Question : Why do F1 cars have the biggest brakes ? Answer : Because they need to go the fastest. rotect Infrastructure or protect information ?? essons from Wikileaks Presentation at NullCon 2011, Goa Vishal Gupta Seclore Information exchange in the collaborative world Information exchanged between ofemployees the Information is exchanged between employees vendors & customers What happens if an employee with privileged access leaves to organisation joinvendor a& competitor ? What happens ifisinformation shared withEmployees a&vendor is lost by the ? VENDORS CUSTOMERS Enterprise Firewalls Competitors TELEMARKETER VPN SSL UTM Firewall … The compromise ... Decreasing control and protection over data Increasing risks of systems and data Decreasing availability of systems and data Data Center Enterprise Enterprise + Partners The world Underlying Issues Share it = It becomes his (also) Ownership and usage cannot be separated Shared once = Shared forever Impossible to “recall” information Out of the firewall = Free for all Technology & processes are only applicable within The Result Information lifecycle … Create Store Transmit & collaborate Desktops Shared folders Laptops Removable media Laptops Instant Messaging DLP Anti-virus Online workspaces Anti-… Hard disk encryption NTFS Desktops Document retention Remote desktops Email Removable media Delete Backup Content Management Mobile devices Use Archive & Backup Mobile devices Archive DLP Vaults Security SSL UTM IDM Digital shredders Application security Heterogeneous policies … Heterogeneous infrastructure Unstructured information security Option 1 : Control Distribution ... Security Collaboration Unstructured information security Option 2 : Control Usage ... Right Person Security Right Action Right Time Right Location Collaboration Information Rights Management IRM systems allow enterprises to define, implement & audit information usage “policies”. A “policy” defines : • WHO can use the information People & groups within and outside of the organization can be defined as rightful users of the information • WHAT can each person do Individual actions like reading, editing, printing, distributing, copy-pasting, screen grabbing etc. can be controlled • WHEN can he use it Information usage can be time based e.g. can only be used by Mr. A till 28th Sept OR only for the 2 days • WHERE can he use it from Information can be linked to locations e.g. only 3rd floor office by private/public IP addresses Policies are persistent with data, dynamic & audit-able Lessons from Wikileaks Content security 1 2 3 is supposed to be like King‘s security Thou shall focus on protecting the information …because no “wall” is too high Thou shall listen to dad & not watch TV beyond 7 pm About … Seclore is a high growth information security product company focused on providing Security without compromising collaboration Seclore’s flagship product Seclore FileSecure is used by More than 1 million users & some of the largest enterprises Contact Vishal Gupta +91-22-4015-5252 www.seclore.com