SlideShare ist ein Scribd-Unternehmen logo
1 von 40
Seclore Filesecure FileNet Connector Enhancing security of  IBM FILENET
Contents ,[object Object]
The Solution ..
What is Seclore FileSecure
Seclore FileSecure connector for IBM FileNet
Policy definition
Assigning policies to FileNet folders
Uploading documents
Downloading a file from FileNet folder
Accessing a protected file
Audit trails
About Seclore,[object Object]
Contents ,[object Object]
The Solution ..
What is Seclore FileSecure
Seclore FileSecure connector for IBM FileNet
Policy definition
Assigning policies to FileNet folders
Uploading documents
Downloading a file from FileNet folder
Accessing a protected file
Audit trails
About Seclore,[object Object]
SecloreFileSecure ,[object Object]
Persistent: Implemented on information and all its copies wherever it is transmitted or stored
Dynamic: Policies can be changed after distributing information without having access to or redistributing the information
Policies can be attached to information on
Creation
Placement in a certain location e.g. shared folder
Attachment to email
Uploading to a document management / ECM system
…,[object Object]
The Solution ..
What is Seclore FileSecure
Seclore FileSecure connector for IBM FileNet
Policy definition
Assigning policies to FileNet folders
Uploading documents
Downloading a file from FileNet folder
Accessing a protected file

Weitere ähnliche Inhalte

Was ist angesagt?

Risk-driven and Business-outcome-focused Enterprise Security Architecture Fra...
Risk-driven and Business-outcome-focused Enterprise Security Architecture Fra...Risk-driven and Business-outcome-focused Enterprise Security Architecture Fra...
Risk-driven and Business-outcome-focused Enterprise Security Architecture Fra...
Craig Martin
 
Importance Of A Security Policy
Importance Of A Security PolicyImportance Of A Security Policy
Importance Of A Security Policy
charlesgarrett
 

Was ist angesagt? (19)

ISO 27001 - information security user awareness training presentation - Part 1
ISO 27001 - information security user awareness training presentation - Part 1ISO 27001 - information security user awareness training presentation - Part 1
ISO 27001 - information security user awareness training presentation - Part 1
 
ISO 27001 Awareness IGN Mantra 2nd Day, 2nd Session.
ISO 27001 Awareness IGN Mantra 2nd Day, 2nd Session.ISO 27001 Awareness IGN Mantra 2nd Day, 2nd Session.
ISO 27001 Awareness IGN Mantra 2nd Day, 2nd Session.
 
Big data contains valuable information - Protect It!
Big data contains valuable information - Protect It!Big data contains valuable information - Protect It!
Big data contains valuable information - Protect It!
 
IT compliance
IT complianceIT compliance
IT compliance
 
Fasoo Secure Document for IBM FileNet
Fasoo Secure Document for IBM FileNetFasoo Secure Document for IBM FileNet
Fasoo Secure Document for IBM FileNet
 
BYOD: Bring Your Own Device Implementation and Security Issues
BYOD: Bring Your Own Device Implementation and Security IssuesBYOD: Bring Your Own Device Implementation and Security Issues
BYOD: Bring Your Own Device Implementation and Security Issues
 
Dstca
DstcaDstca
Dstca
 
How Does IBM Deliver Cloud Security Paper
How Does IBM Deliver Cloud Security PaperHow Does IBM Deliver Cloud Security Paper
How Does IBM Deliver Cloud Security Paper
 
Microsoft Rights Management
Microsoft Rights ManagementMicrosoft Rights Management
Microsoft Rights Management
 
50 Shapes of Network & Information Security
50 Shapes of Network & Information Security50 Shapes of Network & Information Security
50 Shapes of Network & Information Security
 
20100224 Presentation at RGIT Mumbai - Information Security Awareness
20100224 Presentation at RGIT Mumbai - Information Security Awareness20100224 Presentation at RGIT Mumbai - Information Security Awareness
20100224 Presentation at RGIT Mumbai - Information Security Awareness
 
Information security: importance of having defined policy & process
Information security: importance of having defined policy & processInformation security: importance of having defined policy & process
Information security: importance of having defined policy & process
 
Ibm ofa ottawa_ how_secure_is_your_data_eric_offenberg
Ibm ofa ottawa_ how_secure_is_your_data_eric_offenbergIbm ofa ottawa_ how_secure_is_your_data_eric_offenberg
Ibm ofa ottawa_ how_secure_is_your_data_eric_offenberg
 
Sw keynote
Sw keynoteSw keynote
Sw keynote
 
Information Security : Is it an Art or a Science
Information Security : Is it an Art or a ScienceInformation Security : Is it an Art or a Science
Information Security : Is it an Art or a Science
 
Risk-driven and Business-outcome-focused Enterprise Security Architecture Fra...
Risk-driven and Business-outcome-focused Enterprise Security Architecture Fra...Risk-driven and Business-outcome-focused Enterprise Security Architecture Fra...
Risk-driven and Business-outcome-focused Enterprise Security Architecture Fra...
 
Information Security Challenges & Opportunities
Information Security Challenges & OpportunitiesInformation Security Challenges & Opportunities
Information Security Challenges & Opportunities
 
BYOD
BYODBYOD
BYOD
 
Importance Of A Security Policy
Importance Of A Security PolicyImportance Of A Security Policy
Importance Of A Security Policy
 

Andere mochten auch

цветущий город 2011
цветущий город 2011цветущий город 2011
цветущий город 2011
tinold
 
งานนำเสนอบทที่ 4
งานนำเสนอบทที่ 4งานนำเสนอบทที่ 4
งานนำเสนอบทที่ 4
sawitri555
 
婚姻的基本概念0
婚姻的基本概念0婚姻的基本概念0
婚姻的基本概念0
輝 哲
 
Fyltex Months Part 1
Fyltex Months Part 1Fyltex Months Part 1
Fyltex Months Part 1
MarcelaLugo
 
Wem pm info session oct 2011 mini version
Wem pm info session oct 2011 mini versionWem pm info session oct 2011 mini version
Wem pm info session oct 2011 mini version
mpoworoznik
 
Rekreasi ke sangkan resort aqua park
Rekreasi ke sangkan  resort aqua parkRekreasi ke sangkan  resort aqua park
Rekreasi ke sangkan resort aqua park
Rietz Wiguna
 
Grade 8 Parent Night - 2013
Grade 8 Parent Night - 2013Grade 8 Parent Night - 2013
Grade 8 Parent Night - 2013
derekoei
 
第三週 危險情人
第三週 危險情人第三週 危險情人
第三週 危險情人
輝 哲
 

Andere mochten auch (20)

IBM FileNet ECM Roadmap
IBM FileNet ECM RoadmapIBM FileNet ECM Roadmap
IBM FileNet ECM Roadmap
 
цветущий город 2011
цветущий город 2011цветущий город 2011
цветущий город 2011
 
Data Visualisation Techniques and Polish Workshop - Visualizing Marathon
Data Visualisation Techniques and Polish Workshop - Visualizing Marathon Data Visualisation Techniques and Polish Workshop - Visualizing Marathon
Data Visualisation Techniques and Polish Workshop - Visualizing Marathon
 
Women's rights in jordan
Women's rights in jordanWomen's rights in jordan
Women's rights in jordan
 
งานนำเสนอบทที่ 4
งานนำเสนอบทที่ 4งานนำเสนอบทที่ 4
งานนำเสนอบทที่ 4
 
Rm 023 2015-minedu
Rm 023 2015-mineduRm 023 2015-minedu
Rm 023 2015-minedu
 
婚姻的基本概念0
婚姻的基本概念0婚姻的基本概念0
婚姻的基本概念0
 
35 Years of Journalism at City University London
35 Years of Journalism at City University London35 Years of Journalism at City University London
35 Years of Journalism at City University London
 
Mathematics
MathematicsMathematics
Mathematics
 
chings revolution
chings revolutionchings revolution
chings revolution
 
Lessons Learned: Migrating Tests to Selenium v2
Lessons Learned: Migrating Tests to Selenium v2Lessons Learned: Migrating Tests to Selenium v2
Lessons Learned: Migrating Tests to Selenium v2
 
Fyltex Months Part 1
Fyltex Months Part 1Fyltex Months Part 1
Fyltex Months Part 1
 
Wem pm info session oct 2011 mini version
Wem pm info session oct 2011 mini versionWem pm info session oct 2011 mini version
Wem pm info session oct 2011 mini version
 
Enlaces
EnlacesEnlaces
Enlaces
 
Rekreasi ke sangkan resort aqua park
Rekreasi ke sangkan  resort aqua parkRekreasi ke sangkan  resort aqua park
Rekreasi ke sangkan resort aqua park
 
UK Government 2
UK Government 2UK Government 2
UK Government 2
 
Grade 8 Parent Night - 2013
Grade 8 Parent Night - 2013Grade 8 Parent Night - 2013
Grade 8 Parent Night - 2013
 
第三週 危險情人
第三週 危險情人第三週 危險情人
第三週 危險情人
 
Project ν. λογοτεχνία
Project ν. λογοτεχνίαProject ν. λογοτεχνία
Project ν. λογοτεχνία
 
Lead for trainers ls test2
Lead for trainers  ls test2Lead for trainers  ls test2
Lead for trainers ls test2
 

Ähnlich wie Seclore FileSecure IBM Filenet Walkthrough

Irmintroductionforautocad 110415002444-phpapp02
Irmintroductionforautocad 110415002444-phpapp02Irmintroductionforautocad 110415002444-phpapp02
Irmintroductionforautocad 110415002444-phpapp02
gilberteric
 
Automation alley day in the cloud presentation - formatted
Automation alley   day in the cloud presentation - formattedAutomation alley   day in the cloud presentation - formatted
Automation alley day in the cloud presentation - formatted
Matthew Moldvan
 
ISE 510 Final Project Scenario Background Limetree Inc. is a resea.docx
ISE 510 Final Project Scenario Background Limetree Inc. is a resea.docxISE 510 Final Project Scenario Background Limetree Inc. is a resea.docx
ISE 510 Final Project Scenario Background Limetree Inc. is a resea.docx
christiandean12115
 
Understanding Database Encryption & Protecting Against the Insider Threat wit...
Understanding Database Encryption & Protecting Against the Insider Threat wit...Understanding Database Encryption & Protecting Against the Insider Threat wit...
Understanding Database Encryption & Protecting Against the Insider Threat wit...
MongoDB
 
ISSC340_Presentation_Ronald_Averion.pptxNAME Ronald Averi.docx
ISSC340_Presentation_Ronald_Averion.pptxNAME Ronald Averi.docxISSC340_Presentation_Ronald_Averion.pptxNAME Ronald Averi.docx
ISSC340_Presentation_Ronald_Averion.pptxNAME Ronald Averi.docx
christiandean12115
 
File Security in Microsoft SharePoint and OneDrive
File Security in Microsoft SharePoint and OneDriveFile Security in Microsoft SharePoint and OneDrive
File Security in Microsoft SharePoint and OneDrive
David J Rosenthal
 
Risk Mitigation Plan Based On Inputs Provided
Risk Mitigation Plan Based On Inputs ProvidedRisk Mitigation Plan Based On Inputs Provided
Risk Mitigation Plan Based On Inputs Provided
Tiffany Graham
 

Ähnlich wie Seclore FileSecure IBM Filenet Walkthrough (20)

Seclore FileSecure HotFolder Walkthrough
Seclore FileSecure HotFolder WalkthroughSeclore FileSecure HotFolder Walkthrough
Seclore FileSecure HotFolder Walkthrough
 
Irmintroductionforautocad 110415002444-phpapp02
Irmintroductionforautocad 110415002444-phpapp02Irmintroductionforautocad 110415002444-phpapp02
Irmintroductionforautocad 110415002444-phpapp02
 
Automation alley day in the cloud presentation - formatted
Automation alley   day in the cloud presentation - formattedAutomation alley   day in the cloud presentation - formatted
Automation alley day in the cloud presentation - formatted
 
IBM Relay 2015: Securing the Future
IBM Relay 2015: Securing the Future IBM Relay 2015: Securing the Future
IBM Relay 2015: Securing the Future
 
Information protection and compliance
Information protection and complianceInformation protection and compliance
Information protection and compliance
 
ISE 510 Final Project Scenario Background Limetree Inc. is a resea.docx
ISE 510 Final Project Scenario Background Limetree Inc. is a resea.docxISE 510 Final Project Scenario Background Limetree Inc. is a resea.docx
ISE 510 Final Project Scenario Background Limetree Inc. is a resea.docx
 
System Approach for Single Keyword Search for Encrypted Data Files Guarantees...
System Approach for Single Keyword Search for Encrypted Data Files Guarantees...System Approach for Single Keyword Search for Encrypted Data Files Guarantees...
System Approach for Single Keyword Search for Encrypted Data Files Guarantees...
 
CIO Forum June Microsoft.pdf
CIO Forum June Microsoft.pdfCIO Forum June Microsoft.pdf
CIO Forum June Microsoft.pdf
 
Understanding Database Encryption & Protecting Against the Insider Threat wit...
Understanding Database Encryption & Protecting Against the Insider Threat wit...Understanding Database Encryption & Protecting Against the Insider Threat wit...
Understanding Database Encryption & Protecting Against the Insider Threat wit...
 
Extending Information Security to Non-Production Environments
Extending Information Security to Non-Production EnvironmentsExtending Information Security to Non-Production Environments
Extending Information Security to Non-Production Environments
 
Irm11g overview
Irm11g overviewIrm11g overview
Irm11g overview
 
Security solutions for a smarter planet
Security solutions for a smarter planetSecurity solutions for a smarter planet
Security solutions for a smarter planet
 
Choosing A Secondary Storage
Choosing A Secondary StorageChoosing A Secondary Storage
Choosing A Secondary Storage
 
Seclore File Secure Introduction Brief
Seclore File Secure Introduction   BriefSeclore File Secure Introduction   Brief
Seclore File Secure Introduction Brief
 
ISSC340_Presentation_Ronald_Averion.pptxNAME Ronald Averi.docx
ISSC340_Presentation_Ronald_Averion.pptxNAME Ronald Averi.docxISSC340_Presentation_Ronald_Averion.pptxNAME Ronald Averi.docx
ISSC340_Presentation_Ronald_Averion.pptxNAME Ronald Averi.docx
 
File Security in Microsoft SharePoint and OneDrive
File Security in Microsoft SharePoint and OneDriveFile Security in Microsoft SharePoint and OneDrive
File Security in Microsoft SharePoint and OneDrive
 
InsiderAttack_p3.ppt
InsiderAttack_p3.pptInsiderAttack_p3.ppt
InsiderAttack_p3.ppt
 
User_Access_IIA-LA_3-9-2016
User_Access_IIA-LA_3-9-2016User_Access_IIA-LA_3-9-2016
User_Access_IIA-LA_3-9-2016
 
Risk Mitigation Plan Based On Inputs Provided
Risk Mitigation Plan Based On Inputs ProvidedRisk Mitigation Plan Based On Inputs Provided
Risk Mitigation Plan Based On Inputs Provided
 
Glasswall - Safety and Integrity Through Trusted Files
Glasswall - Safety and Integrity Through Trusted FilesGlasswall - Safety and Integrity Through Trusted Files
Glasswall - Safety and Integrity Through Trusted Files
 

Kürzlich hochgeladen

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Kürzlich hochgeladen (20)

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 

Seclore FileSecure IBM Filenet Walkthrough