Architecture 2017-07-11T09:16:59+00:00

Digital Rights Management Architecture

icon_trackingaudits_2

Seclore’s digital rights management architecture is designed to seamlessly integrate with existing enterprise systems including DLP, ECM, ERP, EFSS, email and other transactional systems. By automatically adding granular, persistent digital rights to files and data as they are downloaded, shared, and discovered, organizations can protect files while they are at rest, in transit and at work.

How Digital Rights Management Secures Data for an Organization

seclore-digital-rights-management-architecture

1 Protect a file

You protect a file on your computer

2 Share it any way you like

You send it to the recipients via any mechanism: email, file sharing services, USB drives, CD/DVD, …

3 Data security is permanently enforced

File can be accessed on any platform or device – and it never loses its security

Seclore Digital Rights Management Architecture –
on Premise

Seclore’s Data-Centric Security Architectural Elements

seclore-digital-rights-management-architecture-on-premise

  • Seclore Policy Server: The command-and-control center of the Seclore system that is used to manage usage policies, user permissions, protected files, activity logs, and other information
  • Seclore Identity Manager: Our own LDAP system that functions like a full-fledged Identity and Access Management system with users, groups, OUs with registration and self-service workflows
  • Seclore Lite Server: The server used to access protected files using Seclore Lite Online, our browser-based module
  • IAM Systems: Any Identity and Access Management, Identity Federation, or Single sign-on system integrated with Seclore FileSecure for user authentication
  • EFSS: Seclore adds persistent data security to files that are shared via Enterprise File Synch and Share (EFSS) systems
  • File Servers: File servers with folders (called ‘Hot Folders’) configured to secure files as soon as they are placed inside them
  • ECM Systems: Enterprise Content Management (ECM) systems (e.g. IBM FileNet, Microsoft SharePoint) that are seamlessly integrated with Seclore to automatically add data-centric security at the point of download
  • DLP Systems: Data Loss Prevention (DLP) Systems (e.g. McAfee DLP, Symantec DLP) that are integrated with Seclore to automatically secure files discovered by DLP
  • Enterprise Applications: Enterprise applications (e.g. SAP and Transactional Systems) integrated with Seclore to automatically apply data-centric security to downloaded files, reports, and other extracts

Seclore Digital Rights Management Architecture –
in the Cloud

seclore-digital-rights-management-architecture-in-the-cloud

Seclore can be used as a service from the cloud – completely managed and maintained by us. With Seclore’s cloud model, you can successfully reduce costs and IT overheads while making your business more agile than ever before.

Seclore’s cloud-based solutions for persistent data-centric security are trusted and used by hundreds of the Global 2000 companies across the globe. By opting for cloud-based Rights Management, you can take full advantage of today’s cloud computing weather – while also availing the best Data Security for your information.

4-Minute Rights Management Essentials Video

Find out how the latest Rights Management capabilities are helping organizations stop data breaches and leaks.

secloreEDRM_thumbnail

View Now

Learn More

secured

Take the EDRM Test. How Secure is Your EDRM?
Whether you are investing in a new Rights Management system, or have one in place, find out if the solutions you are considering or currently using are making the grade.

secured

RFP Guide
A comprehensive checklist for choosing the right Rights Management solution.

secured

The Value of Rights Management
Three-minute demo on how Rights Management is helping organizations stop data loss and address compliance.