0% found this document useful (0 votes)
244 views5 pages

Seclore APIs & Sdks

With multiple platforms running multiple applications from multiple vendors, APIs are critical to derive maximum advantage from each technology. Seclore’s scalable and robust APIs allows its technology to be used as a ‘service’ by other applications to be fully leveraged. To know more, visit:https://www.seclore.com/easily-integrate-seclore-with-your-enterprise-apps-and-data-security-solutions

Uploaded by

Julie Smith
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
244 views5 pages

Seclore APIs & Sdks

With multiple platforms running multiple applications from multiple vendors, APIs are critical to derive maximum advantage from each technology. Seclore’s scalable and robust APIs allows its technology to be used as a ‘service’ by other applications to be fully leveraged. To know more, visit:https://www.seclore.com/easily-integrate-seclore-with-your-enterprise-apps-and-data-security-solutions

Uploaded by

Julie Smith
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 5

Seclore SDKs

Extend the Power and Value of your Security Software Offerings and Enterprise
Applications with Data-Centric Security

Overview
To support security software solution providers and organizations who want to add data-centric security to their business
and transactional applications, Seclore has created comprehensive Software Development Kits (SDK). The Seclore SDKs
features a robust collection of APIs and rapid configuration capabilities that reduce the effort required to add persistent,
granular usage controls and tracking to information as it is discovered, downloaded, classified and shared. By adding data-
centric security to an application, information remains under the organization’s control – even when it leaves the application
and moves beyond organizations’ boundaries.
There are two primary SDKs available from Seclore: The Seclore Server SDK and the Seclore Endpoint Auto-Protector
SDK. The Seclore Server SDK is designed to support the integration of Seclore with enterprise applications that run in the
background The Seclore End-Point Auto-Protector SDK, a configurable cross-platform tool, makes it easy to add data-centric
security to solutions that run on end-uses devices.

Types of Applications Supported by the Seclore SDKs

Seclore Endpoint Auto-Protector SDK Seclore Server SDK


• Supports Applications that run on End-Users’ • Supports Applications that run in the Background
Machines (e.g. Endpoint DLP, Data Classification, (e.g. Business & Transactional Apps, Network DLP,
Data Governance) Email DLP, CASB, Content Collaboration Platform
• Runs in User Context (CCP), SIEM Tools, e-Discovery)

• Cross-Platform Endpoint Auto-Protection (Supported • Support for Multi-Tenant Applications


on Windows and Mac) • Available in Java and .Net
• Configurable for Rapid Integration
Key Capabilities

Extending Data Protection Beyond Security Software Solutions and Business Applications
Integrating the Seclore Server SDK with an enterprise application will keep data under the organization’s control – even
when it is shared externally. Seclore can seamlessly take over where the enterprise application’s protection ends – adding
persistent granular usage controls and tracking that stay with the file wherever and however it travels. The Seclore Endpoint
Auto-Protector SDK enables vendors providing DLP, CASB, eDiscovery, and other endpoint-based security solutions to add
rapidly add the capability to automatically protect information as it is detected.

Robust APIs
The Seclore SDKs offer a complete set of RESTful APIs as web services with supporting documentation and sample
code to make service calls from any platform or device. All calls are secured via built-in authentication controls and all
communication happens using secure protocols.

Configurable Endpoint Auto-Protector


Leveraging the configurable Seclore Endpoint Auto-Protector SDK, documents can be automatically protected as they are
discovered and classified. With the combination of technologies, organizations will be able to protect and track information
wherever and however it travels. To streamline deployment, the Seclore Endpoint Auto-Protector SDK comes built-in with the
Seclore Agent, removing the need to ship the SDK separately on the endpoints.

Automated Protection for Service Applications


Through the integration with the Seclore Server SDK, documents can be automatically protected as they are downloaded
from or uploaded through any server application – without any end user intervention. The addition of persistent, granular
usage controls gives organizations the ability to control and track the use of information wherever it travels as well as
streamlined compliance reporting.

Identity Federation
To ensure a seamless experience for the end-user, Seclore provides a robust Identity Federation capability. The result is
that end users can authenticate using the organization’s existing Identity and SSO solutions. Identity Federation is achieved
by integrating with Identity and Access Management (IAM) and SSO systems to provide the same experience for user
authentication. Seclore has readily available connectors for most Identity and SSO solution providers including Microsoft
Active Directory, IBM Tivoli Directory, Domino LDAP, Sun ONE LDAP, Google Authentication, and more.

Content Inspection of Protected Files


Using the Seclore SDKs, business applications, DLP, CASB, Data Classification, CCP and more, can be readily integrated with
Seclore Data-Centric Security to automatically inspect content or leverage the application rules for automated protection.

Policy Federation
Seclore Policy Federation makes it easy to map an application’s access policies to Seclore’s granular usage controls.
Examples of policies that can be federated include users’ permissions on the file, file owner, classification of a file and
watermarking to be displayed on the file. The synchronization of policies between the application and Seclore Data-Centric
Security ensures a streamlined and dynamic extension of file usage permissions.

Dynamic and Automatic Policy Management


A change in file permissions in the security software offering and business application will be automatically applied – in real-
time – on all downloaded protected files for simplified administration.
Remote Control
The file owner can control the usage policies even after a protected file has been shared. All changes in usage permissions
take effect in real time.

Online Editing-as-a-Service
Allows the business application to open and edit Seclore-protected files in a secure browser with a single click. Documents
edited will be saved back to the business application.

Integrated Auditing
All activities performed on protected files – whether inside or outside the enterprise network - are centrally logged. Email
alerts on unauthorized usage attempts (e.g. someone tried to print a protected file) can also be configured. SIEM tools like
Splunk and BI Analytics tools can also be integrated with Seclore to provide centralized auditing and compliance reporting.

Seclore SDK Use Cases


Here is how various business and security software offerings can be extended with data-centric security to better address
security, regulatory compliance and agility challenges:

Solutions Sample Seclore Custom Integration Use Cases

Content Collaboration Platform Use Case – 1:


(CCP)/Content Management Files downloaded or uploaded through CCP/CMS can be automatically protected by
Systems (CMS) + Seclore calling the Seclore SDK. The relevant Rights Management policy will be applied to the
file which ensures efficient flow of information while removing the security risk.

Use Case – 2:
Sensitive data discovered by DLP on Endpoint, Network File Shares or data being
uploaded to the web will be automatically protected by calling the Seclore SDK. The
relevant Rights Management policy is applied to the file so that the file can be freely
shared across and outside enterprise boundary.

Use Case – 3:
Sensitive data discovered by DLP in an email will be automatically protected by
Data Loss Prevention/CASB + Seclore by adding a X-Header in the email. This X-Header will be read by a Seclore
Seclore service to apply the relevant Rights Management policy.

Use Case – 4:
Detect and decrypt protected data to enable DLP to scan content before it exits
enterprise boundaries via email or web traffic. This can be achieved by calling the
Seclore SDK to allow the DLP solution to perform content inspection.

Use Case – 5:
Files downloaded or uploaded through sanctioned or unsanctioned CASB applications
will be automatically protected by calling the Seclore SDK. The relevant Rights
Management policy can be applied to the file so that it can be freely shared across
and outside enterprise boundary.

Data Classification + Seclore Use Case – 6:


Sensitive documents or emails classified by a Data Classification system will
automatically be protected by calling the Seclore SDK. Granular Rights Management
usage controls are automatically applied to the file based on the classification label,
giving the company on-going control over the document usage (cut/paste, print, etc.)
and tracking.
Solutions Sample Seclore Custom Integration Use Cases

Use Case – 7:
Data Classification + Seclore Sensitive emails classified by a Classification system will be automatically protected
(continued) by Seclore by adding a X-Header in the email. This X-Header will be read by a Seclore
service to apply the relevant Rights Management policy.

Use Case – 8:
Reports downloaded or shared as emails will be automatically protected by calling
BI & Analytics Tools + Seclore
the Seclore SDK. The relevant Rights Management policy is applied to the file so that
sensitive reports remain secure while being utilized outside the application.

Use Case – 9:
Auto-generated and manually exported reports will be automatically protected by
Transactional Systems (ERP/ calling the Seclore SDK.
CRM/HRM) + Seclore
Use Case – 10:
Reports sent as email attachments will be automatically protected by Seclore either
by adding a X-Header in the email or by calling the Seclore SDK. This X-Header will be
read by a Seclore service to apply the relevant Rights Management policy.

Use Case – 11:


Enterprise Mobility Management Securely access and utilize protected emails and documents on MDM-enabled
(EMM/MDM) + Seclore devices. Works with most MDM vendors including BlackBerry, IBM MaaS 360,
MobileIron, AirWatch and more.

Key Benefits

Security Software Providers Enterprises

Increase the Competitiveness of Your Security Software Increased Data Security


Offering By automatically adding persistent, granular usage controls
Adding data-centric security to your offering will enable you to your sensitive information as it leaves your enterprise
to seamlessly extend your solution’s security to wherever applications, you will obtain the freedom to securely
your customers’ data travels, enabling you to stand out from collaborate and share information with vendors, partners, and
the crowd and other single-vendor ‘one-size-fits all’ solutions. contractors. As well, you can confidently utilize innovative
technologies including personal mobile devices, content
collaboration platforms and cloud-based solutions.

Easily Add Automated Data-Centric Protection to Your Increased ROI from Your Existing Investments
Security Software Offering The ability to easily add data-centric security to your existing
The configurable, open nature of the Seclore SDKs make it transactional and business systems will enable you to
easy for you to extend the power of your solution to include seamlessly extend your security to wherever your information
persistent, granular usage controls and tracking of sensitive travels during the collaboration process.
content.

Secure External Collaboration - Solve Your Customer’s Last Simplified Administration - Common Policy Management
Mile Challenge Framework
Integrating your offering with Seclore’s data-centric security Seclore’s Policy Federation capability eliminates the need
will empower your customers to better secure information, for separate ‘policy’ management for the same information.
address regulatory compliance, and confidently embrace A common usage control framework helps bring your data
their cloud, BYOD and outsourcing strategies. governance framework under one roof by providing a single
source-of-truth for information access and usage policies.
Security Software Providers Enterprises

Help Your Customers Better Address Regulatory End-to-End Auditing and Regulatory Compliance
Compliance You can now govern the use of your information throughout
The ability to protect and audit data wherever it travels its entire lifecycle – both within and outside your enterprise
enables your customers to automatically track the usage of boundary.
information and better comply with regulatory obligations for
the entire lifecycle of the data - both within and outside their
enterprise network.

Deliver Thought-Leadership Increased Business Agility


Combining the Seclore Data-Centric Security Platform with Leverage and unify your current and future best-of-breed
your offering will offer your customers a way to easily unify DLP, CASB, Data Classification and Rights Management to
leading-edge, best-of-breed technologies to better address automate and optimize your overall data security with the
their security, compliance and agility challenges. Seclore Data-Centric Security Platform

The Power of Data-Centric Security


By combing the power of best-of-breed Discovery systems (DLP, CASB), Data Classification, Data Repository systems
(CCP, CMS, ERP), Identity and Access Management (IAM) Systems, BI and Analytics tools and Rights Management with
existing enterprise systems, organizations will achieve unprecedented control and monitoring of their sensitive information
assets wherever they travel, including while they are being utilized by end-users.. Unified data-centric security will enable
organizations to reduce security breaches, readily engage in secure external collaboration, rapidly address regulatory
compliance, and gain the confidence to fully embrace the cloud, BYOD and outsourcing.

Global Headquarters Europe India Saudi Arabia Singapore UAE


USA – West Coast Seclore GmbH Excom House Second Floor 5th Floor, Altamyoz Tower Seclore Asia Pte. Ltd. Seclore Technologies FZ-LLC
691 S. Milpitas Blvd Marie-Curie-Straße 8 Plot No. 2, Olaya Street AXA Tower, 8 Shenton Way Executive Office 14, DIC
Suite 217 D-79539 Lörrach Off. Saki Vihar Road P.O. Box. 8374 Level 34-01 Building 1 FirstSteps@DIC
Milpitas, CA 95035 Germany Sakinaka, Mumbai Riyadh 11482 Singapore – 068811 Dubai Internet City
1-844-473-2567 +49 7621 5500 350 400 072 +966-11-212-1346 +65 8292 1930 PO Box 73030
+91 22 6130 4200 +966-504-339-765 +65 9180 2700 Dubai, UAE
USA – East Coast +91 22 6143 4800 +9714-440-1348
Graybar Building +97150-909-5650
420 Lexington +97155-792-3262
Avenue
Suite 300
New York, NY 10170

© 2019 Seclore, Inc. All Rights Reserved.

You might also like