Why ClouDoc to protect CAD files?
Transcript of Why ClouDoc to protect CAD files?
- 1 -
Drawing/ Document/ Source code/ Copyright security and Personal information protection
Document centralization based document security
Smart work environment construction
- 2 -
Contents
1. Necessity of document centralization/ document security
2. Overview & Features 3. Document Management Functions4. Security Functions5. Customer Case Studies
1. Company Overview
- 4 -
NETID Co., Ltd.
Yoo, Sang Leol
Software Business | Internet Business
504 KeumMoon Bldg., Yeoksam-ro 148,Gangnam-gu, Seoul 135-929, South korea
TEL : 02-588-0708FAX : 02-588-1012
March 6, 2002
Since March, 2002 ~
ClouDoc
Company name
CEO
Business Area
Address
Phone
Foundation data
Engagement in theSame industry
Product
“ Developers of conscientious software”
NetID
We are working on Solution business through con-
struction a wide Variety of partnership based on
our core technologies like security File server,
Online PC backup,… And we had been putting in a
great Deal Of effort to develop oversea Market
since foundation.
- 6 -
Why Document Centralization?
It is necessary to prevent document loss cost and improve cooperative work efficiency in the organization.
- 7 -
We need to protect critical assets such as CAD drawings as well as documents.
Why Document Centralization?
- 8 -
The problems with the legacy methods
Issues Legacy EDMS SolutionsDocument
Centralization
Complexity of administration
Confused category management
Manageable with less effort
Complexity of User I/F
Multi-click is needed.Document property input is
complex.
Simple and systematically induces
document centralization.
Document Centralization level
LowUp to 100%
Centralizaition
Documents are not centralized even though EDMS is already installed.
- 9 -
Encryption solutions are struggling with application compatibility.
Issues Encryption SolutionDocument
Centralization
Storage Location of the CAD drawings
PC Server
Compatibility withrecent applications
Delayed for some months or years.
Done in some minutes or hours.
Maintenance Cost
Basic maintenance cost+
cost for new Applications
Basic maintenance cost
The problems with the legacy methods
- 10 -
The problems with the legacy methods
Prevention of information leak by malware only with agent installation on the existing business environment
ItemExisting Network
SeparationNetworkLock
Company network Environment change
Physical networkEnvironment
change required
Physical networkNo environment
change
Business convenience and stability
Two PCs used, remote contact, unstable system
Stable, convenient in the existing PC
environment
Additional cost for software license (e.g. from Microsoft)
Physical separation and SBC cause additional cost.
Not applicable
Financial group can adopt high performance NetworkLock regardless
of CC certification!
- 12 -
product Overview
Unlike web-based EDMS, Windows Explorer I/F and security features are available.
ClouDoc Server
NetworkLock PC Log
PC Security Disk
Safe Zone
- 13 -
Storing space to separate and protect corporate property documents or personal information documents
Type 1: Manufacturing/ Large company - Corporate property document
product Overview –What’s the SafeZone?
슬림화된문서중앙화
All business documents
Prohibition stored on
the local disk
document centralization usable slimly
Customer
personal
information
General business
documents
PC Security
Disk
Local
Disk
100% Document Centralization
Document centralization > PC Security Disk
Type 2: Finance/Public/Portal - Personal information document
Document centralization >
PC Security Disk
- 14 -
product Overview – Multi-purpose solution!
Receive the effect of a variety of total corporate solutions from the introduction of just one solution
Safe Zone
온라인첨부 CD
USB 블루투스
인쇄 화면캡처
클립보드
온/오프라인매체유출차단
문서암호화및유출방지
중앙문서함문서관리
PC중앙문서함
DLP
DRM
EDMS
일반영역저장금지
C :\D :\
검색 버전관리
자동체크인체크아웃
- 15 -
product Overview - Standard system VS Non-standard system
Non-standard system has low application compatibility, requiring a separate development for period system interlocking.
- 17 -
product feature – Existing encryption system VS Safe Zone encryption system
Protection of design, video, sound source,and source code as well as CAD drawing and Office document.
Compatible Applications
Development of new version application
Existing encryption system
ClouDocSafe Zoneencryption system
simple setting
within 1~3 days
in average
long development
over several months
programmer
engineer
Office CAD
…
CAD Sourcecode
Videosource
Soundsource Design …
Office
- 19 -
ClouDocserver
User PC
Windows Explorer
Windows Explorer I/F
Induce voluntary document centralization by local disk style environment
context menu
Local disk style driveI/F is provided
- 20 -
Mobile supported
Mobile search engine screen
Document management ( I/F with editor, camera, … ) and security functions(Auth/Locate/Encrypt/Remote Delete).
Option Module
Album/Photo/Video (Device Interoperation)
Device registration
View Server Document Drive
File open
Various setups supported
View Server Document Drive
Interact with camera
File open
- 21 -
Document Categories
Categories(Folders) are created in team drives and you may see only permitted ones.
Plans
Projects
Criteria
Authentication
Team Document Drive Personal Document Drive
Y:\Korea electronics
X:\Personal Document DriveDev. Team
Certificate
Documents
Research
Technical
QOS
Progress
Execute ·Closing
- 22 -
Document open = Automatic checkout
Automatic checkout only by document open. Automatic check-in for document close..
Automatic check-in/out
- 23 -
Version Management for documents
Previous files can be restored even though they are overwritten by new ones.
Version Management
- 24 -
Security
Document leak prevention and access log through encryption
As all access to documentsis recorded as a log in DBMS,it can be used for post audit
Access Log
=Using the same technology
Provides file transfer encryption(SSL) and storage encryption(ARIA)
Encryption of transmission section
Algorithm
Online Banking
Authorization certificate
Log-in
CentralStorage
- 25 -
External Document Exchange Server
Document exchange with partners under the approval of team managers.
External agencies
The Office
Central Server
DMZ ZONE
External Document Exchange Server
Request for approval for sending out
• Sending Out internal document and requesting for approval
• Copying of the sent out documents and history management
Linkmail
Guest ID Upload
Approval Document
Copy
Download
UploadDocument
Copy
1
2
3
4
1
2
: Document Sent
Introductory remarks
: Document received
Option Module
- 27 -
ClouDoc Safe Zone
PC Security DiskUSB, CD/DVD,
Network DriveFixed Disk Central Server
WCADAi Ps
X
WCADAi Ps
X
Application using local documents ClouDoc Safe Zone
Isolation of business Documentsto the center server
PC control by storage in the center, prohibiting storage except the security disk section
NO DATA
Watermark
Local saveOn-line attachment Printing Screen Capture
Clipboard copy
block block
Transfer prohibited
Of isolated documents
Option Module
- 28 -
ClouDoc Safe Zone
PC Security DiskUSB, CD/DVD,
Network DriveFixed Disk Central Server
WCADAi Ps
X
WCADAi Ps
X
Application using local documents ClouDoc Safe Zone
Isolation ofpersonal information
Watermark
Local saveOn-line attachment Printing Screen Capture
Clipboard copy
block
Transfer prohibited
Of isolated documents
Personal information documents isolated for Safe Zone will be strictly protected and local documents freely used.
Required is additional development of customized personal information scan solution interlocking.
Allow
KUD H
O
KUD H
O
Watermark
- 29 -
Using self-protection against cyber-hacking kind of crisis.
Unknown Programs Safe Zone protection
malignant code
virus
?.exe
?
?
?
Allowed Programs
W
Ps
Ai
XCAD
Option Module
Specified applications : Read/Write allowed.
All applications : Read/Write not allowed.
Center Server
PC Security Disk
White List
ClouDoc Safe Zone
- 30 -
Files and folders can be exported on·offline after approval of team managers.
3. Approval/rejaction of
Release request
* Saved copy of released documents
X: Doc_ Export
4 . Only approved files, folders
released
ClouDocServer
Department Head
Employee
Approval procedures for file and folder export 1 . Non-approved
documents cannot released
• Netwotk• Local Disk• CD/DVD• USB• ….
5. Carry Out
online
Offline
Option ModuleClouDoc Safe Zone
2. Request for release of files, folder
- 31 -
NetworkLock
We use only one PC and provides network separation by network filtering.
Option Module
- 32 -
Internet is blocked in intranet mode. Intranet is blocked in Internet mode.
Intranet Mode Internet Mode
Internet
Groupware/ERP
ClouDoc Drives
Groupware/ ERP
Groupware/ ERP
X : Share Drive
Y : Team Drive
Z : Personal Drive
NetworkLock Option Module
X : Share Drive
Y : Team Drive
Z : Personal Drive
- 33 -
NetworkLock
Two more effects as well as preventing ‘data leak by malicious codes’.
Option Module
- 34 -
PCLOG
'Control/Alert/Record/Statistics' for 'Fixed, USB, Network and ClouDoc drives'.
Option Module
- 38 -
Disk IO filtering and document export policies protect office documents and CAD drawings.
ClouDoc Effects
- 40 -
ClouDoc Effects
Security & work productivity improvement with Cloud storage based network separation
Simple storage
PC
Safe business environment construction with document centralization NetworkLock
Cloud storage(ClouDoc)
PC
PC storage prohibited
Internet modeIntranet mode
AS-IS
TO-BE
Cloud Storage
[Situation]Necessity of safe education environment to protect student's personal information and important information from intelligent cyber attack
[Solution]Internet blocking based on the white list by document centralization Networklock
[Benefit] Network conversion with one PC has brought user convenience and security enhancement.
Introduction of 'ClouDoc' Networklock to Inchon Metropolitan City Office of Education
-Network Times, October 2014-
Perfect information protection from mobile andinternet services.Realization of network separation environment with NetID
‘ClouDoc’… Enhanced work efficiency by supporting Smartwork
Simple function central file storage space
- 41 -
Customer Case Studies
Stable smart office document centralization solution used by large companies!
Customers having over 500 users and large customers Overseas
100 user
5,000 user
1,000 user
400 user
550 user
600 user
1,200 user
500 user
3,000 user
1,000 user
1,000 user
700,000 user
100 user
1,600 user
380 user
500 user
1,800 user
Full school staff
2.000 user
2,000user
500 user
1,000 user
500 user
School members