SlideShare a Scribd company logo
1 of 23
Download to read offline
ShipIT Conference 2015
Facilitating Document Management
Compliance in the Maritime Industry
Tassos Anagnostopoulos
Principal Solutions Architect
anagnostopoulost@unisystems.gr Athens, 30 September 2015
50+ years of solid IT
experience
Uni Systems was founded in 1964.
35+ years of Banking experience.
15+ years of Telecom experience.
Lead systems integrator &
solutions provider in
international market
More than 30 international
customers including E.C., EU
agencies, etc.
480+ specialized business &
technology professionals
200 S/W Engineers, 150 System &
Support Engineers, 50 Business
Consultants
65+ M€ Total Revenues (2014)
52+ M€ Services, & Consulting
11+ M€ EU Institutions, Agencies
and International Organisations
Uni Systems at a glance
Using Greece as its base, Uni Systems is positioned as a key SI player in the
emerging SE European, MENA and EU region.
A Reference in the European ICT Service Sector
 Major ICT Systems Integrator in
the domestic market
 Key contractor for central EU
Institutions & Agencies
 Among the top solutions
providers in the region of South-
Eastern Europe & Turkey
 Expand to MENA and GCC
countries with targeted solutions
3
The Need for Document Management
• Average company has
200-300 different types
of documents
• 80% of enterprise
information is
unstructured
– Source: Fulcrum Research
• 90% of unstructured
information is
unmanaged
SOPs
video
presentations
proposals
specifications
project plans
illustrations
detailed designs
photos
web information
animation
emails
research
scanned documents
forms
resumes
market requirements
product requirements
fingerprints
letters
white papers
SOWs
contracts
POs
invoices
meeting notesNDA
data sheets
competitive analysis
MRP
ERP
Order
Mgmt.
CRM
Policy
Mgmt.
Unstructured
Structured
Document Management Challenges
• Volume of documents growing exponentially
• Relevant information is virtually impossible to find
• Difficult to control versions in distributed organizations
• Becomes increasingly important in disconnected scenarios
(e.g. ships)
• Policy enforcement is fractured and incomplete
Effective Information Governance
in the Shipping Industry
Support for
Audits
 Ensure preservation
of all required
documentation
 Facilitate discovery
of information both
at shore and on
ships
 Track document
access
Shipping Industry
regulations
 Multiple regulations
already in effect:
Safety (SOLAS)
Security (ISPS)
Labour (MLC)
Environment
(MARPOL)
 New regulations?
Security and
Privacy
 Protect corporate
information
 Limit access only to
those entitled to it
Litigation
Readiness
 Ability to quickly
respond to
investigation
requests
 Be able to prove
that no important
records have been
altered or destroyed
Massive
information
growth
 Legislation is driving
companies to keep
more data, and for
longer periods of
time
 Need for continuous
syncing of new
content with ships
Information Governance Requirements
Massive
information
growth
 Legislation is driving
companies to keep
more data, and for
longer periods of
time
 Need for continuous
syncing of new
content with ships
Effective Information Governance
in the Shipping Industry
Support for
Audits
 Ensure preservation
of all required
documentation
 Facilitate discovery
of information
Shipping Industry
regulations
 Multiple regulations
already in effect:
Safety (SOLAS)
Security (ISPS)
Labour (MLC)
Environment
(MARPOL)
 New regulations?
Security and
Privacy
 Protect corporate
information
 Limit access only to
those entitled to it
Litigation
Readiness
 Ability to quickly
respond to
investigation
requests
 Be able to prove
that no important
records have been
altered or destroyed
Information Governance Requirements
Need for Information Governance leads to increased
technical, record-keeping and management requirements
Multiple compliance risks and consequences
for commercial vessel operators
Enterprise Content Management and Compliance
Managing the complete content lifecycleManaging the Complete Content Lifecycle
Create Review Approve Publish Distribute Retain Dispose
Complete Controlled Life Cycle
• All important documents and mails stored and tracked by one system, with
common security rules and a unified audit trail
• Full visibility over the lifetime of the content, ensuring legislation compliance
The New Information Governance Technology Stack
User experience
Compliance
Services
Enterprise Content
Management
User experience
Intelligent information
platform
Compliance
Services
Cloud Information
Services Infrastructure
The New Information Governance Technology Stack
Enterprise Content
Management
Completely tailored to
the user, task,
and goal
Complete work/
life integration
Device-independent
for access anywhere
Flexible framework
for easy and dynamic
user interface
assembly
User Experience
Compliance
Services
Cloud Information
Services Infrastructure
The New Information Governance Technology Stack
Enterprise Content
Management
User experience
Ability to declare
documents and mails
as official records
Retention and Disposition
Management
Fine-level
access control
Complete auditing
of all user events
Support for compliance
regulations & standards
(SOX, MoReq, etc.)
Intelligent
information platform
Cloud Information
Services Infrastructure
Enterprise Content
Management
User Experience
The New Information Governance Technology Stack
User experience
Process management
and collaboration
as built-in services
Unified repository for all content
(documents – mails etc.)
Distributed
architecture
allowing replication
of content
Easy search and
discovery
Highly flexible platform for
rapid application composition
and configuration
Compliance
Services
• Recognized as an ECM Leader by Gartner and Forrester
• Ensured compliance (DoD 5015.2, SOX, etc.)
• Interface with the European Maritime Strategic Framework
• Unified Document & Records Management suite
EMC Documentum
Enterprise Content Management Suite
DOCUMENTUM ECM SUITE
Delivers a fully integrated, comprehensive information management platform that
allows organizations to manage and leverage content in a cost-effective, controlled
manner while providing secured access across a distributed organization
The EMC Documentum Solution
USER EXPERIENCE
ENTERPRISE CONTENT MANAGEMENT
INTELLIGENT INFORMATION PLATFORM
COLLABORATION
WORKFLOW ENGINECAPTURE AUDITING
SEARCH AND CONTENT
ANALYTICS
SECURITY AND
RIGHTS MANAGEMENT
DOCUMENT
MANAGEMENT
COMPLIANCE SERVICES
LIFECYCLE
MANAGEMENT
RETENTION AND
DISPOSITION
RECORDS
MANAGEMENT
SYNC & SHARE FOR OFFLINE
AND MOBILE DEVICES
COMPOSABLE
USER INTERFACE
The EMC Documentum Solution
USER EXPERIENCE
ENTERPRISE CONTENT MANAGEMENT
INTELLIGENT INFORMATION PLATFORM
COLLABORATION
WORKFLOW ENGINECAPTURE AUDITING
SEARCH AND CONTENT
ANALYTICS
SECURITY AND
RIGHTS MANAGEMENT
DOCUMENT
MANAGEMENT
COMPLIANCE SERVICES
LIFECYCLE
MANAGEMENT
RETENTION AND
DISPOSITION
RECORDS
MANAGEMENT
SYNC & SHARE FOR OFFLINE
AND MOBILE DEVICES
COMPOSABLE
USER INTERFACE
DOCUMENTUM
RECORDS MANAGER
DOCUMENTUM ECM PLATFORM
SYNCPLICITY
DOCUMENTUM
D2
Security in the Documentum Platform
Content Security
 Repository Encryption
 Electronic Signatures
 Information Rights Management
 Mandatory Access Control
 Digital Shredding
Electronic
signatures
Digital
shredding
Single
sign-on
Authentication
Auditing
Encryption
Information
rights
The Documentum D2 User Interface
Personalized
experience
based on user
role
Simplified
access to
content
Easily
configurable, no
coding needed
The Documentum D2 User Interface
Personalized
experience
based on user
role
Simplified
access to
content
Easily
configurable, no
coding needed
The Documentum D2 User Interface
Personalized
experience
based on user
role
Simplified
access to
content
Easily
configurable, no
coding needed
The Documentum D2 User Interface
Personalized
experience
based on user
role
Simplified
access to
content
Easily
configurable, no
coding needed
Offline and Mobile Access – Syncplicity
• Provides synchronization with any device, whether inside or
outside the firewall
• Files can be IRM-encrypted to prevent unauthorized sharing
• Fully auditable
Documentum Customers World-wide
www.unisystems.com

More Related Content

What's hot

Cloud Computing - Beyond the Hype
Cloud Computing - Beyond the HypeCloud Computing - Beyond the Hype
Cloud Computing - Beyond the HypeRH
 
Empowering the evolving workforce with virtual workspaces
Empowering the evolving workforce with virtual workspacesEmpowering the evolving workforce with virtual workspaces
Empowering the evolving workforce with virtual workspacesDell World
 
3 Ways Companies Are Slashing IT Costs with VDI
3 Ways Companies Are Slashing IT Costs with VDI3 Ways Companies Are Slashing IT Costs with VDI
3 Ways Companies Are Slashing IT Costs with VDICitrix
 
Data Movement, Management and Governance In The Cloud: DocuSign Case Study
Data Movement, Management and Governance In The Cloud: DocuSign Case StudyData Movement, Management and Governance In The Cloud: DocuSign Case Study
Data Movement, Management and Governance In The Cloud: DocuSign Case StudyDell World
 
Security of Data in Cloud Environment Using DPaaS
Security of Data in Cloud Environment Using DPaaSSecurity of Data in Cloud Environment Using DPaaS
Security of Data in Cloud Environment Using DPaaSIJMER
 
The Data Center Is The Heartbeat of Today's IT Transformation (ENT215) | AWS ...
The Data Center Is The Heartbeat of Today's IT Transformation (ENT215) | AWS ...The Data Center Is The Heartbeat of Today's IT Transformation (ENT215) | AWS ...
The Data Center Is The Heartbeat of Today's IT Transformation (ENT215) | AWS ...Amazon Web Services
 
If You Are Not Embedding Analytics Into Your Day To Day Processes, You Are Do...
If You Are Not Embedding Analytics Into Your Day To Day Processes, You Are Do...If You Are Not Embedding Analytics Into Your Day To Day Processes, You Are Do...
If You Are Not Embedding Analytics Into Your Day To Day Processes, You Are Do...Dell World
 
Privacy issues in the cloud final
Privacy issues in the cloud   finalPrivacy issues in the cloud   final
Privacy issues in the cloud finalguest50a642f
 
10 Reasons to Strengthen Security with App & Desktop Virtualization
10 Reasons to Strengthen Security with App & Desktop Virtualization10 Reasons to Strengthen Security with App & Desktop Virtualization
10 Reasons to Strengthen Security with App & Desktop VirtualizationCitrix
 
Cloud computing boi fair 9jan2012
Cloud computing boi fair 9jan2012Cloud computing boi fair 9jan2012
Cloud computing boi fair 9jan2012punyagup
 
MT82 IoT Security Starts at Edge
MT82  IoT Security Starts at EdgeMT82  IoT Security Starts at Edge
MT82 IoT Security Starts at EdgeDell EMC World
 
Rethinking Data Availability and Governance in a Mobile World
Rethinking Data Availability and Governance in a Mobile WorldRethinking Data Availability and Governance in a Mobile World
Rethinking Data Availability and Governance in a Mobile WorldHao Tran
 
10-ways-the-dissolving-perimeter-kills-IT
10-ways-the-dissolving-perimeter-kills-IT10-ways-the-dissolving-perimeter-kills-IT
10-ways-the-dissolving-perimeter-kills-ITIdan Hershkovich
 
Cloud computing
Cloud computingCloud computing
Cloud computingjhoejoe
 
Cloud Computing for SMBs
Cloud Computing for SMBsCloud Computing for SMBs
Cloud Computing for SMBswhite paper
 
The client defined cloud final clementi
The client defined cloud final clementiThe client defined cloud final clementi
The client defined cloud final clementiMauricio Godoy
 

What's hot (20)

IT__forum_11
IT__forum_11IT__forum_11
IT__forum_11
 
Cloud Computing - Beyond the Hype
Cloud Computing - Beyond the HypeCloud Computing - Beyond the Hype
Cloud Computing - Beyond the Hype
 
Empowering the evolving workforce with virtual workspaces
Empowering the evolving workforce with virtual workspacesEmpowering the evolving workforce with virtual workspaces
Empowering the evolving workforce with virtual workspaces
 
Democratizing IT Automation in a Multi-Cloud World
Democratizing IT Automation in a Multi-Cloud WorldDemocratizing IT Automation in a Multi-Cloud World
Democratizing IT Automation in a Multi-Cloud World
 
3 Ways Companies Are Slashing IT Costs with VDI
3 Ways Companies Are Slashing IT Costs with VDI3 Ways Companies Are Slashing IT Costs with VDI
3 Ways Companies Are Slashing IT Costs with VDI
 
Data Movement, Management and Governance In The Cloud: DocuSign Case Study
Data Movement, Management and Governance In The Cloud: DocuSign Case StudyData Movement, Management and Governance In The Cloud: DocuSign Case Study
Data Movement, Management and Governance In The Cloud: DocuSign Case Study
 
Security of Data in Cloud Environment Using DPaaS
Security of Data in Cloud Environment Using DPaaSSecurity of Data in Cloud Environment Using DPaaS
Security of Data in Cloud Environment Using DPaaS
 
The Data Center Is The Heartbeat of Today's IT Transformation (ENT215) | AWS ...
The Data Center Is The Heartbeat of Today's IT Transformation (ENT215) | AWS ...The Data Center Is The Heartbeat of Today's IT Transformation (ENT215) | AWS ...
The Data Center Is The Heartbeat of Today's IT Transformation (ENT215) | AWS ...
 
If You Are Not Embedding Analytics Into Your Day To Day Processes, You Are Do...
If You Are Not Embedding Analytics Into Your Day To Day Processes, You Are Do...If You Are Not Embedding Analytics Into Your Day To Day Processes, You Are Do...
If You Are Not Embedding Analytics Into Your Day To Day Processes, You Are Do...
 
Privacy issues in the cloud final
Privacy issues in the cloud   finalPrivacy issues in the cloud   final
Privacy issues in the cloud final
 
10 Reasons to Strengthen Security with App & Desktop Virtualization
10 Reasons to Strengthen Security with App & Desktop Virtualization10 Reasons to Strengthen Security with App & Desktop Virtualization
10 Reasons to Strengthen Security with App & Desktop Virtualization
 
Cloud computing boi fair 9jan2012
Cloud computing boi fair 9jan2012Cloud computing boi fair 9jan2012
Cloud computing boi fair 9jan2012
 
MT82 IoT Security Starts at Edge
MT82  IoT Security Starts at EdgeMT82  IoT Security Starts at Edge
MT82 IoT Security Starts at Edge
 
106248842 cc
106248842 cc106248842 cc
106248842 cc
 
Rethinking Data Availability and Governance in a Mobile World
Rethinking Data Availability and Governance in a Mobile WorldRethinking Data Availability and Governance in a Mobile World
Rethinking Data Availability and Governance in a Mobile World
 
10-ways-the-dissolving-perimeter-kills-IT
10-ways-the-dissolving-perimeter-kills-IT10-ways-the-dissolving-perimeter-kills-IT
10-ways-the-dissolving-perimeter-kills-IT
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
VISIT2008 Overview Managed Data Center
VISIT2008 Overview Managed Data CenterVISIT2008 Overview Managed Data Center
VISIT2008 Overview Managed Data Center
 
Cloud Computing for SMBs
Cloud Computing for SMBsCloud Computing for SMBs
Cloud Computing for SMBs
 
The client defined cloud final clementi
The client defined cloud final clementiThe client defined cloud final clementi
The client defined cloud final clementi
 

Similar to Ship it 2015 UniSystems: Facilitating Document Management Compliance for the Maritime Industry

TSSG Security research unit May11_zdooly
TSSG Security research unit May11_zdoolyTSSG Security research unit May11_zdooly
TSSG Security research unit May11_zdoolyzdooly
 
OpenAthens and the future of access and identity management
OpenAthens and the future of access and identity managementOpenAthens and the future of access and identity management
OpenAthens and the future of access and identity managementEduserv Foundation
 
Atsc Corporate Capabilities Briefing Final Tech Services
Atsc Corporate Capabilities Briefing Final   Tech ServicesAtsc Corporate Capabilities Briefing Final   Tech Services
Atsc Corporate Capabilities Briefing Final Tech Servicesacaraffa
 
November 2009 - Walking on thin ice… from SOA to EDA
November 2009 - Walking on thin ice… from SOA to EDANovember 2009 - Walking on thin ice… from SOA to EDA
November 2009 - Walking on thin ice… from SOA to EDAJBug Italy
 
Company Overview 20090228
Company Overview 20090228Company Overview 20090228
Company Overview 20090228nl23994
 
eTOM and ITIL engagements
eTOM and ITIL engagementseTOM and ITIL engagements
eTOM and ITIL engagementsAhmed Selim
 
Protecting SAP® Data with Managed File Transfer
Protecting SAP® Data with Managed File TransferProtecting SAP® Data with Managed File Transfer
Protecting SAP® Data with Managed File TransferSEEBURGER
 
Poročilo o obisku kongresa 2010 luksemburg 22062010
Poročilo o obisku kongresa 2010 luksemburg 22062010Poročilo o obisku kongresa 2010 luksemburg 22062010
Poročilo o obisku kongresa 2010 luksemburg 22062010Zeleno d.o.o.
 
Securing Fax and Document Workflow: Driving Compliance in the Organization
Securing Fax and Document Workflow: Driving Compliance in the OrganizationSecuring Fax and Document Workflow: Driving Compliance in the Organization
Securing Fax and Document Workflow: Driving Compliance in the OrganizationOpenText Information Exchange
 
enterprise arch_prc_short
enterprise arch_prc_shortenterprise arch_prc_short
enterprise arch_prc_shortCora Carmody
 
Enterprise content management (in short)
Enterprise content management  (in short)Enterprise content management  (in short)
Enterprise content management (in short)Anatoliy Arkhipov
 
WHY WE NEED AN EUROPEAN LOGISTICS DATA SPACE
WHY WE NEED AN EUROPEAN LOGISTICS DATA SPACEWHY WE NEED AN EUROPEAN LOGISTICS DATA SPACE
WHY WE NEED AN EUROPEAN LOGISTICS DATA SPACEThorsten Huelsmann
 
Warehouse Inventory Asset Management Solution Presentation
Warehouse Inventory Asset Management Solution PresentationWarehouse Inventory Asset Management Solution Presentation
Warehouse Inventory Asset Management Solution Presentationwillyaoll
 
Continuous Multilayer Protection: Operationalizing a Security Framework
Continuous Multilayer Protection: Operationalizing a Security FrameworkContinuous Multilayer Protection: Operationalizing a Security Framework
Continuous Multilayer Protection: Operationalizing a Security FrameworkQuEST Forum
 
Cuae Business Values V 1.8.2
Cuae   Business Values V 1.8.2Cuae   Business Values V 1.8.2
Cuae Business Values V 1.8.2Chinmoy Misra
 
Future Cloud Action Line - EIT ICT Labs
Future Cloud Action Line - EIT ICT Labs Future Cloud Action Line - EIT ICT Labs
Future Cloud Action Line - EIT ICT Labs Digital Catapult
 
Demand & Supply Management in a Multi-Sourcing Environment
Demand & Supply Management in a Multi-Sourcing EnvironmentDemand & Supply Management in a Multi-Sourcing Environment
Demand & Supply Management in a Multi-Sourcing EnvironmentJean-Pierre Beelen
 

Similar to Ship it 2015 UniSystems: Facilitating Document Management Compliance for the Maritime Industry (20)

TSSG Security research unit May11_zdooly
TSSG Security research unit May11_zdoolyTSSG Security research unit May11_zdooly
TSSG Security research unit May11_zdooly
 
OpenAthens and the future of access and identity management
OpenAthens and the future of access and identity managementOpenAthens and the future of access and identity management
OpenAthens and the future of access and identity management
 
Atsc Corporate Capabilities Briefing Final Tech Services
Atsc Corporate Capabilities Briefing Final   Tech ServicesAtsc Corporate Capabilities Briefing Final   Tech Services
Atsc Corporate Capabilities Briefing Final Tech Services
 
November 2009 - Walking on thin ice… from SOA to EDA
November 2009 - Walking on thin ice… from SOA to EDANovember 2009 - Walking on thin ice… from SOA to EDA
November 2009 - Walking on thin ice… from SOA to EDA
 
Company Overview 20090228
Company Overview 20090228Company Overview 20090228
Company Overview 20090228
 
The public sector and integrated operations
The public sector and integrated operationsThe public sector and integrated operations
The public sector and integrated operations
 
Decision group company_profile_2017
Decision group company_profile_2017Decision group company_profile_2017
Decision group company_profile_2017
 
eTOM and ITIL engagements
eTOM and ITIL engagementseTOM and ITIL engagements
eTOM and ITIL engagements
 
Protecting SAP® Data with Managed File Transfer
Protecting SAP® Data with Managed File TransferProtecting SAP® Data with Managed File Transfer
Protecting SAP® Data with Managed File Transfer
 
Poročilo o obisku kongresa 2010 luksemburg 22062010
Poročilo o obisku kongresa 2010 luksemburg 22062010Poročilo o obisku kongresa 2010 luksemburg 22062010
Poročilo o obisku kongresa 2010 luksemburg 22062010
 
Securing Fax and Document Workflow: Driving Compliance in the Organization
Securing Fax and Document Workflow: Driving Compliance in the OrganizationSecuring Fax and Document Workflow: Driving Compliance in the Organization
Securing Fax and Document Workflow: Driving Compliance in the Organization
 
enterprise arch_prc_short
enterprise arch_prc_shortenterprise arch_prc_short
enterprise arch_prc_short
 
Enterprise content management (in short)
Enterprise content management  (in short)Enterprise content management  (in short)
Enterprise content management (in short)
 
WHY WE NEED AN EUROPEAN LOGISTICS DATA SPACE
WHY WE NEED AN EUROPEAN LOGISTICS DATA SPACEWHY WE NEED AN EUROPEAN LOGISTICS DATA SPACE
WHY WE NEED AN EUROPEAN LOGISTICS DATA SPACE
 
Apani Ov V9
Apani Ov V9Apani Ov V9
Apani Ov V9
 
Warehouse Inventory Asset Management Solution Presentation
Warehouse Inventory Asset Management Solution PresentationWarehouse Inventory Asset Management Solution Presentation
Warehouse Inventory Asset Management Solution Presentation
 
Continuous Multilayer Protection: Operationalizing a Security Framework
Continuous Multilayer Protection: Operationalizing a Security FrameworkContinuous Multilayer Protection: Operationalizing a Security Framework
Continuous Multilayer Protection: Operationalizing a Security Framework
 
Cuae Business Values V 1.8.2
Cuae   Business Values V 1.8.2Cuae   Business Values V 1.8.2
Cuae Business Values V 1.8.2
 
Future Cloud Action Line - EIT ICT Labs
Future Cloud Action Line - EIT ICT Labs Future Cloud Action Line - EIT ICT Labs
Future Cloud Action Line - EIT ICT Labs
 
Demand & Supply Management in a Multi-Sourcing Environment
Demand & Supply Management in a Multi-Sourcing EnvironmentDemand & Supply Management in a Multi-Sourcing Environment
Demand & Supply Management in a Multi-Sourcing Environment
 

More from Uni Systems S.M.S.A.

Uni Systems for Power Platform.pptx
Uni Systems for Power Platform.pptxUni Systems for Power Platform.pptx
Uni Systems for Power Platform.pptxUni Systems S.M.S.A.
 
Microsoft Fabric Intro D Koutsanastasis
Microsoft Fabric Intro D KoutsanastasisMicrosoft Fabric Intro D Koutsanastasis
Microsoft Fabric Intro D KoutsanastasisUni Systems S.M.S.A.
 
Create Unique Experiences through a CRM Approach St Kontos
Create Unique Experiences through a CRM Approach St Kontos Create Unique Experiences through a CRM Approach St Kontos
Create Unique Experiences through a CRM Approach St Kontos Uni Systems S.M.S.A.
 
Bring your data to the era of AI D. Agagiotis.pdf
Bring your data to the era of AI D. Agagiotis.pdfBring your data to the era of AI D. Agagiotis.pdf
Bring your data to the era of AI D. Agagiotis.pdfUni Systems S.M.S.A.
 
Innovative approaches with AI, Data Analytics & CRM
Innovative approaches with AI, Data Analytics & CRMInnovative approaches with AI, Data Analytics & CRM
Innovative approaches with AI, Data Analytics & CRMUni Systems S.M.S.A.
 
Change the Business Landscape with Voice of Customer.pdf
Change the Business Landscape with Voice of Customer.pdfChange the Business Landscape with Voice of Customer.pdf
Change the Business Landscape with Voice of Customer.pdfUni Systems S.M.S.A.
 
Change the Business Landscape with Voice of Customer
Change the Business Landscape with Voice of CustomerChange the Business Landscape with Voice of Customer
Change the Business Landscape with Voice of CustomerUni Systems S.M.S.A.
 
The Evolution in Customer Experience: Migration to Cloud for Contact Center
The Evolution in Customer Experience: Migration to Cloud for Contact CenterThe Evolution in Customer Experience: Migration to Cloud for Contact Center
The Evolution in Customer Experience: Migration to Cloud for Contact CenterUni Systems S.M.S.A.
 
The Evolution of Customer Experience
The Evolution of Customer Experience The Evolution of Customer Experience
The Evolution of Customer Experience Uni Systems S.M.S.A.
 
Using cloud native development to achieve digital transformation
Using cloud native development to achieve digital transformationUsing cloud native development to achieve digital transformation
Using cloud native development to achieve digital transformationUni Systems S.M.S.A.
 

More from Uni Systems S.M.S.A. (20)

Microsoft Power Platform.pptx
Microsoft Power Platform.pptxMicrosoft Power Platform.pptx
Microsoft Power Platform.pptx
 
Uni Systems for Power Platform.pptx
Uni Systems for Power Platform.pptxUni Systems for Power Platform.pptx
Uni Systems for Power Platform.pptx
 
D365 Demonstration CRM G Aspiotis
D365 Demonstration CRM G AspiotisD365 Demonstration CRM G Aspiotis
D365 Demonstration CRM G Aspiotis
 
AI pitch SSideri
 AI pitch SSideri  AI pitch SSideri
AI pitch SSideri
 
Microsoft Fabric Intro D Koutsanastasis
Microsoft Fabric Intro D KoutsanastasisMicrosoft Fabric Intro D Koutsanastasis
Microsoft Fabric Intro D Koutsanastasis
 
Create Unique Experiences through a CRM Approach St Kontos
Create Unique Experiences through a CRM Approach St Kontos Create Unique Experiences through a CRM Approach St Kontos
Create Unique Experiences through a CRM Approach St Kontos
 
Bridging The Gap D Karystinos
 Bridging The Gap D Karystinos Bridging The Gap D Karystinos
Bridging The Gap D Karystinos
 
Bring your data to the era of AI D. Agagiotis.pdf
Bring your data to the era of AI D. Agagiotis.pdfBring your data to the era of AI D. Agagiotis.pdf
Bring your data to the era of AI D. Agagiotis.pdf
 
How AI Transforms Businesses
How AI Transforms BusinessesHow AI Transforms Businesses
How AI Transforms Businesses
 
Innovative approaches with AI, Data Analytics & CRM
Innovative approaches with AI, Data Analytics & CRMInnovative approaches with AI, Data Analytics & CRM
Innovative approaches with AI, Data Analytics & CRM
 
Medallia VoC in action .pdf
Medallia VoC in action .pdfMedallia VoC in action .pdf
Medallia VoC in action .pdf
 
CX Powered by Uni Systems.pdf
CX Powered by Uni Systems.pdfCX Powered by Uni Systems.pdf
CX Powered by Uni Systems.pdf
 
Change the Business Landscape with Voice of Customer.pdf
Change the Business Landscape with Voice of Customer.pdfChange the Business Landscape with Voice of Customer.pdf
Change the Business Landscape with Voice of Customer.pdf
 
CX Powered by Uni Systems
CX Powered by Uni SystemsCX Powered by Uni Systems
CX Powered by Uni Systems
 
Change the Business Landscape with Voice of Customer
Change the Business Landscape with Voice of CustomerChange the Business Landscape with Voice of Customer
Change the Business Landscape with Voice of Customer
 
Medallia VoC in action
Medallia VoC in actionMedallia VoC in action
Medallia VoC in action
 
The Evolution in Customer Experience: Migration to Cloud for Contact Center
The Evolution in Customer Experience: Migration to Cloud for Contact CenterThe Evolution in Customer Experience: Migration to Cloud for Contact Center
The Evolution in Customer Experience: Migration to Cloud for Contact Center
 
The Evolution of Customer Experience
The Evolution of Customer Experience The Evolution of Customer Experience
The Evolution of Customer Experience
 
Using cloud native development to achieve digital transformation
Using cloud native development to achieve digital transformationUsing cloud native development to achieve digital transformation
Using cloud native development to achieve digital transformation
 
Microsoft: Invent with Purpose
Microsoft: Invent with PurposeMicrosoft: Invent with Purpose
Microsoft: Invent with Purpose
 

Recently uploaded

Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observabilityitnewsafrica
 
All These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDFAll These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDFMichael Gough
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Nikki Chapple
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
Infrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platformsInfrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platformsYoss Cohen
 
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)Mark Simos
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024TopCSSGallery
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#Karmanjay Verma
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Kaya Weers
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesBernd Ruecker
 
Landscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdfLandscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdfAarwolf Industries LLC
 

Recently uploaded (20)

Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
 
All These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDFAll These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDF
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
Infrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platformsInfrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platforms
 
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architectures
 
Landscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdfLandscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdf
 

Ship it 2015 UniSystems: Facilitating Document Management Compliance for the Maritime Industry

  • 1. ShipIT Conference 2015 Facilitating Document Management Compliance in the Maritime Industry Tassos Anagnostopoulos Principal Solutions Architect anagnostopoulost@unisystems.gr Athens, 30 September 2015
  • 2. 50+ years of solid IT experience Uni Systems was founded in 1964. 35+ years of Banking experience. 15+ years of Telecom experience. Lead systems integrator & solutions provider in international market More than 30 international customers including E.C., EU agencies, etc. 480+ specialized business & technology professionals 200 S/W Engineers, 150 System & Support Engineers, 50 Business Consultants 65+ M€ Total Revenues (2014) 52+ M€ Services, & Consulting 11+ M€ EU Institutions, Agencies and International Organisations Uni Systems at a glance
  • 3. Using Greece as its base, Uni Systems is positioned as a key SI player in the emerging SE European, MENA and EU region. A Reference in the European ICT Service Sector  Major ICT Systems Integrator in the domestic market  Key contractor for central EU Institutions & Agencies  Among the top solutions providers in the region of South- Eastern Europe & Turkey  Expand to MENA and GCC countries with targeted solutions 3
  • 4. The Need for Document Management • Average company has 200-300 different types of documents • 80% of enterprise information is unstructured – Source: Fulcrum Research • 90% of unstructured information is unmanaged SOPs video presentations proposals specifications project plans illustrations detailed designs photos web information animation emails research scanned documents forms resumes market requirements product requirements fingerprints letters white papers SOWs contracts POs invoices meeting notesNDA data sheets competitive analysis MRP ERP Order Mgmt. CRM Policy Mgmt. Unstructured Structured
  • 5. Document Management Challenges • Volume of documents growing exponentially • Relevant information is virtually impossible to find • Difficult to control versions in distributed organizations • Becomes increasingly important in disconnected scenarios (e.g. ships) • Policy enforcement is fractured and incomplete
  • 6. Effective Information Governance in the Shipping Industry Support for Audits  Ensure preservation of all required documentation  Facilitate discovery of information both at shore and on ships  Track document access Shipping Industry regulations  Multiple regulations already in effect: Safety (SOLAS) Security (ISPS) Labour (MLC) Environment (MARPOL)  New regulations? Security and Privacy  Protect corporate information  Limit access only to those entitled to it Litigation Readiness  Ability to quickly respond to investigation requests  Be able to prove that no important records have been altered or destroyed Massive information growth  Legislation is driving companies to keep more data, and for longer periods of time  Need for continuous syncing of new content with ships Information Governance Requirements
  • 7. Massive information growth  Legislation is driving companies to keep more data, and for longer periods of time  Need for continuous syncing of new content with ships Effective Information Governance in the Shipping Industry Support for Audits  Ensure preservation of all required documentation  Facilitate discovery of information Shipping Industry regulations  Multiple regulations already in effect: Safety (SOLAS) Security (ISPS) Labour (MLC) Environment (MARPOL)  New regulations? Security and Privacy  Protect corporate information  Limit access only to those entitled to it Litigation Readiness  Ability to quickly respond to investigation requests  Be able to prove that no important records have been altered or destroyed Information Governance Requirements Need for Information Governance leads to increased technical, record-keeping and management requirements Multiple compliance risks and consequences for commercial vessel operators
  • 8. Enterprise Content Management and Compliance Managing the complete content lifecycleManaging the Complete Content Lifecycle Create Review Approve Publish Distribute Retain Dispose Complete Controlled Life Cycle • All important documents and mails stored and tracked by one system, with common security rules and a unified audit trail • Full visibility over the lifetime of the content, ensuring legislation compliance
  • 9. The New Information Governance Technology Stack User experience Compliance Services Enterprise Content Management
  • 10. User experience Intelligent information platform Compliance Services Cloud Information Services Infrastructure The New Information Governance Technology Stack Enterprise Content Management Completely tailored to the user, task, and goal Complete work/ life integration Device-independent for access anywhere Flexible framework for easy and dynamic user interface assembly
  • 11. User Experience Compliance Services Cloud Information Services Infrastructure The New Information Governance Technology Stack Enterprise Content Management User experience Ability to declare documents and mails as official records Retention and Disposition Management Fine-level access control Complete auditing of all user events Support for compliance regulations & standards (SOX, MoReq, etc.)
  • 12. Intelligent information platform Cloud Information Services Infrastructure Enterprise Content Management User Experience The New Information Governance Technology Stack User experience Process management and collaboration as built-in services Unified repository for all content (documents – mails etc.) Distributed architecture allowing replication of content Easy search and discovery Highly flexible platform for rapid application composition and configuration Compliance Services
  • 13. • Recognized as an ECM Leader by Gartner and Forrester • Ensured compliance (DoD 5015.2, SOX, etc.) • Interface with the European Maritime Strategic Framework • Unified Document & Records Management suite EMC Documentum Enterprise Content Management Suite DOCUMENTUM ECM SUITE Delivers a fully integrated, comprehensive information management platform that allows organizations to manage and leverage content in a cost-effective, controlled manner while providing secured access across a distributed organization
  • 14. The EMC Documentum Solution USER EXPERIENCE ENTERPRISE CONTENT MANAGEMENT INTELLIGENT INFORMATION PLATFORM COLLABORATION WORKFLOW ENGINECAPTURE AUDITING SEARCH AND CONTENT ANALYTICS SECURITY AND RIGHTS MANAGEMENT DOCUMENT MANAGEMENT COMPLIANCE SERVICES LIFECYCLE MANAGEMENT RETENTION AND DISPOSITION RECORDS MANAGEMENT SYNC & SHARE FOR OFFLINE AND MOBILE DEVICES COMPOSABLE USER INTERFACE
  • 15. The EMC Documentum Solution USER EXPERIENCE ENTERPRISE CONTENT MANAGEMENT INTELLIGENT INFORMATION PLATFORM COLLABORATION WORKFLOW ENGINECAPTURE AUDITING SEARCH AND CONTENT ANALYTICS SECURITY AND RIGHTS MANAGEMENT DOCUMENT MANAGEMENT COMPLIANCE SERVICES LIFECYCLE MANAGEMENT RETENTION AND DISPOSITION RECORDS MANAGEMENT SYNC & SHARE FOR OFFLINE AND MOBILE DEVICES COMPOSABLE USER INTERFACE DOCUMENTUM RECORDS MANAGER DOCUMENTUM ECM PLATFORM SYNCPLICITY DOCUMENTUM D2
  • 16. Security in the Documentum Platform Content Security  Repository Encryption  Electronic Signatures  Information Rights Management  Mandatory Access Control  Digital Shredding Electronic signatures Digital shredding Single sign-on Authentication Auditing Encryption Information rights
  • 17. The Documentum D2 User Interface Personalized experience based on user role Simplified access to content Easily configurable, no coding needed
  • 18. The Documentum D2 User Interface Personalized experience based on user role Simplified access to content Easily configurable, no coding needed
  • 19. The Documentum D2 User Interface Personalized experience based on user role Simplified access to content Easily configurable, no coding needed
  • 20. The Documentum D2 User Interface Personalized experience based on user role Simplified access to content Easily configurable, no coding needed
  • 21. Offline and Mobile Access – Syncplicity • Provides synchronization with any device, whether inside or outside the firewall • Files can be IRM-encrypted to prevent unauthorized sharing • Fully auditable