Architecture

How Seclore’s Data-Centric Security Works

architecture_img1

1 Protect a file

You protect a file on your computer

2 Share it any way you like

You send it to the recipients via any mechanism: email, file sharing services, USB drives, CD/DVD, …

3 Data security is permanently enforced

File can be accessed on any platform or device – and it never loses its security


System Architecture

architecture_img1

Seclore’s Data-Centric Security Architectural Elements

  • Seclore Policy Server: The command-and-control center of the Seclore system that is used to manage usage policies, user permissions, protected files, activity logs, and other information
  • Seclore Identity Manager: Our own LDAP system that functions like a full-fledged Identity and Access Management system with users, groups, OUs with registration and self-service workflows
  • Seclore Lite Server: The server used to access protected files using Seclore Lite Online, our browser-based module
  • IAM Systems: Any Identity and Access Management, Identity Federation, or Single sign-on system integrated with Seclore FileSecure for user authentication
  • EFSS: Seclore adds persistent data security to files that are shared via Enterprise File Synch and Share (EFSS) systems
  • File Servers: File servers with folders (called ‘Hot Folders’) configured to secure files as soon as they are placed inside them
  • ECM Systems: Enterprise Content Management (ECM) systems (e.g. IBM FileNet, Microsoft SharePoint) that are seamlessly integrated with Seclore to automatically add data-centric security at the point of download
  • DLP Systems: Data Loss Prevention (DLP) Systems (e.g. McAfee DLP, Symantec DLP) that are integrated with Seclore to automatically secure files discovered by DLP
  • Enterprise Applications: Enterprise applications (e.g. SAP and Transactional Systems) integrated with Seclore to automatically apply data-centric security to downloaded files, reports, and other extracts

Seclore on the Cloud

architecture_img1

Seclore can be used as a service from the cloud – completely managed and maintained by us. With Seclore’s cloud model, you can successfully reduce costs and IT overheads while making your business more agile than ever before.

Seclore’s cloud-based solutions for persistent data-centric security are trusted and used by hundreds of the Global 2000 companies across the globe. By opting for cloud-based Rights Management, you can take full advantage of today’s cloud computing weather – while also availing the best Data Security for your information.