Seclore APIs & Sdks
Seclore APIs & Sdks
Extend the Power and Value of your Security Software Offerings and Enterprise
Applications with Data-Centric Security
Overview
To support security software solution providers and organizations who want to add data-centric security to their business
and transactional applications, Seclore has created comprehensive Software Development Kits (SDK). The Seclore SDKs
features a robust collection of APIs and rapid configuration capabilities that reduce the effort required to add persistent,
granular usage controls and tracking to information as it is discovered, downloaded, classified and shared. By adding data-
centric security to an application, information remains under the organization’s control – even when it leaves the application
and moves beyond organizations’ boundaries.
There are two primary SDKs available from Seclore: The Seclore Server SDK and the Seclore Endpoint Auto-Protector
SDK. The Seclore Server SDK is designed to support the integration of Seclore with enterprise applications that run in the
background The Seclore End-Point Auto-Protector SDK, a configurable cross-platform tool, makes it easy to add data-centric
security to solutions that run on end-uses devices.
Extending Data Protection Beyond Security Software Solutions and Business Applications
Integrating the Seclore Server SDK with an enterprise application will keep data under the organization’s control – even
when it is shared externally. Seclore can seamlessly take over where the enterprise application’s protection ends – adding
persistent granular usage controls and tracking that stay with the file wherever and however it travels. The Seclore Endpoint
Auto-Protector SDK enables vendors providing DLP, CASB, eDiscovery, and other endpoint-based security solutions to add
rapidly add the capability to automatically protect information as it is detected.
Robust APIs
The Seclore SDKs offer a complete set of RESTful APIs as web services with supporting documentation and sample
code to make service calls from any platform or device. All calls are secured via built-in authentication controls and all
communication happens using secure protocols.
Identity Federation
To ensure a seamless experience for the end-user, Seclore provides a robust Identity Federation capability. The result is
that end users can authenticate using the organization’s existing Identity and SSO solutions. Identity Federation is achieved
by integrating with Identity and Access Management (IAM) and SSO systems to provide the same experience for user
authentication. Seclore has readily available connectors for most Identity and SSO solution providers including Microsoft
Active Directory, IBM Tivoli Directory, Domino LDAP, Sun ONE LDAP, Google Authentication, and more.
Policy Federation
Seclore Policy Federation makes it easy to map an application’s access policies to Seclore’s granular usage controls.
Examples of policies that can be federated include users’ permissions on the file, file owner, classification of a file and
watermarking to be displayed on the file. The synchronization of policies between the application and Seclore Data-Centric
Security ensures a streamlined and dynamic extension of file usage permissions.
Online Editing-as-a-Service
Allows the business application to open and edit Seclore-protected files in a secure browser with a single click. Documents
edited will be saved back to the business application.
Integrated Auditing
All activities performed on protected files – whether inside or outside the enterprise network - are centrally logged. Email
alerts on unauthorized usage attempts (e.g. someone tried to print a protected file) can also be configured. SIEM tools like
Splunk and BI Analytics tools can also be integrated with Seclore to provide centralized auditing and compliance reporting.
Use Case – 2:
Sensitive data discovered by DLP on Endpoint, Network File Shares or data being
uploaded to the web will be automatically protected by calling the Seclore SDK. The
relevant Rights Management policy is applied to the file so that the file can be freely
shared across and outside enterprise boundary.
Use Case – 3:
Sensitive data discovered by DLP in an email will be automatically protected by
Data Loss Prevention/CASB + Seclore by adding a X-Header in the email. This X-Header will be read by a Seclore
Seclore service to apply the relevant Rights Management policy.
Use Case – 4:
Detect and decrypt protected data to enable DLP to scan content before it exits
enterprise boundaries via email or web traffic. This can be achieved by calling the
Seclore SDK to allow the DLP solution to perform content inspection.
Use Case – 5:
Files downloaded or uploaded through sanctioned or unsanctioned CASB applications
will be automatically protected by calling the Seclore SDK. The relevant Rights
Management policy can be applied to the file so that it can be freely shared across
and outside enterprise boundary.
Use Case – 7:
Data Classification + Seclore Sensitive emails classified by a Classification system will be automatically protected
(continued) by Seclore by adding a X-Header in the email. This X-Header will be read by a Seclore
service to apply the relevant Rights Management policy.
Use Case – 8:
Reports downloaded or shared as emails will be automatically protected by calling
BI & Analytics Tools + Seclore
the Seclore SDK. The relevant Rights Management policy is applied to the file so that
sensitive reports remain secure while being utilized outside the application.
Use Case – 9:
Auto-generated and manually exported reports will be automatically protected by
Transactional Systems (ERP/ calling the Seclore SDK.
CRM/HRM) + Seclore
Use Case – 10:
Reports sent as email attachments will be automatically protected by Seclore either
by adding a X-Header in the email or by calling the Seclore SDK. This X-Header will be
read by a Seclore service to apply the relevant Rights Management policy.
Key Benefits
Easily Add Automated Data-Centric Protection to Your Increased ROI from Your Existing Investments
Security Software Offering The ability to easily add data-centric security to your existing
The configurable, open nature of the Seclore SDKs make it transactional and business systems will enable you to
easy for you to extend the power of your solution to include seamlessly extend your security to wherever your information
persistent, granular usage controls and tracking of sensitive travels during the collaboration process.
content.
Secure External Collaboration - Solve Your Customer’s Last Simplified Administration - Common Policy Management
Mile Challenge Framework
Integrating your offering with Seclore’s data-centric security Seclore’s Policy Federation capability eliminates the need
will empower your customers to better secure information, for separate ‘policy’ management for the same information.
address regulatory compliance, and confidently embrace A common usage control framework helps bring your data
their cloud, BYOD and outsourcing strategies. governance framework under one roof by providing a single
source-of-truth for information access and usage policies.
Security Software Providers Enterprises
Help Your Customers Better Address Regulatory End-to-End Auditing and Regulatory Compliance
Compliance You can now govern the use of your information throughout
The ability to protect and audit data wherever it travels its entire lifecycle – both within and outside your enterprise
enables your customers to automatically track the usage of boundary.
information and better comply with regulatory obligations for
the entire lifecycle of the data - both within and outside their
enterprise network.