Annual Report, IFD, 2010-2011 · Web viewAnnual Report, IFD, 2010-2011
2010/2011
description
Transcript of 2010/2011
![Page 1: 2010/2011](https://reader035.fdocuments.in/reader035/viewer/2022062423/56814369550346895dafe762/html5/thumbnails/1.jpg)
2010/2011
NetIS™ PresentationThe Complete ePublishing Platform Designed for the 21st Century
![Page 2: 2010/2011](https://reader035.fdocuments.in/reader035/viewer/2022062423/56814369550346895dafe762/html5/thumbnails/2.jpg)
2
Brief Introduction
An integrated e-publishing platform that focuses
on:
• Effective and secure distribution of content
• Sales of premium and sensitive content
• Sophisticated and sales oriented DRM module
• Advanced content management
• Enabling a broad range of distribution, and sales
scenarios
• Powerful proprietary search engine
NetIS™
![Page 3: 2010/2011](https://reader035.fdocuments.in/reader035/viewer/2022062423/56814369550346895dafe762/html5/thumbnails/3.jpg)
3
Main Modules
Contentmanagement
Security E-Commerce Distribution Monitoring
Import contentManage contentFull text search
User groups / individualsLogin / passwordIP addresses / IP range(s)Identify computer (single sign on)Control concurrent usage
Authentication DRM
PermissionsUser authorizationProtect contentRecord usage
CustomersPermissionsProduct catalogOnline store
Web applicationsMobiles devicesCD / DVDRSS channelsSEO
Event logPurchasesDashboardReports
1 2 3 4 5
Convergence of five technologies:
• Digital Rights Management (DRM)
• Web Content Management (WCM)
• E-commerce Tools
• Search and Navigation
• SEO
6Unified API
![Page 4: 2010/2011](https://reader035.fdocuments.in/reader035/viewer/2022062423/56814369550346895dafe762/html5/thumbnails/4.jpg)
Apply DRM profiles and your business rules to the PDFs.
Access control include expiration, concurrent-usage limitations, copying, saving and printing restrictions.
Integrate seamlessly with your firewall, workflows and web based application.
Digital Rights Management (Back Office)
![Page 5: 2010/2011](https://reader035.fdocuments.in/reader035/viewer/2022062423/56814369550346895dafe762/html5/thumbnails/5.jpg)
Upload content into the system and manage it.
Add metadata to documents.
Manage content history and versions.
Apply DRM to content (single documents or a group of documents)
Content Management (Back Office)
![Page 6: 2010/2011](https://reader035.fdocuments.in/reader035/viewer/2022062423/56814369550346895dafe762/html5/thumbnails/6.jpg)
Marketing Management (Back Office)
Add and modify users account
Grant or deny access to documents
View reports on users activities
Search users database
![Page 7: 2010/2011](https://reader035.fdocuments.in/reader035/viewer/2022062423/56814369550346895dafe762/html5/thumbnails/7.jpg)
7
• Concurrent usage
monitoring
• Customer activities
• Product/Customer
slicing
• Online up to date audit
information
• Sales statistics
And more…
Auditing, Reporting and Monitoring (Back Office)
• Royalties Management
![Page 8: 2010/2011](https://reader035.fdocuments.in/reader035/viewer/2022062423/56814369550346895dafe762/html5/thumbnails/8.jpg)
8
API Integration
End UserSearch, RSS, SEOE-commercePrint, Export, Mail merge …
CO
M a
nd
.N
ET
AP
I
Web
Ser
vice
sCRM, Content, Sales
Administration
CustomersData
Metadata E-com
DRMAuthentication, AuthorizationRetrieve documentsEnforce permissions …
Monitoring, Reporting, ...
API Services
SQ
L &
Fil
e sy
stem
AP
I
API Layers System Modules
Billing
E-com
RSS
…
![Page 9: 2010/2011](https://reader035.fdocuments.in/reader035/viewer/2022062423/56814369550346895dafe762/html5/thumbnails/9.jpg)
9
User Authentication (Front End)
• User name/Password
• IP range(s) and Networks
• Concurrent Users.
• Software PC lock
• Hardware lock: USB plugs
• Non-Authenticated guests (with limited secured rights)
• Frequent re-authentication
![Page 10: 2010/2011](https://reader035.fdocuments.in/reader035/viewer/2022062423/56814369550346895dafe762/html5/thumbnails/10.jpg)
10
• Save
• Screen Capture
• Copy and Paste
DRM: Digital Rights Management (Front End)
Full control overusers activity
Prevent or Allow:
![Page 11: 2010/2011](https://reader035.fdocuments.in/reader035/viewer/2022062423/56814369550346895dafe762/html5/thumbnails/11.jpg)
11
• Restricted Access
• Limited Preview time
• Usage counters
DRM: Advanced Access Control (Front End)
• Cumulative Volume
• Cumulative Time
• Granular DRM
• Read-only format
• Absolute flexibility
• Offline protection
![Page 12: 2010/2011](https://reader035.fdocuments.in/reader035/viewer/2022062423/56814369550346895dafe762/html5/thumbnails/12.jpg)
• Sophisticated Full Text and Fielded search
• Pinpoint navigation & highlighting.
• Fast, Robust &Ingenious TOC; Wordlists and Thesauruses; Zoom in/out.
Search, Retrieval and smart Pre-Process (Front End)
• Open API for integration with external solutions, such as Geographical layers.
• Smart pre-processing and Cross-links.
![Page 13: 2010/2011](https://reader035.fdocuments.in/reader035/viewer/2022062423/56814369550346895dafe762/html5/thumbnails/13.jpg)
13
• Preview time and Teasers
• Flexible Products in E-shop –
• Time based (Cumulative)
• Volume based (Cumulative)
• Counter based (Times)
• Usage based
• Context based
• External billing support
• Instant granting of rights
eCommerce (Front End)
• Real time Monitoring and Auditing of usage
• Real time Anti-theft monitoring
![Page 14: 2010/2011](https://reader035.fdocuments.in/reader035/viewer/2022062423/56814369550346895dafe762/html5/thumbnails/14.jpg)
14
The only platform that
seamlessly integrates all the essential modules and
features for the secure distribution of premium and
sensitive content
In Conclusion
We would be happy to arrange a web conference tour of our platform – please click here
www.cdisys.com