Seclore EDRM – Granular File Usage Controls 2017-07-11T09:07:33+00:00

Granular Data Security Usage Controls

icon_trackingaudits_2

Gone are the simpler times when basic file encryption was enough to secure data.

Today’s enterprises often share files across business units and with an ‘extended enterprise’ of vendors and partners. Giving them NO access would cripple your business, while giving them ALL access would leave your data insecure. How do you ensure that employees and third parties can use your files, but not misuse them?

Seclore’s data-centric security ‘wraps’ your files with fine-tuned usage controls that stay with files wherever they go.

Seclore’s Comprehensive Usage Controls

WHO can access the file?

Users or groups within or outside the organization.

WHAT can they do with it?

View, edit, print, copy content, take screen grabs, work offline.

WHEN can they do it?

Automatic file expiration for date and time ranges and number of days from first access.

WHERE can they do it?

Specific computers or devices, specific IP addresses.

Take a Peek at Seclore Rights Management

Unprecedented Granularity of Usage Controls

Enforce file access and usage with more granularity than ever before. Classify files with a single click and easily ‘attach’ persistent, multi-dimension granular usage policies to your files.

Protect Any File Format

Seclore empowers you to secure any type of file. Over 60 of the most popular file formats can be protected with all four levels of rights (who, what, when, and where). Any other file format can be controlled with three levels of rights: who, where and when.

Even better, recipients of ‘seclored’ information can use native file formats and applications while you remain in control of the file usage. File format extensions are not modified, eliminating downstream backup issues.

Modify or Revoke Information Rights After Distribution

With a single click, you can modify rights or expire all copies of files when they are no longer needed – Mission Impossible style. Or send files out with built-in expiry dates – so that they ‘self-destruct’ automatically wherever they are.

After all, business relationships don’t last forever, and access to your data shouldn’t either.

Secure Data Based on Access Location

Achieve higher levels of data security by restricting file access to individual machines. ‘Lock’ files to corporate laptops or specific mobile devices. Restrict file access to a specific IP address or range of addresses.

Embrace Innovation. Enable Business.

IT Security is often criticized for refusing to adopt new, innovative technologies and processes due to very valid security concerns.

By controlling granular usage policies at the file-level, you can freely adopt outsourcing, file sharing services, and personal devices – without sacrificing your data’s security. That enables IT to embrace new technologies, better address Shadow IT, and become a true business enabler.

Demo

See Granular Data-Centric Usage Controls in Action

See how Seclore ensures data security with granular usage policies that control exactly Who can do What with a File, When and from Where.

thumbnail-granular

View Now

Learn More

secured

Seclore Rights Management Brochure
To effectively function in the business world today, organizations need to share files beyond their perimeter. Learn how Seclore Rights Management enables you to easily define, enforce, and remotely control granular usage policy on a file regardless of the device or location.

secured

Rights Management Transformation White Paper
Do you have information that needs to leave your organization to support collaboration? You can easily and securely send information via mobile devices, email and file-sharing with the new generation of Rights Management Solutions.

secured

Predictions 2017 White Paper
In our hyperconnected world, advances in collaboration technologies, multiple devices and increased use of outsourcing, hackers are seizing more and more opportunities to steal data from companies. Stay ahead of hackers – read Seclore’s Top 6 data security predictions for 2017.