Outsourcing operations like data entry, printing, payroll management to external service providers requires organisations to share confidential information with external agencies. Sometimes data is generated within enterprise and then shared with external agency. It is equally possible that data is generated by external agency and then becomes part of enterprise’s transactional system.
In both cases risks associated with information breaches are high and can cause loss of reputation, apart from monetary losses besides possible regulatory non compliance. Encryption is also inadequate solution since encryption does not take care of data in all life cycle stages.
Seclore Infosource mitigates risks of information breach during outsourcing by applying controls throughout lifecycle of information. These controls ensure that data is used only for intended purpose and not for any other purpose. Seclore Infosource extends scope of enterprise information rights management to the context of outsourcing.
Seclore Infosource offers a lot more than encryption. Seclore Infosource protects information for wide range of file formats. Seclore Infosource defines usage rights and not merely access rights to information. Seclore Infosource restricts usage rights to specific computers, users, applications, thus preventing access to information outside permissible infrastructure.
Seclore Infosource’s protects information throughout lifecycle – creation, transmission, usage, storage and destruction. Seclore Infosource does not require ongoing connectivity between enterprise’s infrastructure and service provider. Hence information is protected even during blackout or network outage, while ensuring that work can be done without breaks. Seclore Infosource does not restrict mode of information sharing – FTP, CDs etc – since protection is within information.
SECLORE INFOSOURCE ALLOWS ONE TO:1. Define Information Usage Policies
2. Attach Policies To Individual Pieces Of Information
Policies as defined above can be attached to information at various points in time such as:
As soon as it is created based on user defined prompts
As soon as it is placed in certain locations or folders
As soon as it is attached to an email
As soon as it is uploaded to document management system
As soon as it discovered by data loss prevention system
3. Control Usage Of Policy Governed Information
Information created using Seclore InfoSource can be controlled independent of its location by changing policies if required even after distribution.
4. Audit Usage Of Information.
Information secured using Seclore InfoSource can be audited for who accessed information, for what purpose, when and where. This information is captured from usage environments and captured centrally. These usage reports can be structured for compliance reporting frameworks like ISO27001.