing etc.
can be controlled
• WHEN can he use it
Information usage can be time based e.g. can only be
used by Mr. A till 28th Sept OR only for the 2 days
• WHERE can he use it from
Information can be linked to locations e.g. only 3rd
floor office by private/public IP addresses
Policies are persistent with data, dynamic & audit-able
Lessons from Wikileaks
Content security
1
2
3
is
supposed to be like King‘s security
Thou shall focus on protecting the information
…because no “wall” is too high
Thou shall listen to dad & not watch TV
beyond 7 pm
About …
Seclore is a high growth information security product company focused on
providing Security without compromising collaboration
Seclore’s flagship product Seclore FileSecure is used by More than 1
million users & some of the largest enterprises
Contact
Vishal Gupta
+91-22-4015-5252
www.seclore.com
Download