Contact us for More Information / Demo

Blog

Why Your Export Compliance Program is Incomplete Without Information-Centric Security – Part II

on August 21, 2014 Uncategorized with 0 comments
Shield Your Business

Click here for a short white paper on how the Wikileaks saga would never have occurred if the DoD used IRM, and how the technology can help you comply with US export laws. This is the second of a multi-part series of posts (click here for part I) where we look at one of the […]

Read more

Why Your Export Compliance Program is Incomplete Without Information-Centric Security – Part I

on August 7, 2014 Uncategorized with 0 comments

Click here for a short white paper on how IRM could have prevented the Wikileaks saga, and how it can help you comply with US export laws. This is the first post of a multi-part series where we look at one of the most neglected areas of export compliance – securing technical data and documentation. […]

Read more

European Central Bank victim of an attempt of cyber extortion.

on August 1, 2014 Uncategorized with 0 comments

Hackers steal user contact information and other data from a database of the European Central Bank website in an attempt of extortion. Financial institutions are under attack, the number of cyber attacks against banking industry is increasing constantly, last malicious campaign discovered in order of time is the Operation Emmental. A few days ago, bad actors […]

Read more

Afcons Infrastructure Construction Company Endorse Seclore FileSecure.

on July 8, 2014 Uncategorized with 0 comments

In this exclusive interview Sandeep Desai, CIO, Afcons shares his experience of using the Seclore FileSecure. Afcons is a part of Shapoorji Pallonji Group, 3rd largest construction group in India. Afcons feels confident with Seclore FileSecure. Document security is crucial in any industry. The need is, perhaps, slightly more acute in construction industry for reasons […]

Read more

Solving the Export Administration Regulation Challenge – Part II

on June 30, 2014 Uncategorized with 0 comments

Last week we talked about the challenges associated with meeting the Export Administration Regulation requirements for securing all of the documentation related to a military-product that is being exported. So what doesn’t work for securing the documentation?  Relying on regular encryption will not work, because once the files are decrypted by the recipient, they are […]

Read more

Solving the Export Administration Regulation Challenge – Part I

on June 20, 2014 Uncategorized with 0 comments

One of my favorite things is when technology can be directly applied to solve a pressing business problem. A great example is how Information Rights Management (IRM) can help manufacturing organizations address the Export Administration Regulations. Let’s start by identifying the business challenge and then highlight why IRM is an ideal solution. If you are […]

Read more

How to Secure Any File-Sharing Service

on June 6, 2014 Uncategorized and Tags: , , with 0 comments

We’ve been participating in many security events around the world over the past eight weeks and there was one challenge that was consistently mentioned by Security & Risk Pros: How can I give our employees the flexibility to utilize any online file-sharing service without risking the security of the information? And it is no wonder […]

Read more

The Cloud Computing Era: How Secure is your data in the cloud

on June 3, 2014 Uncategorized with 0 comments

Zubin Dalal, Head Business Solution, Seclore

Read more

DLP + IRM: The New Super Power Part 2

on April 24, 2014 Uncategorized and Tags: , , , , with 0 comments

DLP and IRM are highly complementary solutions. One does what the other does not, and one completes the other or fills the gaps in the capabilities of the other. Together, they do what they do best, even better.In general, DLP is useful for discovering where confidential data is stored and preventing deliberate leakage (which is […]

Read more

DLP + IRM: The New Super Power Part 1

on April 16, 2014 Uncategorized and Tags: , , , with 0 comments

“The need to place and enforce DRM policies on information (e.g. can I print this? copy it to USB? email it?) must expand to include contextual awareness of the content being protected – the realm of DLP. These are not separate problems and should be integrated, ideally from a single solution.” – Neil MacDonald, VP […]

Read more