Hi [[ session.user.profile.firstName ]]
Sort by:
    • What’s New in Enterprise Rights Management
      What’s New in Enterprise Rights Management Seclore Recorded: Sep 16 2016 10:45 pm UTC 3 mins
    • Seclore’s Enterprise Digital Rights Management solution enables organizations to control the usage of files wherever they go, both within and outside of organizations’ boundaries. The ability to remotely enforce and audit who can do what with a file (view, edit, copy, screen capture, print, run macros), from which device, and when empowers organizations to embrace BYOD, Cloud services, Enterprise File Synch and Share (EFSS) and external collaboration with confidence.
      Featuring dozens of pre-built connectors for leading enterprise applications (EFSS, DLP, ECM, ERP, and eMail), Seclore automates the protection of documents as they are downloaded, discovered, and shared to ensure rapid adoption. Seclore was recently recognized by Frost & Sullivan with a Growth Excellence award, by Deloitte as one of the ‘50 Fastest Growing Technology Companies,’ and by Gartner as a ‘Cool Vendor,’ due to innovations in browser-based access to protected documents. With over 4 million users across 420 companies in 22 countries, Seclore is helping organizations achieve their data security, governance, and compliance objectives.

      Read more >
    • Neu: Datenklassifizierung Mit Rights Management Integriert
      Neu: Datenklassifizierung Mit Rights Management Integriert Albert Steffens, Director, DACH, Boldon James Fredy Lustenberger, Director, DACH, Seclore GmbH Recorded: Nov 29 2018 4:00 pm UTC 47 mins
    • Sicherheit von Computernetzwerken, Business Apps, Mobil- und Endgeräten ist - trotz rasch und erheblich steigenden Investitionen – kaum zu erreichen und schwer unter Kontrolle zu bringen. Risiken unbefugter Datenzugriffe, Datenpannen und Insider-Attacken bleiben bestehen.

      Um diese Risiken und Lücken ganzheitlich und nachhaltig zu eliminieren, ist eine zusätzliche Sicherheitsstufe für vertrauliche und geschäftskritische Informationen und Dokumente erforderlich. Die Lösung ist eine «DataCentric Security Plattform», die unter anderem Daten-Klassifizierung und Rights Management miteinander verbindet und integriert. Dabei behält der Urheber und Autor immer die Kontrolle und bestimmt mit welchen Berechtigungen Wer, Was, Wo und Wie lange ausführen kann. Der Ersteller eines Dokumentes kann jederzeit Berechtigungen anpassen, beziehungsweise ändern oder widerrufen, selbst nachdem ein Dokument oder eine Information bereits versendet oder bearbeitet wurde.

      Das kongeniale Zusammenspiel von Seclore mit Boldon James gehört zur neusten Generation der Daten- und Informationssicherheit und revolutioniert Daten-Klassifizierung und Daten-Sicherheit in einmaliger Art und Weise. Schutz von bereits getätigten Investitionen, Automatisierung, intelligente Nutzung von vorhanden Informationen sowie Sicherheitsstrukturen und Benutzerfreundlichkeit sind nur einige der Vorteile.

      Seclore und Boldon James sind die globalen Marktführer für Rights Management und Datenklassifizierung. Durch die Integration beider Lösungen erhalten Organisationen das bestmögliche Ergebnis. Dabei ergibt sich eine Vielzahl von weiteren Vorteilen, Synergien und Nutzen für Unternehmen und Anwender.

      Nutzen Sie diese einmalige Gelegenheit und erleben Sie selbst in einer «Live-Session» mit Live-Demo, wie schnell Sie Ihre Daten-Sicherheitslücken mit Seclore und Boldon James gemeinsam schließen können!

      Wir freuen uns auf Ihre Teilnahme!

      Offered in German

      Read more >
    • Securing Information: How To Mitigate with a Data-Centric Security Strategy
      Securing Information: How To Mitigate with a Data-Centric Security Strategy Doug Cahill, Analyst at Enterprise Strategy Group (ESG), Lynne Courts, VP of Marketing at Seclore Recorded: Nov 2 2016 3:00 pm UTC 61 mins
    • Organizations collaborating with third-party entities, where employees are sharing files with individuals outside of the organization, are facing security risks at unprecedented scale. These dynamics correlate to the need for security controls such as Enterprise Digital Rights Management (EDRM) to protect sensitive information when it travels outside of the corporate firewall.
      In this presentation, analyst Doug Cahill from Enterprise Strategy Group (ESG) will discuss the findings from a recent study where over 200 IT and Security Professionals shared their views on the challenges with external collaboration, and his recommendations for best practices. Lynne Courts, VP of Marketing from Seclore will share how to build a comprehensive data-centric security strategy with such technologies as next-generation EDRM.

      Join us and discover:

      - The most vulnerable information – what types of files are regularly shared externally that pose the greatest risks
      - Industry and analyst views on where shared sensitive data needs protecting, and what defences are most effective
      - How to best design a comprehensive data-centric security strategy for shared information that will protect data, meet compliance regulations and reduce your risks

      Read more >
    • How to Build a Better Castle from the Inside Out
      How to Build a Better Castle from the Inside Out Lynne Courts, VP of Marketing, Seclore & Martin Sugden, CEO, Boldon James Recorded: Dec 15 2017 11:40 am UTC 61 mins
    • You’ve heard it over and over again how securing the network, applications and devices is just not enough. Focusing only on stopping break-ins to your network leaves your data vulnerable when an intruder finds a back door way in. But what happens when your data leaves the front gate to conduct business with contractors, suppliers, partners, etc.

      In this one hour webcast, you’ll learn how to build a strong Data-Centric Security strategy by classifying sensitive information and automatically applying security controls to the data whether it stays inside or outside your castle. Join Seclore and Boldon James to learn how to:

      Apply visual and metadata classification labels to clearly identify sensitive data
      Automatically add persistent protection to sensitive data based on policy rules
      Control access and usage to sensitive data wherever it travels
      Stay compliant with real time audits of file access and usage

      Read more >
    • 2017 Predictions on Data Security Trends for the Banking Industry
      2017 Predictions on Data Security Trends for the Banking Industry Lynne Courts VP of Global Marketing, Seclore Recorded: Feb 22 2017 5:00 pm UTC 37 mins
    • 2016 was a wild ride, with cybersecurity and warfare dominating the headlines. The new EU General Data Protection Act (GDPR) impacts many financial services organizations globally and may be an indication of what’s ahead for North America.

      On top of that, we have the growing use of innovative, and often unsanctioned, collaboration technologies such as Enterprise File Sharing Services, further accelerating the flow of information outside of the organization’s perimeter.

      It is safe to say that ensuring the security of information is an even higher concern than ever before and that the current Information Security infrastructure isn’t making the grade.

      Join us for this webcast in the field of data-centric security will discuss the top seven security trends that will impact banks and financial institutions in 2017.

      Join this presentation to learn the top security trends that will impact banks and financial institutions in 2017, including:

      · Impacts of anticipated cybersecurity legislation and new global regulations on protecting data.

      · What’s missing the Information Security arsenal?

      · How to embrace collaboration and other technology innovations with less risk.

      · Is the shift to data-centric security the answer?

      Read more >