SlideShare a Scribd company logo
1 of 35
Download to read offline
In association with Presented by Supported by 
INFORMATION LOSS PREVENTION - 
PRINCIPLES & PRACTICES 
Geet Lulla, VP - India & ME, Seclore 
SEPT 19, 2014 Hotel Digital Security Seminar
Presented by 
In association with 
Supported by 
Geet Lulla 
Geet enjoys providing his enterprise 
clients with business solutions to 
their business problems. 
A 20 year veteran, he has worked 
with global brands such as 
Honeywell, SAP, Oracle, NCR and 
Experian, focused on the India 
market. 
At KPMG India, he built the cross-domain 
sales approach for the 
management consulting practice. 
By X Events Hospitality (www.x-events.in) 
2 
Hotel Digital Security Seminar & Webinar, Sept 19, 2014
Presented by 
In association with 
Supported by 
By X Events Hospitality Hotel Digital Security Seminar & Webinar, Sept 19, 2014 (www.x-events.in) 
3 
¨ Most of us can keep a secret. 
¨ It is the people we tell it to, who cannot. 
¨ - Anonymous
Presented by 
In association with 
Supported by 
WW ho we are 
§ High-growth Document Rights & Access Management software product company 
§ India Headquarters - Mumbai, India 
§ Global Headquarters – Mumbai, India 
§ Incubated and promoted by IIT Bombay (2006-08) 
o Technology commercialization program “SINE” (www.sineiitb.org) 
§ 250 clients, 22 countries, 3.5 millions users 
§ Geographic coverage 
o Direct – South Asia, Europe, North America, Middle East 
o Indirect – Africa, South America, North Asia 
By X Events Hospitality Hotel Digital Security Seminar & Webinar, Sept 19, 2014 (www.x-events.in)
Presented by 
In association with 
Supported by 
Awards & recognition 
2012 Deloitte Technology Fast 50 for 2012 & 2013 2013 
2012 Gartner Cool Vendor for 2012 
Kuppinger Cole Global list of "Hidden Gems" in 
IAM in 2010 
2010 
Top 10 finalists in the Innovations Ideas in Practice 2010 by IIT, 
Bombay Alumni Association, Pune 
2010 
2009 Marico Innovation for India 2010 Awards 
TR35 award for innovators, whose inventions and research, 
Massachusetts Institute of Technology (MIT) finds exciting 
2009 
By X Events Hospitality Hotel Digital Security Seminar & Webinar, Sept 19, 2014 (www.x-events.in)
Presented by 
In association with 
Supported by 
Marquee Customers 
By X Events Hospitality Hotel Digital Security Seminar & Webinar, Sept 19, 2014 (www.x-events.in)
Presented by 
In association with 
Supported by 
Marquee Customers - India 
Marquee customers - India 
By X Events Hospitality Hotel Digital Security Seminar & Webinar, Sept 19, 2014 (www.x-events.in)
Presented by 
In association with 
Supported by 
Marquee Customers - ROW 
Marquee customers - ROW 
By X Events Hospitality Hotel Digital Security Seminar & Webinar, Sept 19, 2014 (www.x-events.in)
Presented by 
In association with 
Supported by 
The PROBLEMS… 
Seclore FileSecure 
By X Events Hospitality Hotel Digital Security Seminar & Webinar, Sept 19, 2014 (www.x-events.in)
Presented by 
In association with 
Supported by 
Enterprise information universe 
Digital 
Information 
Applications 
ERP, CRM, DW 
MIS / Reports / Data 
Extracts 
Content 
Files, Folders, 
Emails 
Gartner 2013 
Big Content: The Unstructured Side of Big Data 
“Unstructured data represents as much as 80% of an 
organization’s total information assets” 
By X Events Hospitality Hotel Digital Security Seminar & Webinar, Sept 19, 2014 (www.x-events.in)
Presented by 
In association with 
Supported by 
Internal: Perimeter definition challenges 
Bring Your Own Device 
iPads in Boardroom 
Mobile Employees 
External Collaboration 
Lawyers, Auditors, Partners, 
Service Providers, Joint 
Ventures, Customers, … 
Cloud Applications: 
SalesForce… 
Cloud Services: 
DropBox… 
By X Events Hospitality Hotel Digital Security Seminar & Webinar, Sept 19, 2014 (www.x-events.in)
Presented by 
In association with 
Supported by 
External: Information going out 
Very often, information needs to travel outside the enterprise 
boundary to: 
By X Events Hospitality Hotel Digital Security Seminar & Webinar, Sept 19, 2014 (www.x-events.in)
Presented by 
In association with 
Supported by 
13 
Legacy handling of loss #1 
Non-Disclosure Agreement 
By X Events Hospitality Hotel Digital Security Seminar & Webinar, Sept 19, 2014 (www.x-events.in)
Presented by 
In association with 
Supported by 
Legacy handling of loss #2 
By X Events Hospitality Hotel Digital Security Seminar & Webinar, Sept 19, 2014 (www.x-events.in)
Presented by 
In association with 
Supported by 
Legacy handling of loss #3 
15 By X Events Hospitality Hotel Digital Security Seminar & Webinar, Sept 19, 2014 (www.x-events.in)
Presented by 
In association with 
Supported by 
The problem 
Information 
sent 
out(side) 
is 
IMPOSSIBLE 
to control 
By X Events Hospitality Hotel Digital Security Seminar & Webinar, Sept 19, 2014 (www.x-events.in)
Presented by 
In association with 
Supported by 
The SOLUTION… 
Seclore FileSecure 
By X Events Hospitality Hotel Digital Security Seminar & Webinar, Sept 19, 2014 (www.x-events.in)
Presented by 
In association with 
Supported by 
Holistic info loss prevention 
Data 
Classification 
Content Inspection 
(aka Data Leakage 
Prevention, DLP) 
DC 
Rights RM CI 
Management 
Hotel Digital Security Seminar & Webinar, Sept 19, 2014 By X Events Hospitality (www.x-events.in)
Presented by 
In association with 
Supported by 
What FileSecure Controls 
What FileSecure controls 
TOP SECRET 
CONFIDENTIAL 
INTERNAL 
POLICY 3 
PUBLIC 
PROTECTOR 
POLICY 1 
POLICY 2 
POLICY 4 
By X Events Hospitality Hotel Digital Security Seminar & Webinar, Sept 19, 2014 (www.x-events.in)
Presented by 
In association with 
Supported by 
Protection attributes 
Permanence 
Protection will always persist with the file 
Remote-Control 
Change your protection policy, 
sitting anywhere in the world 
Audit Trail 
All activities on file tracked: 
Users, Activity type, Date/Time, 
Location 
By X Events Hospitality Hotel Digital Security Seminar & Webinar, Sept 19, 2014 (www.x-events.in)
Presented by 
In association with 
Supported by 
Easy for users (recipients) 
No authentication overhead 
For internal users, integrate with AD and other IAM / SSO tools 
Use in native application (DC) 
• File extension in maintained 
• File opens in native application 
(e.g. MS-Office, Acrobat Reader, AutoCAD, 
OpenOffice) 
Smart devices support 
iOS and Android viewers, for smartphone and 
BYOD tabs 
Hotel Digital Security Seminar & Webinar, Sept 19, 2014 By X Events Hospitality (www.x-events.in)
Presented by 
In association with 
Supported by 
Ease of protection (automatic protection) 
API 
Integrati 
on ERP, 
CRM, 
DW, etc. 
Data Loss 
Prevention 
Content / 
Document 
Manageme 
nt 
Mail & 
Messaging* 
Recipient can 
use any mail 
client 
By X Events Hospitality Hotel Digital Security Seminar & Webinar, Sept 19, 2014 (www.x-events.in)
Presented by 
In association with 
Supported by 
Securing Information Wherever It Goes! 
Securing info wherever it goes! 
By X Events Hospitality Hotel Digital Security Seminar & Webinar, Sept 19, 2014 (www.x-events.in)
Presented by 
In association with 
Supported by 
Audit trail 
Seclore FileSecure 
By X Events Hospitality Hotel Digital Security Seminar & Webinar, Sept 19, 2014 (www.x-events.in)
Presented by 
In association with 
Supported by 
Audit usage of info (not just info systems) 
WHO accessed the 
file, WHAT did the user 
do, WHEN & WHERE, 
is all captured from 
distributed usage 
environments and 
reported centrally 
Audit reports can be 
used in compliance 
reporting for 
frameworks like ISO 
27001, Sarbanes- 
Oxley, GLBA, PCI-DSS, 
HIPAA, etc. 
By X Events Hospitality Hotel Digital Security Seminar & Webinar, Sept 19, 2014 (www.x-events.in)
Presented by 
In association with 
Supported by 
DLP Integration 
Seclore FileSecure 
By X Events Hospitality Hotel Digital Security Seminar & Webinar, Sept 19, 2014 (www.x-events.in)
Presented by 
In association with 
Supported by 
Content discovery (DLP) based protection 
A document gets protected as soon as it is “discovered” or “tagged” by a DLP system 
By X Events Hospitality Hotel Digital Security Seminar & Webinar, Sept 19, 2014 (www.x-events.in)
Presented by 
In association with 
Supported by 
ECM Integration 
Seclore FileSecure 
By X Events Hospitality Hotel Digital Security Seminar & Webinar, Sept 19, 2014 (www.x-events.in)
Presented by 
In association with 
Supported by 
Doc. mgt. system like SharePoint 
Check in 
ü DOWNLOAD 
Checkout 
Protection & Download 
ü UPLOAD 
Versioning, Content 
Search 
Ensuring File Security is Present outside SharePoint 
Ensuring SharePoint features are not Affected 
By X Events Hospitality Hotel Digital Security Seminar & Webinar, Sept 19, 2014 (www.x-events.in)
Presented by 
In association with 
Supported by 
Document Management System Protection 
Doc. mgt. system protection 
Integration Option in MS SharePoint 
By X Events Hospitality Hotel Digital Security Seminar & Webinar, Sept 19, 2014 (www.x-events.in)
Presented by 
In association with 
Supported by 
About us 
HATT is India's young and premium 
community for CXOs from the 
Hospitality, Healthcare, Aviation, Travel 
and Tourism industries. 
o With over 1,000 members across 
India, we are now poised to expand 
globally with a presence in South East 
Asia and the Middle East by 2016. 
www.hattforum.com 
Hotel Digital Security Seminar & Webinar, Sept 19, 2014 
31 
X Events manages & supports events 
exclusively for the hospitality & travel 
industries. 
o Our USP is that we are hoteliers 
by training. We focus on the two 
most important aspects of an 
event; content quality and impact. 
o We do it because we believe in it. 
www.x-events.in 
By X Events Hospitality (www.x-events.in) 
FB/hattforum
Presented by 
In association with 
Supported by 
Our host – Brian Pereira 
Brian is a veteran technology 
journalist with two decades of 
experience. He has served as 
editor for two magazines: CHIP 
and InformationWeek India. 
He is a respected speaker & host 
at conferences worldwide. 
In his current role at Hannover 
Milano Fairs India, Brian serves 
as project head for CeBIT 
Global Conferences, 
the world's largest ICT fair that 
will debut in India this November, 
in Bangalore. 
By X Events Hospitality (www.x-events.in) 
32 
Hotel Digital Security Seminar & Webinar, Sept 19, 2014
Presented by 
In association with 
Supported by 
Hotel Digital Security Seminar & Webinar, Sept 19, 2014 
33 
Five expert speakers 
1. Latest threats in digital security (Worms, attacks, viruses, flaws) - Santosh Satam, 
CEO, SecurBay Services. 
2. The immediate action needed to tighten up (Priority list, cost, internal policies) 
- Ambarish Deshpande, MD - India & SAARC, Blue Coat 
3. Information loss prevention (Principles & practices) - Geet Lulla, VP - India & ME, 
Seclore 
4. How to build a business case & get the management's attention - Dhananjay 
Rokde, CISO, Cox & Kings Group. 
5. Global cyber security outlook - A. K. Viswanathan, Senior Director - Enterprise Risk 
Services, Deloitte India. 
By X Events Hospitality (www.x-events.in) 
The seminar schedule
Presented by 
In association with 
Supported by 
Our sponsors & supporters 
By X Events Hospitality Hotel Digital Security Seminar & Webinar, Sept 19, 2014 (www.x-events.in) 
34 
Thank You
In association with Presented by Supported by 
HOTEL DIGITAL SECURITY SEMINAR 
SEPT 19, 2014 www.x-events.in

More Related Content

Similar to Information Loss Prevention - Seclore (Hotel_Digital_Security_Semianr_Sept19'14)

Tighten Up Data Security - Blue Coat (Hotel_Data_Security_Seminar_Sept19'14)
Tighten Up Data Security - Blue Coat (Hotel_Data_Security_Seminar_Sept19'14)Tighten Up Data Security - Blue Coat (Hotel_Data_Security_Seminar_Sept19'14)
Tighten Up Data Security - Blue Coat (Hotel_Data_Security_Seminar_Sept19'14)XEventsHospitality
 
Latest Threats in Digital Security - SecurBay (Hotel_Digital_Security_Seminar...
Latest Threats in Digital Security - SecurBay (Hotel_Digital_Security_Seminar...Latest Threats in Digital Security - SecurBay (Hotel_Digital_Security_Seminar...
Latest Threats in Digital Security - SecurBay (Hotel_Digital_Security_Seminar...XEventsHospitality
 
Build A Business Case For IT Security - Dhananjay Rokde (Hotel_Digital_Securi...
Build A Business Case For IT Security - Dhananjay Rokde (Hotel_Digital_Securi...Build A Business Case For IT Security - Dhananjay Rokde (Hotel_Digital_Securi...
Build A Business Case For IT Security - Dhananjay Rokde (Hotel_Digital_Securi...XEventsHospitality
 
The latest threats on digital security -
The latest threats on digital security  - The latest threats on digital security  -
The latest threats on digital security - Santosh Satam
 
Global Cyber Security Outlook - Deloitte (Hotel_Digital_Security_Seminar_Sept...
Global Cyber Security Outlook - Deloitte (Hotel_Digital_Security_Seminar_Sept...Global Cyber Security Outlook - Deloitte (Hotel_Digital_Security_Seminar_Sept...
Global Cyber Security Outlook - Deloitte (Hotel_Digital_Security_Seminar_Sept...XEventsHospitality
 
IRM: Using Identity to Empower CIOs Everywhere
IRM: Using Identity to Empower CIOs EverywhereIRM: Using Identity to Empower CIOs Everywhere
IRM: Using Identity to Empower CIOs EverywhereForgeRock
 
Nordic IT Security 2014 agenda
Nordic IT Security 2014 agendaNordic IT Security 2014 agenda
Nordic IT Security 2014 agendaCopperberg
 
[Webinar Slides] Your 2019 Information Management Resolution: Part Two
[Webinar Slides] Your 2019 Information Management Resolution: Part Two[Webinar Slides] Your 2019 Information Management Resolution: Part Two
[Webinar Slides] Your 2019 Information Management Resolution: Part TwoAIIM International
 
Unleash Your Inner Creativity: Virtual Event Planner Edition!
Unleash Your Inner Creativity: Virtual Event Planner Edition!Unleash Your Inner Creativity: Virtual Event Planner Edition!
Unleash Your Inner Creativity: Virtual Event Planner Edition!Harriet Davis
 
Applying Conversational AI in the Enterprise
Applying Conversational AI in the EnterpriseApplying Conversational AI in the Enterprise
Applying Conversational AI in the EnterpriseRasa Technologies
 
Enterprise APP & MDM Evolution 2014 - Media Center
Enterprise APP & MDM Evolution 2014 - Media CenterEnterprise APP & MDM Evolution 2014 - Media Center
Enterprise APP & MDM Evolution 2014 - Media CenterMaria Willamowius
 
Marlabs corporate deck july 2018
Marlabs corporate deck july 2018Marlabs corporate deck july 2018
Marlabs corporate deck july 2018Marlabs
 
IBM InterConnect 2015 - Speaker guidelines and tips!
IBM InterConnect 2015 - Speaker guidelines and tips!IBM InterConnect 2015 - Speaker guidelines and tips!
IBM InterConnect 2015 - Speaker guidelines and tips!Cristina Carretero
 
KM at Microsoft Services: Strategy, Execution & Culture
KM at Microsoft Services: Strategy, Execution & CultureKM at Microsoft Services: Strategy, Execution & Culture
KM at Microsoft Services: Strategy, Execution & CultureJean-Claude Ferréol Monney
 
Doddi Priyambodo - Scrum Day Asia 20121123 - AGILE SOFTWARE DEVELOPMENT LIFE ...
Doddi Priyambodo - Scrum Day Asia 20121123 - AGILE SOFTWARE DEVELOPMENT LIFE ...Doddi Priyambodo - Scrum Day Asia 20121123 - AGILE SOFTWARE DEVELOPMENT LIFE ...
Doddi Priyambodo - Scrum Day Asia 20121123 - AGILE SOFTWARE DEVELOPMENT LIFE ...Doddi Priyambodo
 
Citrix Secure Digital Perimeter (for Six Degrees 171018)
Citrix Secure Digital Perimeter (for Six Degrees 171018)Citrix Secure Digital Perimeter (for Six Degrees 171018)
Citrix Secure Digital Perimeter (for Six Degrees 171018)Six Degrees
 
BA Company Presentation
BA Company PresentationBA Company Presentation
BA Company Presentation247 Invest
 
Cyber security conference 2016 - OpenSphere Overview
Cyber security conference 2016 - OpenSphere OverviewCyber security conference 2016 - OpenSphere Overview
Cyber security conference 2016 - OpenSphere OverviewDannisen Chellen
 
CDIC 2013-Mobile Application Pentest Workshop
CDIC 2013-Mobile Application Pentest WorkshopCDIC 2013-Mobile Application Pentest Workshop
CDIC 2013-Mobile Application Pentest WorkshopPrathan Phongthiproek
 

Similar to Information Loss Prevention - Seclore (Hotel_Digital_Security_Semianr_Sept19'14) (20)

Tighten Up Data Security - Blue Coat (Hotel_Data_Security_Seminar_Sept19'14)
Tighten Up Data Security - Blue Coat (Hotel_Data_Security_Seminar_Sept19'14)Tighten Up Data Security - Blue Coat (Hotel_Data_Security_Seminar_Sept19'14)
Tighten Up Data Security - Blue Coat (Hotel_Data_Security_Seminar_Sept19'14)
 
Latest Threats in Digital Security - SecurBay (Hotel_Digital_Security_Seminar...
Latest Threats in Digital Security - SecurBay (Hotel_Digital_Security_Seminar...Latest Threats in Digital Security - SecurBay (Hotel_Digital_Security_Seminar...
Latest Threats in Digital Security - SecurBay (Hotel_Digital_Security_Seminar...
 
Build A Business Case For IT Security - Dhananjay Rokde (Hotel_Digital_Securi...
Build A Business Case For IT Security - Dhananjay Rokde (Hotel_Digital_Securi...Build A Business Case For IT Security - Dhananjay Rokde (Hotel_Digital_Securi...
Build A Business Case For IT Security - Dhananjay Rokde (Hotel_Digital_Securi...
 
The latest threats on digital security -
The latest threats on digital security  - The latest threats on digital security  -
The latest threats on digital security -
 
Global Cyber Security Outlook - Deloitte (Hotel_Digital_Security_Seminar_Sept...
Global Cyber Security Outlook - Deloitte (Hotel_Digital_Security_Seminar_Sept...Global Cyber Security Outlook - Deloitte (Hotel_Digital_Security_Seminar_Sept...
Global Cyber Security Outlook - Deloitte (Hotel_Digital_Security_Seminar_Sept...
 
IRM: Using Identity to Empower CIOs Everywhere
IRM: Using Identity to Empower CIOs EverywhereIRM: Using Identity to Empower CIOs Everywhere
IRM: Using Identity to Empower CIOs Everywhere
 
Nordic IT Security 2014 agenda
Nordic IT Security 2014 agendaNordic IT Security 2014 agenda
Nordic IT Security 2014 agenda
 
[Webinar Slides] Your 2019 Information Management Resolution: Part Two
[Webinar Slides] Your 2019 Information Management Resolution: Part Two[Webinar Slides] Your 2019 Information Management Resolution: Part Two
[Webinar Slides] Your 2019 Information Management Resolution: Part Two
 
Unleash Your Inner Creativity: Virtual Event Planner Edition!
Unleash Your Inner Creativity: Virtual Event Planner Edition!Unleash Your Inner Creativity: Virtual Event Planner Edition!
Unleash Your Inner Creativity: Virtual Event Planner Edition!
 
Acronis for SAP
Acronis for SAPAcronis for SAP
Acronis for SAP
 
Applying Conversational AI in the Enterprise
Applying Conversational AI in the EnterpriseApplying Conversational AI in the Enterprise
Applying Conversational AI in the Enterprise
 
Enterprise APP & MDM Evolution 2014 - Media Center
Enterprise APP & MDM Evolution 2014 - Media CenterEnterprise APP & MDM Evolution 2014 - Media Center
Enterprise APP & MDM Evolution 2014 - Media Center
 
Marlabs corporate deck july 2018
Marlabs corporate deck july 2018Marlabs corporate deck july 2018
Marlabs corporate deck july 2018
 
IBM InterConnect 2015 - Speaker guidelines and tips!
IBM InterConnect 2015 - Speaker guidelines and tips!IBM InterConnect 2015 - Speaker guidelines and tips!
IBM InterConnect 2015 - Speaker guidelines and tips!
 
KM at Microsoft Services: Strategy, Execution & Culture
KM at Microsoft Services: Strategy, Execution & CultureKM at Microsoft Services: Strategy, Execution & Culture
KM at Microsoft Services: Strategy, Execution & Culture
 
Doddi Priyambodo - Scrum Day Asia 20121123 - AGILE SOFTWARE DEVELOPMENT LIFE ...
Doddi Priyambodo - Scrum Day Asia 20121123 - AGILE SOFTWARE DEVELOPMENT LIFE ...Doddi Priyambodo - Scrum Day Asia 20121123 - AGILE SOFTWARE DEVELOPMENT LIFE ...
Doddi Priyambodo - Scrum Day Asia 20121123 - AGILE SOFTWARE DEVELOPMENT LIFE ...
 
Citrix Secure Digital Perimeter (for Six Degrees 171018)
Citrix Secure Digital Perimeter (for Six Degrees 171018)Citrix Secure Digital Perimeter (for Six Degrees 171018)
Citrix Secure Digital Perimeter (for Six Degrees 171018)
 
BA Company Presentation
BA Company PresentationBA Company Presentation
BA Company Presentation
 
Cyber security conference 2016 - OpenSphere Overview
Cyber security conference 2016 - OpenSphere OverviewCyber security conference 2016 - OpenSphere Overview
Cyber security conference 2016 - OpenSphere Overview
 
CDIC 2013-Mobile Application Pentest Workshop
CDIC 2013-Mobile Application Pentest WorkshopCDIC 2013-Mobile Application Pentest Workshop
CDIC 2013-Mobile Application Pentest Workshop
 

Recently uploaded

Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Zilliz
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxRemote DBA Services
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...apidays
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsNanddeep Nachan
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontologyjohnbeverley2021
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...apidays
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Bhuvaneswari Subramani
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusZilliz
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdfSandro Moreira
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelDeepika Singh
 

Recently uploaded (20)

Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 

Information Loss Prevention - Seclore (Hotel_Digital_Security_Semianr_Sept19'14)

  • 1. In association with Presented by Supported by INFORMATION LOSS PREVENTION - PRINCIPLES & PRACTICES Geet Lulla, VP - India & ME, Seclore SEPT 19, 2014 Hotel Digital Security Seminar
  • 2. Presented by In association with Supported by Geet Lulla Geet enjoys providing his enterprise clients with business solutions to their business problems. A 20 year veteran, he has worked with global brands such as Honeywell, SAP, Oracle, NCR and Experian, focused on the India market. At KPMG India, he built the cross-domain sales approach for the management consulting practice. By X Events Hospitality (www.x-events.in) 2 Hotel Digital Security Seminar & Webinar, Sept 19, 2014
  • 3. Presented by In association with Supported by By X Events Hospitality Hotel Digital Security Seminar & Webinar, Sept 19, 2014 (www.x-events.in) 3 ¨ Most of us can keep a secret. ¨ It is the people we tell it to, who cannot. ¨ - Anonymous
  • 4. Presented by In association with Supported by WW ho we are § High-growth Document Rights & Access Management software product company § India Headquarters - Mumbai, India § Global Headquarters – Mumbai, India § Incubated and promoted by IIT Bombay (2006-08) o Technology commercialization program “SINE” (www.sineiitb.org) § 250 clients, 22 countries, 3.5 millions users § Geographic coverage o Direct – South Asia, Europe, North America, Middle East o Indirect – Africa, South America, North Asia By X Events Hospitality Hotel Digital Security Seminar & Webinar, Sept 19, 2014 (www.x-events.in)
  • 5. Presented by In association with Supported by Awards & recognition 2012 Deloitte Technology Fast 50 for 2012 & 2013 2013 2012 Gartner Cool Vendor for 2012 Kuppinger Cole Global list of "Hidden Gems" in IAM in 2010 2010 Top 10 finalists in the Innovations Ideas in Practice 2010 by IIT, Bombay Alumni Association, Pune 2010 2009 Marico Innovation for India 2010 Awards TR35 award for innovators, whose inventions and research, Massachusetts Institute of Technology (MIT) finds exciting 2009 By X Events Hospitality Hotel Digital Security Seminar & Webinar, Sept 19, 2014 (www.x-events.in)
  • 6. Presented by In association with Supported by Marquee Customers By X Events Hospitality Hotel Digital Security Seminar & Webinar, Sept 19, 2014 (www.x-events.in)
  • 7. Presented by In association with Supported by Marquee Customers - India Marquee customers - India By X Events Hospitality Hotel Digital Security Seminar & Webinar, Sept 19, 2014 (www.x-events.in)
  • 8. Presented by In association with Supported by Marquee Customers - ROW Marquee customers - ROW By X Events Hospitality Hotel Digital Security Seminar & Webinar, Sept 19, 2014 (www.x-events.in)
  • 9. Presented by In association with Supported by The PROBLEMS… Seclore FileSecure By X Events Hospitality Hotel Digital Security Seminar & Webinar, Sept 19, 2014 (www.x-events.in)
  • 10. Presented by In association with Supported by Enterprise information universe Digital Information Applications ERP, CRM, DW MIS / Reports / Data Extracts Content Files, Folders, Emails Gartner 2013 Big Content: The Unstructured Side of Big Data “Unstructured data represents as much as 80% of an organization’s total information assets” By X Events Hospitality Hotel Digital Security Seminar & Webinar, Sept 19, 2014 (www.x-events.in)
  • 11. Presented by In association with Supported by Internal: Perimeter definition challenges Bring Your Own Device iPads in Boardroom Mobile Employees External Collaboration Lawyers, Auditors, Partners, Service Providers, Joint Ventures, Customers, … Cloud Applications: SalesForce… Cloud Services: DropBox… By X Events Hospitality Hotel Digital Security Seminar & Webinar, Sept 19, 2014 (www.x-events.in)
  • 12. Presented by In association with Supported by External: Information going out Very often, information needs to travel outside the enterprise boundary to: By X Events Hospitality Hotel Digital Security Seminar & Webinar, Sept 19, 2014 (www.x-events.in)
  • 13. Presented by In association with Supported by 13 Legacy handling of loss #1 Non-Disclosure Agreement By X Events Hospitality Hotel Digital Security Seminar & Webinar, Sept 19, 2014 (www.x-events.in)
  • 14. Presented by In association with Supported by Legacy handling of loss #2 By X Events Hospitality Hotel Digital Security Seminar & Webinar, Sept 19, 2014 (www.x-events.in)
  • 15. Presented by In association with Supported by Legacy handling of loss #3 15 By X Events Hospitality Hotel Digital Security Seminar & Webinar, Sept 19, 2014 (www.x-events.in)
  • 16. Presented by In association with Supported by The problem Information sent out(side) is IMPOSSIBLE to control By X Events Hospitality Hotel Digital Security Seminar & Webinar, Sept 19, 2014 (www.x-events.in)
  • 17. Presented by In association with Supported by The SOLUTION… Seclore FileSecure By X Events Hospitality Hotel Digital Security Seminar & Webinar, Sept 19, 2014 (www.x-events.in)
  • 18. Presented by In association with Supported by Holistic info loss prevention Data Classification Content Inspection (aka Data Leakage Prevention, DLP) DC Rights RM CI Management Hotel Digital Security Seminar & Webinar, Sept 19, 2014 By X Events Hospitality (www.x-events.in)
  • 19. Presented by In association with Supported by What FileSecure Controls What FileSecure controls TOP SECRET CONFIDENTIAL INTERNAL POLICY 3 PUBLIC PROTECTOR POLICY 1 POLICY 2 POLICY 4 By X Events Hospitality Hotel Digital Security Seminar & Webinar, Sept 19, 2014 (www.x-events.in)
  • 20. Presented by In association with Supported by Protection attributes Permanence Protection will always persist with the file Remote-Control Change your protection policy, sitting anywhere in the world Audit Trail All activities on file tracked: Users, Activity type, Date/Time, Location By X Events Hospitality Hotel Digital Security Seminar & Webinar, Sept 19, 2014 (www.x-events.in)
  • 21. Presented by In association with Supported by Easy for users (recipients) No authentication overhead For internal users, integrate with AD and other IAM / SSO tools Use in native application (DC) • File extension in maintained • File opens in native application (e.g. MS-Office, Acrobat Reader, AutoCAD, OpenOffice) Smart devices support iOS and Android viewers, for smartphone and BYOD tabs Hotel Digital Security Seminar & Webinar, Sept 19, 2014 By X Events Hospitality (www.x-events.in)
  • 22. Presented by In association with Supported by Ease of protection (automatic protection) API Integrati on ERP, CRM, DW, etc. Data Loss Prevention Content / Document Manageme nt Mail & Messaging* Recipient can use any mail client By X Events Hospitality Hotel Digital Security Seminar & Webinar, Sept 19, 2014 (www.x-events.in)
  • 23. Presented by In association with Supported by Securing Information Wherever It Goes! Securing info wherever it goes! By X Events Hospitality Hotel Digital Security Seminar & Webinar, Sept 19, 2014 (www.x-events.in)
  • 24. Presented by In association with Supported by Audit trail Seclore FileSecure By X Events Hospitality Hotel Digital Security Seminar & Webinar, Sept 19, 2014 (www.x-events.in)
  • 25. Presented by In association with Supported by Audit usage of info (not just info systems) WHO accessed the file, WHAT did the user do, WHEN & WHERE, is all captured from distributed usage environments and reported centrally Audit reports can be used in compliance reporting for frameworks like ISO 27001, Sarbanes- Oxley, GLBA, PCI-DSS, HIPAA, etc. By X Events Hospitality Hotel Digital Security Seminar & Webinar, Sept 19, 2014 (www.x-events.in)
  • 26. Presented by In association with Supported by DLP Integration Seclore FileSecure By X Events Hospitality Hotel Digital Security Seminar & Webinar, Sept 19, 2014 (www.x-events.in)
  • 27. Presented by In association with Supported by Content discovery (DLP) based protection A document gets protected as soon as it is “discovered” or “tagged” by a DLP system By X Events Hospitality Hotel Digital Security Seminar & Webinar, Sept 19, 2014 (www.x-events.in)
  • 28. Presented by In association with Supported by ECM Integration Seclore FileSecure By X Events Hospitality Hotel Digital Security Seminar & Webinar, Sept 19, 2014 (www.x-events.in)
  • 29. Presented by In association with Supported by Doc. mgt. system like SharePoint Check in ü DOWNLOAD Checkout Protection & Download ü UPLOAD Versioning, Content Search Ensuring File Security is Present outside SharePoint Ensuring SharePoint features are not Affected By X Events Hospitality Hotel Digital Security Seminar & Webinar, Sept 19, 2014 (www.x-events.in)
  • 30. Presented by In association with Supported by Document Management System Protection Doc. mgt. system protection Integration Option in MS SharePoint By X Events Hospitality Hotel Digital Security Seminar & Webinar, Sept 19, 2014 (www.x-events.in)
  • 31. Presented by In association with Supported by About us HATT is India's young and premium community for CXOs from the Hospitality, Healthcare, Aviation, Travel and Tourism industries. o With over 1,000 members across India, we are now poised to expand globally with a presence in South East Asia and the Middle East by 2016. www.hattforum.com Hotel Digital Security Seminar & Webinar, Sept 19, 2014 31 X Events manages & supports events exclusively for the hospitality & travel industries. o Our USP is that we are hoteliers by training. We focus on the two most important aspects of an event; content quality and impact. o We do it because we believe in it. www.x-events.in By X Events Hospitality (www.x-events.in) FB/hattforum
  • 32. Presented by In association with Supported by Our host – Brian Pereira Brian is a veteran technology journalist with two decades of experience. He has served as editor for two magazines: CHIP and InformationWeek India. He is a respected speaker & host at conferences worldwide. In his current role at Hannover Milano Fairs India, Brian serves as project head for CeBIT Global Conferences, the world's largest ICT fair that will debut in India this November, in Bangalore. By X Events Hospitality (www.x-events.in) 32 Hotel Digital Security Seminar & Webinar, Sept 19, 2014
  • 33. Presented by In association with Supported by Hotel Digital Security Seminar & Webinar, Sept 19, 2014 33 Five expert speakers 1. Latest threats in digital security (Worms, attacks, viruses, flaws) - Santosh Satam, CEO, SecurBay Services. 2. The immediate action needed to tighten up (Priority list, cost, internal policies) - Ambarish Deshpande, MD - India & SAARC, Blue Coat 3. Information loss prevention (Principles & practices) - Geet Lulla, VP - India & ME, Seclore 4. How to build a business case & get the management's attention - Dhananjay Rokde, CISO, Cox & Kings Group. 5. Global cyber security outlook - A. K. Viswanathan, Senior Director - Enterprise Risk Services, Deloitte India. By X Events Hospitality (www.x-events.in) The seminar schedule
  • 34. Presented by In association with Supported by Our sponsors & supporters By X Events Hospitality Hotel Digital Security Seminar & Webinar, Sept 19, 2014 (www.x-events.in) 34 Thank You
  • 35. In association with Presented by Supported by HOTEL DIGITAL SECURITY SEMINAR SEPT 19, 2014 www.x-events.in