Digital Rights Management Architecture


Seclore’s digital rights management architecture is designed to seamlessly integrate with existing enterprise systems including DLP, ECM, ERP, EFSS, email and other transactional systems. By automatically adding granular, persistent digital rights to files and data as they are downloaded, shared, and discovered, organizations can protect files while they are at rest, in transit and at work.

How Digital Rights Management Secures Data for an Organization


1 Protect a file

You protect a file on your computer

2 Share it any way you like

You send it to the recipients via any mechanism: email, file sharing services, USB drives, CD/DVD, …

3 Data security is permanently enforced

File can be accessed on any platform or device – and it never loses its security

Seclore Digital Rights Management Architecture –
on Premise

Seclore’s Digital Rights Management Architectural Elements


  • Seclore Policy Server: The command-and-control center of the Seclore system that is used to manage usage policies, user permissions, protected files, activity logs, and other information
  • Seclore Identity Manager: Our own LDAP system that functions like a full-fledged Identity and Access Management system with users, groups, OUs with registration and self-service workflows
  • Seclore Lite Server: The server used to access protected files using Seclore Lite Online, our browser-based module
  • IAM Systems: Any Identity and Access Management, Identity Federation, or Single sign-on system integrated with Seclore FileSecure for user authentication
  • EFSS: Seclore adds persistent data security to files that are shared via Enterprise File Synch and Share (EFSS) systems
  • File Servers: File servers with folders (called ‘Hot Folders’) configured to secure files as soon as they are placed inside them
  • ECM Systems: Enterprise Content Management (ECM) systems (e.g. IBM FileNet, Microsoft SharePoint) that are seamlessly integrated with Seclore to automatically add data-centric security at the point of download
  • DLP Systems: Data Loss Prevention (DLP) Systems (e.g. McAfee DLP, Symantec DLP) that are integrated with Seclore to automatically secure files discovered by DLP
  • Enterprise Applications: Enterprise applications (e.g. SAP and Transactional Systems) integrated with Seclore to automatically apply data-centric security to downloaded files, reports, and other extracts

Seclore Digital Rights Management Architecture –
in the Cloud


Seclore can be used as a service from the cloud – completely managed and maintained by us. With Seclore’s cloud model, you can successfully reduce costs and IT overheads while making your business more agile than ever before.

Seclore’s cloud-based solutions for persistent data-centric security are trusted and used by hundreds of the Global 2000 companies across the globe. By opting for cloud-based Digital Rights Management, you can take full advantage of today’s cloud computing weather – while also availing the best Data Security for your information.

Five-Minute Demo Video on Seclore Rights Management

See how Seclore’s open, browser-based approach to Rights Management is helping organizations easily and consistently close security gaps.


See the Power of Seclore Rights Management in this Five-Minute Demo Video

Learn More


Take the EDRM Test. How Secure is Your EDRM?
Whether you are investing in a new Rights Management system, or have one in place, find out if the solutions you are considering or currently using are making the grade.


RFP Guide
A comprehensive checklist for choosing the right Rights Management solution.


The Value of Digital Rights Management
Five-minute demo on how Digital Rights Management is helping organizations stop data loss and address compliance.