Digital Rights Management Architecture

How Digital Rights Management Protects Data for an Organization

  1. Protect a file
    You protect a file on your computer
  2. Share it any way you like
    You send it to the recipients via any mechanism: email, file-sharing services, USB drives, CD/DVD, …
  3. Data security is permanently enforced
    File can be accessed on any platform or device — and it never loses its security

Seclore’s Digital Rights Management Architectural Elements

  • Seclore Policy Server: The command-and-control center of the Seclore system that is used to manage usage policies, user permissions, protected files, activity logs, and other information
  • Seclore Identity Manager: Our own LDAP system that functions like a full-fledged Identity and Access Management system with users, groups, OUs with registration and self-service workflows
  • Seclore Lite Server: The server used to access protected files using Seclore Lite Online, our browser-based module
  • IAM Systems: Any Identity and Access Management, Identity Federation, or Single sign-on system integrated with Seclore FileSecure for user authentication
  • EFSS: Seclore adds persistent data security to files that are shared via Enterprise File Synch and Share (EFSS) systems
  • File Servers: File servers with folders (called ‘Hot Folders’) configured to secure files as soon as they are placed inside them
  • ECM Systems: Enterprise Content Management (ECM) systems (e.g. IBM FileNet, Microsoft SharePoint) that are seamlessly integrated with Seclore to automatically add data-centric security at the point of download
  • DLP Systems: Data Loss Prevention (DLP) Systems (e.g. McAfee DLP, Symantec DLP) that are integrated with Seclore to automatically secure files discovered by DLP
  • Enterprise Applications: Enterprise applications (e.g. SAP and Transactional Systems) integrated with Seclore to automatically apply data-centric security to downloaded files, reports, and other extracts

Seclore Digital Rights Management Architecture –
in the Cloud




Love podcasts or audiobooks? Learn on the go with our new app.

Recommended from Medium

Get Ready For The Second $CVIX Claim Period!

.bnb Domain Name Service Whitelist Carnival: Grab a Spot in the Pre-registration Round

Network discovery: Finding the unknown on your internal network.

We need to social-distance from the scammers

Yesterday’s Firewalls are Today’s Permeable Membranes

TryHackMe Writeup: Steel Mountain

5 Tokens that I’m currently distributing free using this platform

Cyber Talents: Web Security Writeup

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store


More from Medium

How to pivot to a career in the impact sector

TodoX project story: task manager and time tracker

TodoX screenshot

Top 31 Wrike Alternatives in Project Management

The Many Hats of a Product Manager