Seclore Born to Protect

Date:   Thursday , October 01, 2009

It is a well-known fact that enterprises today spend millions to protect their confidential information. Many times the information is shared with business partners with nothing except for a confidentiality agreement and an insurance policy to protect the information. Always companies lie in the fear of data leak in transit or at rest at the outsourcing company’s end. A recent several events of data leakage from BPO operations only exemplifies the fact.

However, Seclore Technologies (www.seclore.com), founded in 2005, a Mumbai based Enterprise Information Rights Management (IRM) company has a unique offering to address the above issue for corporations. This IIT Bombay incubated company provides risk mitigation from information leakages whilst enhancing collaboration and Data Security. “ Seclore’s Information Security Management Solutions provide persistent end-to-end Information Protection for secure collaboration and outsourcing ” says Vishal Gupta, CEO who is also an Alumni of IIT Bombay.

Vishal and his colleagues Rahul Kopikar ( IIT Bombay ) and Abhijit Tannu ( IIT Kharagpur ) today havea great sense of satisfaction being IITians. They admits that IIT education through the environment and curriculum had an everlasting impact in their personal and professional life.

Vishal, who graduated from IIT Bombay in the year 2000, believes that when universities are struggling to keep pace with industry in changing the curriculum IITs are keeping pace with industry requirements. “More than that IIT education gives the confidence to try out the things differently,” says Vishal.

“Today Seclore’s products i.e. Seclore FileSecure and Seclore InfoSource help mitigate the risk arising out of information breaches and regulatory non-compliance while making sure that the existing way of collaboration does not have to change. Seclore makes its systems easy to adopt by being non intrusive during deployment and usage and with a pay-as-you-use model of pricing. That is our differentiating factor,” explains the CEO.

Normally, sensitive documents can reside on local Desktops, Laptops or centrally on file servers. However, the company claims that its rights management solution, Seclore FileSecure, facilitates end-to-end document protection. Once protected, the documents can be distributed by any means like CD’s, emails, Pen Drives, Messengers, FTP, shared folders etc; the persistent file security will provide file protection wherever the file goes. Says Vishal, “The protection is provided by the document owners or by administrator, and the document rights are managed centrally.”

Seclore InfoSource on the other hand allows information shared with outsourcing partners to be protected in transit, in storage and in use. Normally we have the option to protect data in transit to and from the outsourcing partner by using an encryption technology to secure the information and provide decryption keys to the outsourcing partner. “However, this technique protects data only in transit and protection of data at rest or in use at the service provider’s end is left to other methods” i.e. at the end of the legitimate use, an employee of the service provider can send copies of the information to other recipients unless there are other means to control that activity. “Hence instead of leaving the security of critical information to the security policies of business partners and legal agreements, enterprises can use Seclore InfoSource to protect their information when it travels outside. This is combined with control of the usage of the information through its lifecycle and also its ultimate destruction on an automated basis or in case business relationships change,” says Vishal.

Today Seclore has companies like ICICI Bank, HDFC Bank, Kotak Bank, Reliance Capital, Bajaj Allianz and L&T using its technology to protect critical information. With a key eye on spreading global presence, the company is all set to become the leading provider of information security solutions in the area of information usage control, information rights management and secure outsourcing.