Partner Details

Seclore’s Data-Centric Security Solution enables organizations to remotely enforce and audit who can view, edit, copy, screen grab, and re-distribute files.  These granular, persistent usage controls stay with the document wherever it travels, both within and outside of the organization’s borders.  The document owner can also remotely modify and revoke access to files after distribution. 

Recipients can access protected documents either using an agent or agentless mode, making it very easy to adopt and extend the power of Seclore FileSecure beyond the perimeter of the organization.  The solution is device and transmission agnostic, including support for both iOS and Android mobile devices. 

Connectors for Mail/Messaging, ECM, ERP, DLP and other systems makes it easy to automatically protect emails/attachments, documents being downloaded from systems, and sensitive information that is discovered by DLP offerings.  A robust SDK and APIs make it very easy to add data-centric security to any corporate system or technology. 

A complete log of the document flow and its usage is maintained centrally in line with the recommendations of ISO 27001 or SOX 404.   This data-centric audit trail enables organizations to simplify governance, audits, and compliance reporting.  With nearly 4 million users across 400 companies in 22 countries, Seclore is helping organizations achieve their data security, governance, and compliance objectives.


 Sponsored Events

Date Title
Mar 10, 2020 Webinar

The Perils of Today’s Approach on Access Governance: Start Protecting Data at Source

Protecting sensitive, valuable data is a must for every organization. Ever-increasing cyber-attacks and ever-tightening regulations mandate businesses to take action. Unfortunately, the common approaches of IGA (Identity Governance and Administration) that focus on managing static entitlements for systems and applications fall short in really securing the data at risk. They fail in managing data in motion. They are static. They don’t manage the usage of data well. Not to speak of all the challenges in role management projects and around regular access reviews.

May 05 ‑ May 08, 2015 Congress

European Identity & Cloud Conference 2015

European Identity & Cloud Conference 2015 is the place where identity management, cloud, and information security thought leaders and experts get together to discuss and shape the future of secure, privacy-aware agile, business- and innovation-driven IT.

 Reports

Date Title Price
Jun 18, 2020

Market Compass: Enterprise Information Protection - 80217

The KuppingerCole Market Compass provides an overview of the product or service offerings in a certain market segment.  This Market Compass covers Enterprise Information Protection…

free
Apr 30, 2015

Executive View: Seclore FileSecure - 71295

Seclore with its FileSecure product provides an offering in the emerging market for Secure Information Sharing. Seclore FileSecure allows securely sharing and tracking documents within and…

€190.00

 Videos

Date Language Title
Mar 11, 2020

The Perils of Today’s Approach on Access Governance: Start Protecting Data at Source

Protecting sensitive, valuable data is a must for every organization. Ever-increasing cyber-attacks and ever-tightening regulations mandate businesses to take action. Unfortunately, the common approaches of IGA (Identity Governance and Administration) that focus on managing static entitlements fo...


KuppingerCole PLUS

Get access to the whole body of KC PLUS research including Leadership Compass documents for only €800 a year

KuppingerCole Select

Register now for KuppingerCole Select and get your free 30-day access to a great selection of KuppingerCole research materials and to live trainings.

Blog

Blog

Informatica is Moving Data Management to the Cloud

Informatica is Moving Data Management to the Cloud
Martin Kuppinger

Introducing Intelligent Data Management Cloud (IDMC) as a Comprehensive, Cloud-Native, and Cloud-First Approach to Data Management Data is the new gold, the new oil, or whatever. In the cloud, you only own the data, but not the applications, systems, or networks anymore. Data is essential for Digital Transformation. There is so much data that is sprawling that it is hard to keep control of it. And, within the SaaS and PaaS tenants, data is what belongs to the tenant. Many organizations fail in [...]

Latest Insights

Hot Topics


Become a Client

Learn more about becoming a Client

Contact Us

Call Us

+49 211 2370770
Mo - Fr 8:00 - 17:00