Protecting the Last Mile with End-to-End, Data-Centric Security

Reading Time: 2 minutes

As the amount of sensitive information being shared internally across business units and with external third parties grows exponentially, organizations are looking for solutions that will protect documents, wherever they travel, and even while they are being utilized.

Traditional security solutions, including email and file encryption are not enough to protect files.  Once a recipient receives the file, it must be decrypted in order for individuals to do their work, meaning the sender has lost all control.  And that ‘last mile’ is where many security breaches occur.

The other challenge with traditional security solutions is that the organization cannot revoke access to files that have been utilized by authorized recipients.  For example, when an employee leaves, how do you revoke access to files they may have copied to personal devices?  When a vendor relationship ends, how do you remove their access to sensitive intellectual property?

Then let’s throw in the challenge of tracking the use of sensitive information, even when it is shared externally. Regulations such as GDPR, ITAR/EAR, NIST, and other regional cybersecurity legislation all require both control over the use of information and the ability to prove those controls through audit reporting.

Seclore and Boldon James have joined forces to lead the drive in enabling organizations to first identify and classify their sensitive documents and then persistently control and track the use of those documents wherever they travel, including while they are being worked upon. The ability to seamlessly and automatically classify, protect, and track documents, with minimal deployment effort, using best-of-breed technologies from two global market leaders, gives organizations what they need to fully control and audit the use of their sensitive information wherever it travels.

The integration of Seclore’s Rights Management and Boldon James’s Classification removes what has been one of the stickiest barriers for protecting information end-to-end: the complexities of user adoption.  Now users simply select a Boldon James classification label when they create or share documents and other types of files, and Seclore’s persistent protection automatically attaches based on policy rules that the organization has predetermined according to their security requirements.

As well, through a robust set of connectors, organizations can easily integrate this powerful data-centric security solution with existing ERP, ECM, DLP, EFSS, CASB and email systems so that as documents are downloaded, discovered, and shared, persistent usage controls can be automatically added.

This blog was written by Vishal Gupta, CEO, Seclore. To find out more about Boldon James’ integration with Seclore, click here.