Blog

Jan 8, 2020

Four Questions with the CEO – Episode 5: The Power of Combining DLP and Rights Management

In this vlog, Vishal Gupta, CEO at Seclore discusses the power of combining DLP with Rights Management.

  • The key challenges of using only DLP to protect information
  • What a Rights Management solution is missing by not being connected with DLP
  • How DLP and Rights Management solutions work together
  • The ease of integrating DLP with the Seclore Data-Centric Platform

Jan 6, 2020

Four Questions with the CEO – Episode 4: Protecting Incoming Information – How to… and Why it Matters

In this vlog, Vishal Gupta, CEO at Seclore discusses the importance of protecting incoming sensitive information.

  • Why is it important for organizations to protect incoming information?
  • What are some of the use cases for protecting incoming information?
  • How can organizations easily protect incoming information?
  • Is it easy for employees to use the protected information?

Sep 16, 2019

Four Questions with the CEO – Episode 3: Four Must-Have’s for Data-Centric Security

In this vlog, Vishal Gupta, CEO at Seclore, shares enlightenment on the Four Must-Have’s for Data-Centric Security.

  • No agents: Must be browser-based for recipients receiving protected files
  • Automated protection
  • Policy and Identity Federation
  • Tracking usage of documents

Sep 11, 2019

Four Questions with the CEO – Episode 2: Why SDKs are Crucial to the Success of Digital Rights Management

In this vlog, Vishal Gupta, CEO at Seclore, shares enlightenment on why SDKs are crucial to the success of digital rights management.

  • Data-Centric Security, and more specifically, DRM is most successful when added to other systems because of the ability to automate protection and ensure security gaps are closed
  • Combinations are most fruitful for automated protection
  • What Seclore’s SDK Suite includes
  • Other parts of the Seclore SDK that are of importance

Sep 5, 2019

Four Questions with the CEO – Episode 1: Why Basic Email Encryption is no Longer Enough

In this vlog, Vishal Gupta, CEO at Seclore, shares enlightenment on next-generation Email Encryption.

  • What’s lacking in basic email encryption
  • Additional data protection capabilities provided by next-generation email encryption
  • How next-generation email encryption capabilities help organizations address GDPR, NY and CA Data Privacy Laws, PCI-DSS, India Data Privacy Act, and other regulatory compliance

Aug 23, 2018

Why Basic File Encryption is no Longer Enough

Many organizations have implemented basic file encryption to protect their sensitive documents. Basic file encryption will protect information when it is stored and transmitted.  However, as soon as the file is decrypted by the recipient – your sensitive document can now be easily shared with other unauthorized users.  The recipient can easily cut/paste content [...]

Apr 20, 2018

Protecting the Last Mile with End-to-End, Data-Centric Security

As the amount of sensitive information being shared internally across business units and with external third parties grows exponentially, organizations are looking for solutions that will protect documents, wherever they travel, and even while they are being utilized. Traditional security solutions, including email and file encryption are not enough to protect files. Once a recipient [...]

Apr 18, 2018

Why Email Security Is More Important Than Ever Before

Who doesn’t enjoy a little bit of salacious information? Everyday the news outlets are bending our ear. We are human by all means, but leaked emails with sensitive information are costing jobs, influencing elections, impacting corporations financially and who knows what’s next. For example, Sony’s leaked emails cost producer Amy Pascal her job. Democratic National [...]

Mar 16, 2018

Is Data-Centric Security the Answer to NIST Compliance?

Last year there was a record 1,579 data breaches – that’s a 44.7 percent increase in breaches compared to 2016. In light of the severity and frequency of these breaches, companies are taking a deeper look at their cybersecurity protocols. However, there is another reason organizations are reevaluating their security efforts – government regulations. NIST [...]

Feb 28, 2018

Data Classification + DLP + EDRM – The Complete Data Security Story

Data Classification + DLP + EDRM - The Complete Data Security Story Classification…DLP…Encryption…WHAT'S NEXT? Billions of dollars are spent annually on Cyber Security products, yet the threats and breaches continue to rise at unprecedented rates. On-going attempts to control the perimeter such as Applications, Devices and Networks - all become futile based upon the "perfect [...]