Data-Centric Security Platform

Bringing together best-of-breed solutions to streamline the discovery, identification, protection, and tracking process

Seclore delivers a powerful and intelligent Data-Centric Security architecture to synchronize and automate best-of-breed data-centric security capabilities (discover, tag, protect and track) with existing enterprise systems to optimize security, enhance workflow, and minimize user friction.

At the core is the Seclore Unified Policy Manager that connects and automates the process amongst Encryption and rights Management (Protect) and Data-Centric Audits (Track). The Policy Manager also has interfaces for this combined capability to integrate with existing enterprise systems like Identity and Access Management, DLP, CASB, Classification, ECM, EFSS, Transaction backbone systems like ERP and Core banking, Messaging systems like Email and Security Analytics tools like SIEM.

The Most Open and Automated Data-Centric Security Platform

Scroll over the diagram above to see the descriptions for each segment.

Architecture Differentiators

Open integration APIs and automation are key design principles of the Seclore Data-Centric Security Platform architecture. Open integration APIs allow the Data-Centric Security Platform (DCSP) to easily integrate with the existing enterprise systems to extend data-centric security to these systems with no disruption or changes. It allows enterprises, system integration companies and Seclore itself to rapidly build and deploy integrations

Automation capabilities allow event driven actions to be taken by the system. Information can be protected as soon as it is created, as soon as it is stored, as soon as it is attached to an email, as soon as it is discovered by a DLP system etc. Security policies and access to information can be changed as soon as an employee resigns or as soon as a task is completed etc. This is done without human intervention and thus can help scale the system across use cases and systems easily.

The deployed architecture on cloud looks like:

Seclore Data-Centric Security Platform

The Seclore Data-Centric Security Platform brings together best-of-breed data-centric security solutions to ensure the full protection and tracking of sensitive information through:

Seclore Unified Policy Manager: This is the heart of the system and coordinates all activities and events between the various components

Seclore Rights Management: Provides granular, persistent usage controls and tracking of sensitive documents including WHO can do WHAT with the enterprise data, WHEN and from WHERE

Seclore Email Encryption Plus:Automatically attaches granular usage controls to sensitive emails and attachments before they are sent with zero action required from the user.

Seclore Data-Centric Audit:Provides rich analytics about WHO did WHAT with the enterprise data, WHEN and from WHERE.

Seclore Identity Management: Manages identities for all users and interfaces with other identity and access management and Single-Sign-On systems

Seclore Policy Management:Manages all information usage policies and also interfaces with other enterprise security policy stores like ECM, EFSS, ERP, DLP, CASB, … etc. systems

Seclore Encryption and Key Management: Manages all encryption activities in the system and interfaces with other HSM and enterprise key management systems

Seclore Audit Data Management: Manages all audit and consent data and interface with enterprise security analytics, GRC and SIEM systems

Enterprise Systems

Enterprise systems that Seclore DCSP regularly integrates with include but are not limited to:

DLP & CASB: Data Loss Prevention (DLP) Systems (e.g. McAfee, Symantec, Forcepoint) and Cloud Access Security Brokers (CASB) are integrated with Seclore to automatically secure files as they are discovered

Data Classification: Users add relevant visual and metadata labels to documents to identify what information is sensitive; metadata can then be utilized to drive Seclore Rights Management

Active Directory/Single Sign On: Any Identity and Access Management, Identity Federation, or SSO system can be integrated with Seclore for simplified user authentication

File Servers: File servers with folders (called ‘Hot Folders’) are configured to secure files as soon as they are placed inside them

ECM and EFSS Systems: Enterprise Content Management (ECM) systems (e.g. IBM ECM, Microsoft SharePoint) and EFSS systems (e.g. Syncplicity, OneDrive) are seamlessly integrated with Seclore to automatically add data-centric security at the point of download

External Key Management/HSM: Seclore works with governments & defense agencies so proprietary encryption / key management systems can be incorporated within Seclore’s technology. Keys protecting the information can be externalized and secured using hardware security models.

Enterprise transaction backbone systems like ERP, Core Banking, CRM and Policy Administration: Transaction backbone systems hold some of the most confidential information which can usually be extracted by way of downloads and reports rendering all in built security policies useless. Seclore integrates with transaction backbone systems to protect downloaded data and extend the systems' security policies to data downloaded from the systems.

SIEM/Governance/Analytics: Detailed usage data on documents can be exported to a SIEM, GRC or other reporting tool for further analysis and reporting

Endpoints

Seclore enables seamless work from any endpoint using its agent based and browser- based technology.

Seclore Agents (Apps) for Windows, Mac, iOS and Android: Light-weight agents/apps for all the dominant operating systems can be installed without administrative privileges. Free apps for iOS and Android devices can be used to view, edit and respond to emails with support for the most common file formats - from Office files to PDF and OpenOffice

Seclore Online: A secure, browser-based application for viewing and editing protected documents without and installation. Works with any browser - all you need is an internet connection

Seclore also provides the Data-Centric Security Platform as an on-premise solution with the same overall architecture and data hosted on – premise. The deployed architecture looks like:

eBook: How to Build a Smarter Data-Centric Security Infrastructure

Seclore’s CEO, Vishal Gupta shares how to deploy a smart, integrated and automated Data-Centric Security Platform.

Gain insights on:

  • Extending the value and addressing limitations of individual Data-Centric Security technologies
  • Recommended approaches for deploying a best-of-breed Data-Centric Security infrastructure
  • Leveraging your existing investments to automate and streamline the discovery, classification, protection and tracking process

Additional Data Security Resources

Seclore Data-Centric Security Platform Brochure
A comprehensive guide on best practices and recommendations for deploying a best-of-breed Data-Centric Security Infrastructure.
Demo of Seclore Data-Centric Security Platform
See how DLP, Classification and Rights Management work in concert to better protect and track your information
Seclore Rights Management Brochure
Find out how data-centric security will dramatically reduce the risk of data loss.
Seclore Data Classification Brochure
Seclore Data Classification enables organizations to easily define and apply classification to their documents as they are created and modified.