SlideShare a Scribd company logo
Homepage : www.net-id.co.kr
Email : netid@net-id.co.kr
Establish an environment for document
management and safety
based on document centralization
Endpoint Security & Document
Management at the same time!
EDMSDRM
DLP
Document
encryption
Data Loss
prevention Anti-Malware
Document
management
NetworkLock
Are you OK? I just bought one^^“ ”
Document Management & Security
by Only One Agent Environment
EDMS
DLP
DRM
Korea’s best
information leakage
prevention solution
Revolutionary
document management
Prevent the leakage of
corporate documents and
customer information
We provide cutting-edge solutions with the best engineers and advanced technological expertise.
Since our establishment, we have strived to multiply sales and secure the highest quality manpower,
and are now one of Korea’s top IT specialist companies.
NetID is a company that develps and supplies frameworks, technologies and
applications for the systematic aggregation, management and sharing of the
information and knowledge owned bt organizations.
Numerous case studies
of Solution usage in large
company and public agencies
Regular operational
training and product
training for customers
Providing you with
the newest technology
and services
Research focused on
R&D technology
Rapid customer
support
Management that aims for
customer satisfaction
Corporate document
management system
with document
centralization
-
ClouDoc
Prevent the
leakage
of corporate
documents
and customer
information
04
Suggest indicators
for business
performance
based on documents
Maintain ownership
over and turn
business documents
into assets
Centralization of
Documents
ClouDoc 0705
Anewsuggestions
CloudDoc licensing method
Respond to compliance needs
Information protection management
system Korean standards
Information protection management
system global standards
Personal information protection
management system Korean standards
Data protection management
systems for car suppliers
ISMS ISO27001 PIMS Automobile
manufacturers ‘H’
Built-type Rental-type Public cloud service
Maintenance fees
Maintenance fees
Maintenance fees
Maintenance fees
Monthly usage fees &
introduction fees
AWS U Cloud
Monthly fees
Monthly fees
Monthly fees
Monthly fees small
businesses
small
businesses
Permanent
license
• 4.2 Information asset classification
and treatment
• 6.1.2 Role division
• 8.1.2 Certificate and encryption
functions
• 8.1.3 Security log functions
• 8.1.4 Permission functions
• 8.2.5 Source program security
• 8.3 External development security
• 9.Password security
• 10.1 External access policy
• 10.2 Permissions management
• 10.3 User certification and
identification
• 10.4 Permission restriction zone
• 11.2.6 Smart work security
• 11.2.9 Backup management
• 11.3.2 Establish and conclude
agreements on data transmission
policies
• 11.4 Media security
• 11.5.1 Malware restrictions
• A.6.2. Mobile devices and remote
tasks
• A.7.2.3 Disciplinary actions
• A.8.2 Data classification
• A.8.3 Media management
• A.9.1 Requirements for permission
restrictions
• A.9.2 User access management
• A.9.3 User responsibility
• A.9.4 System and application access
permissions
• A.10 Encryption
• A.12.2 Protection from malware
programs
• A.12.3 Backups
• A.12.4 Evidence logs and monitoring
of events
• A.13.1 Network security management
• A.13.2 Data transmissions
• A.14.2 Development and support
procedure security
• A.18.2.3 Protection of documented
data
• A.18.2.4 Protection of personal
information
• 4.1.1 Putting effective protection
measures into practice
• 7.1.1 Establish permission restriction
policy
• 7.1.2 Register personal information
handler
• 7.1.3 Manage personal information
handler permissions
• 7.1.4 Manage user passwords
• 7.1.5 Review personal information
handler permissions
• 7.1.7 Network access
• 7.1.9 Application program access
• 7.2.1 Password policy
• 7.2.2 Use password
• 7.2.3 Key management
• 7.3.5 Internet access management
• 7.3.7 Media issuance and storage
• 7.3.8 Discard media
• 7.3.9 Restrict malware programs
• 7.3.10 Portable computing
• 7.3.11 Working remotely
• 4. Classify data assets and management
history
• 13. Prevent leakage of operating secrets
• 14. Security-level specific usage, storage,
transfer, and disuse
• 22. Installation and usage indicators of
security soltions
• 23. Security management of former employees
• 26. Internal security review/conduct audits
• 6. Password creation requirements
• 1. Block unnecessary network connections
• 19. Certification, individual and password
encryption
• 25. Applying encryption
• 26. Restrictions on mobile storage devices
• 27. Protection measures for important files
• 28. Restrictions on transmission of large files
• 31. Server access restrictions
• 37. Enforcement of password creation
requirements
• 38. Maintain logs for server access and use
• 42. Restrictions on IT-related external
employees
• 44. System performance and storage
management
ClouDoc
06
ClouDoc
CAD
PSD
OutsideInside
Effectofintroduction
A new concept
corporatedocument
management
system
prevent the leak of
corporate documents and
customer information
As work documents are managed in the safe-
zone by ClouDoc, you can prevent data leakage
even when notebook computers are taken off-
site or lost. In addition, if secured disks are
connected to another PC outside of the safe-
zone, the files cannot be opened.
www.net-id.co.kr
ClouDoc 07
Suggest work
utilization indicators
based on documents
Transform workdocuments
into corporate assets
and enhance ownership
Includes a restore function. Even if documents
are intentionally deleted, centralized documents
prevent losses due to employees leaving the
company or transferring to a different depart-
ment. All document storage must be central-
ized to improve document management and
for efficient workflow.
Executives and the CEO can open work files
for all employees using Windows Explorer.
Additionally, statistical data for different types
of documents, current status of membership,
usage and other statistical data can be utilized.
08
DMZZONE
External document
exchange server
Proxy server
Push server
NewNew
External
organizations
Aworkenvironmentbasedon
documentcentralization
with enhanced support for mobile environments
ClouDocfunctionstructure
Providesamobile
workenvironment
ClouDoc
OperationServer
Outside Inside
www.net-id.co.kr
09ClouDoc
Productfeature
Unlike competitor products which use restrictions based on file names or appli-
cation names, ClouDoc uses hash value-based disk IO restrictions to make policy
violations difficult.
Based on hash
values prohibited
Standard methods
VS. non-standard
methods
Protects not only CAD drawings and office documents but also designs, videos,
music, and source code. Non-standard methods use applications with limited
compatability and require additional development for use across different systems.
ClouDoc provides a standard method using standard drives , taking into account the
disadvantages of non-standard methods.
Possible to avoid policy restrictions just
by changing the file extension or name
as restrictions are based on file extension
or application name.
Cannot override restrictions using name
changes because policies are based on
application hash values
Competitorproducts ClouDoc
2b3sa
Ga5ad
3fdDq
2b3sa
Ga5ad
3fdDq
Powerpoint.exe Powerpt.exe Powerpoint.exe Powerpt.exe
CATIA
AUTO CAD SolidWorks
ProENGINEER
Micro Office
Excel
Micro Office
Word
Micro Office
Power Point
ex) CAD drawing, design project ...
Diverse
document
Requiring consideration of problems in Hooking/Exclusive
search engine/Window shell(non-standard system)
Product feature
Document management function
External document exchange server
Document security function
NetworkLock
ClouDoc Backup
Customers
APP with no hooking
development
APP with hooking
development
C Local Disk
C Local Disk C Local Disk
Server Storage
NetID's Document Centralization SolutionPRODUCT FUNCTION
10 www.net-id.co.kr
Documentmanagementfunction
Windows Explorer/
mobile/web/Java
Explorer included
ClouDoc provides a UI based on Windows Explorer for user convenience.
.
User
WindowsExplorer (ClouDoc PC Client)
Personaldrive(X:)
An individual drive, possible to share one's files with other people
Teamdrive(Y:)
A storagespaceforworkdoneby individual teams and departments.
Folder list and access rights can be set according to permissions
Sharedrive(Z:)
A list of folders on a drive shared with other people or departments.
Onlinesecuredisk(E:)
Use local secure storage when creating large-sized files or when
smooth compression test the limits of central document storage
capacity
Offlinesecuredisk(F:)
Stored locally temporarily in the event of a network outage
Centralized
document
storage
Secure
disk
Export secure disk (G:)
A secure disk for files whose export has been approved
business trip
log-in
MobileExplorer WebExplorer
Mac-specificfilesystem
JavaExplorer
PC backup
ClouDoc
OperationServer
ClouDocBackup
Reserved backup
Differentiated backup
Restoration and logs
Product feature
Document management function
External document exchange server
Document security function
NetworkLock
ClouDoc Backup
Customers
OO Company
TIP
Safety management division
Safety planning team
Strategy establishment
Weekly reports2016
201601
20160205
20160212
201602
Shared with team
Safety management division
Safety planning team
Strategy establishment
Downloads
Common work
Downloads
Common work
Downloads
Common work
Shared with division
Shared with company
ex)
OO Company
11ClouDoc
Setting permissions
for the department
document storage
folder
Permissions for the ability to open folders may be set differently within the same
organization based on rank.
Utilize department
document storage
Types of permissions
View folder list
Create folders Delete and
delete sub
Team
Tilte
Marketing
team
General
Manager
Person
ex) John Doe
Marketing team
Sales team
Server team
HR team
CEO
Exhibit
Publicize
Share
Plan
Marketing team
manager
Marketing team
memberex)
ex)
Example application: it is only possible to open
folders a user has access permissions for
Folder access permissions depent on rank
within the organization and department
Target
permissions
Read/Write/edit
Document classification system and setting permissions Confidential document management
A CEO (Team manager)
B Staff member (Team document manager)
C Manager (Team member)
D General manager (Team manager)
E Staff member (Team document manager)
F Manager (Team member)
G Team manager (Team manager)
H Staff member (Team document manager)
I Assistant Manager (Team member)
Team manager/
team document manager function
Folder-specific storage limits, set permissions,
access log verification, current status of storage
limits, current status of permission settings.
Security Document
Manage number
of people with access
Export approval
Company/department document storage folders can be classified and defined to
enable to management of confidential documents.
Marketing team
Work
Publicize
Marketing team
Foldermanager
2 Designate
foldermanager
Documentutilizationtip
1 Designate
aspecialfolder
The'folder manager' isable to manage
thenumberofpeopleofhaveaccessand
approveexport.
3
12
Documentversion
management
Just saving office documents after editing allows storage and version management
of prior versions. This can help prevent data loss from overwriting user documents
or when documents are not saved completely.
Automatic check in/
checkout
To prevent redundant copies of files from being saved when working together,
a check in/checkout function is provided. The current file user may be verified
and usage permissions may be denied from the file properties window.
Ai
XPW
P P
P
Ps
Supportable application
A BA A
XP
MS WORD MS POWER
POINT
MS EXCEL
MS WORD
4. Document recovery
2. Store previous
documents
Original
documents Old version
1. Store after
document edition
3. Request document
recovery
MS POWER
POINT
MS EXCEL
AUTO CAD PHOTOSHOP ILLUSTRATOR
HANGUL
ACROBAT
X PRO
AUTO CAD SOLID
EDGE
SOLID
WORKS
W
1. Edit document 2. Read only
4. Ability to deny usage permissions
3. Ability to see which user is currently using a file
NetID's Document Centralization SolutionPRODUCT FUNCTION
www.net-id.co.kr
A
Supportable application
Version management including
Office, and CAD documents
Document double storage
prevention during joint work
13ClouDoc
Sharing documents
with employees
Centralized document storage allows documents to be shared with other users via a
variety of different ways. Documents can even be shared with users who do not have
ClouDoc accounts.
Search functions Windows Explorer may be used to search for file names provided by ClouDoc. Additionally
keyword management and analytics features as well as searches are provided when
ClouDoc is connected to a specialist search engine
KEY
WORD
When connected to a specialist search engine,
provides search function within Windows Explorer
Search within documents and
manage keywords and analytics
Searchinsidefiles/keyword
managementandanalyticsfeatures
KEY
WORD
Searchforfilenamesfrom
WindowsExplorer
ClouDoc provides its own search function
Although Windows Explorer provides basic file name
searches, there is a risk of overloading servers.
John Doe
Design team (design_guest)
download
upload
Exhibit
Plan
Weekly report
Marketing
201601
Marketing team
Exhibit
GEUST
Share
Plan
(design_guest )
Pubilcize
download
upload
Beakmanwon (mwbeak) Chunmanwon (mwchun)
Departments withot
document centralization
Departments with document centralization ClouDoc sharing functions
UNC Copy
(secure) link mail,
(secure) web link copy
Folder Sharing
Share Drive (Z:) Personal Drive (X:) Team Drive (Y:)
(Secure) link mail,
(secure) web link copy
UNC Copy
Share the link to a file using company/depart-
ment document storage via a drive name for
rapid collaboration. However, this feature is not
available for individual document storage and
can only be used by employees with accounts.
Folder sharing
Share folder links to provide access to specific
folders to other users without permissions.
However, this feature can only be used by em-
ployees with accounts.
(Secure) link mail, (secure) web link copy
Share links to a file among employees without
access to a folder. If a weblink is pasted into Out-
look, a list of file appears in an organized table.
Guest ID
Provides temporary IDs for continued colla-
boration with external users who do not have
accounts.
Design team
WorkChunmanwon(mwchun)
Marketing
Exhibit
Plan
Product feature
Document management function
External document exchange server
Document security function
NetworkLock
ClouDoc Backup
Customers
14
Realtimedocument
eventalarms
When an event occurs in relation to use of department/individual document storage
(read/write/delete/rename/move/copy), you may receive notifications of the action.
However, this may depend on administrator settings related to document storage
folder or type of event.
Exchangedocuments
withbusinesspartners
provision of a safe environment to send and receive documents with the external
document exchange server
External document exchange server
Status of event notification
settings for user
Select event notification
document storage folder
New
Team Drive
Personal Drive
Read Write Delete
Rename Move Copy
Personal Drive (Z:)
Team Drive(Y:)
1 2 3Read/write/delete/rename/move
/copy or similar event occurs
Depending on the setup of the
customer's system, an email or
push server alert may be used
You can select the types of events and the document
storage folders for which you wish to receive notifications Read/Write/Delete
An email or push event notifi-
cation will be sent to a user with
access permissions
PushServer
Select event notification document storage folder Necessary permissions for an
event notification recepient
Select type of event
DMZ ZONE
2
2
The office
central server
Approval
document
copy
Upload
document
copy
4
1 Guest ID Upload
Download/ download certificate email, ID/
password certification
1
3
Sending out interneal document and
requesting for approval.
Copying of the sent out documents
and history management.
Weblink,
Link mail
Request for approval
for sending out
External agencies
External document
Exchange server
NetID's Document Centralization SolutionPRODUCT FUNCTION
www.net-id.co.kr
15ClouDoc
Windows PC
security functions
ClouDoc provides a range of Windows PC security functions to enable the management
of documents safely within the scope of the secure zone
Personal drive (X:)
Team drive (Y:)
Share Drive (Z:)
Online secure disk (E:)
Offline secure disk (F:)
export secure disk (G:)
Printing Export
preventation
Prevent exposure through
on/offline media
Storage prevention/
export prevention
(DiskLock, DiskLock Plus)
Local Drive (C:,D:..)
Print control,
print log,
print watermark
Prevent
screenshots,
& clipboard copy
Prevent usage of regular zone
Safe Zone
NetworkLock
(network separation)
IEexemptionpolicies
Block document moving/
copying within safe zone
Prevent data leakage
through Temp folder path
The first file upload policy
C: Users ~  Temp
C: Users ~  Temp
C: Temp
C: programdata ~Temp
Enhanced security functions Networkrestrictions
block drag and drop be-
tween drives (including
USB drives) as well as
copy/paste.
prevent malware from
being introduced and block
harmful sites network
separation function
Active-X for Groupware
and banking applications
provide a separate
security policy for the
Temp folder path
encourage users to upload files
to the ClouDoc document storage
system for a specified amount of
time using the 'File collection disk'
within the local safe zone for local
documents when first installed
Document security function
Product feature
Document management function
External document exchange server
Document security function
NetworkLock
ClouDoc Backup
Customers
16
Exportingdocuments If the ClouDoc DiskLock policy is used, copying and moving files on local disks is prohibited
in addition to the attachment of files to webmail, Outlook, and SNS. A separate approval
process is necessary for files to be exported.e ClouDoc DiskLock policy is used, copying and
moving files on local disks is prohibited in addition to the attachment of files to webmail,
Outlook, and SNS. A separate approval process is necessary for files to be exported.
Ransomware
infectionresponse
ClouDoc not only blocks regular ransomware but also provides a response mechanism to
block ransomware infection from PDF documents and Windows Explorer.
* Saves a copy of the
file to be exported
Export
secure disk
ClouDoc
Server
1. Files cannot
be exported
without approval
• Network
Local disk
Portable disk
USB
•
•
•
• ….
User
•
•
•
Approval management function
Export storage restrictions
Export timeframe
Preapproval/postapproval setting
5. Export
Online
Offline
File, folder export approval process
approval
permission manager
Self protection function based on a White List
Specified apps and uninfected Windows Explorer
: read/write allowed
Non-specified apps and infected Windows Explorer
: read/write prohibited
Programs/Windows
shell extension DLLs
White List
SafeZone scope protection
?
.EXE
…
Program
Not approved
Approved
Response mechanism
for each route of
ransomware infection
Malware
?
.EXE
Infected
Windows
Explorer
Uninfected
Windows
Explorer
Ransomware
Block standard normal program
ransomware infection
Block ransomware based on
Adobe PDF/ Flash Player
DLL Lock: block input/output
operations by ransomware of
an infected Windows Explorer
2. Request
file export
approval
3. Approve/reject
export request
4. Only allow export
of approved folders
Types of approval
permission manager
Team/team document managers
Folder managers
•
•
Central document
storage
PC secure disk
NetID's Document Centralization SolutionPRODUCT FUNCTION
www.net-id.co.kr
17ClouDoc
Business partner
Free~
Log in
Apply policy
List of file access log / Prohibit printing / Prohibit online attached/
Prohibit Clipboard copying /prohibit local saveing /...
Policy application history
History of PC policy applications
Policy modification history
Policy-specific information
Monitoring Managers can monitor the usage of ClouDoc by users and managers as follows.
Document security
for business partners
and telecommuters
The exact same environmental that is supplied for existing employees can be provided for
business partners as it pertains to external DRM. Unlike existing external DRM, no important
documents or floorplans are sent to business partners while sufficient management is provided
internally for document use history user permissions.
DMZZONE
Proxy
server
The office
central server
Administrator
Allow all applications
Allowed applications
White List
Installation status
Deletion log
Normal log
Verify policy history applied to
users and departments
Verify policy hisallows for verification of users and
departments to whom current policy is applied
verify current status of policy
History of modifications to specified policy
Verify extension history of policies on user PCs
Current status of current policy setting
Current status of PC policy application
• MAC address
• OS version
• User account
• Date
• IP address
• Computer name
• user IP
• Request time
• Reason for deletion
• Work time
• Permission settings log
• Link copy log, link mail log
• File access log
• File export log
• Print log
• Member information log
(verification/creation/modification/deletion)
• Policy application date
• policy name
• targeted information
• ID of user who applied policy
• Create • Modify
• Delete • Rename
• Most recent PC policy extension
• Extension history
• Access IP restrictions
• Manage ID, PWD access
• Department/user
• Policy settings
• DiskLock
• Document export
• Smartphone control
• Screenshot
• Clipboard copy control
• Print watermark
• Print control
• Print log
Verify current status of policy
application for specific user PCs
• Business partner account/
policy management
• Business partner allowed
applications restrictions
• Business partner log
management
Before
login
After
login
Reboot
Disable policy
• Storage
• Screenshots
• Printing
• Clipboard
• File sending
Prohibit
Product feature
Document management function
External document exchange server
Document security function
NetworkLock
ClouDoc Backup
Customers
18
2016.1.1 2016.1.2
365
Networkseparation This method allows for an internal and external network mode on the same PC. The disadvan-
tages of previous physically separated network methods such as SBC and CBC are improved upon.
One-stop service with
an Cloudoc backup solution
Maintain entire folder
structure with incremental
backups on desired dates
Store full daily backups for
full folder storage backup
on a desired timeframe
Allows for backup and restoration as
a response to ransomware infection
guarantees safety of ClouDoc server
Allows for hourly/daily/weekly/
monthly backup schedule settings
based on company schedule
Provide a response using
a daily full folder structure
backup when infected with
ransomware
Stores only one copy of identi-
calfiles regardless of different
file dates
Manage storage space by auto-
matically deleting files past their
storage maturity date
Centralized corporate monitoring
of current status of performance
and backups with statistical data
Provides an autonomous firewall,
performance monitoring features
for stable operation
ClouDocBackup ClouDoc offers snapshot backups, incremental backups, automatic schedule manage-
ment, monitoring of current status of performance and backup functions.
ClouDoc Backup
NetworkLock
ClouDoc document storage
Network allowed
Groupware/ERP
ExternalnetworkmodeInternalnetworkmode
Network blocked
Groupware/ERP
• Any traffic to unknown IP addresses or
Domains will be blocked.
• You may add IP range or domains
that will be allowed.
• You may add IP ranges that will be
blocked.
• All traffic to all addresses and Domains
will be allowed.
• Cannot be used
• Cannot access ClouDoc disk
• However, access is provided to export
secure disk (read/write access)
• Allowed usage
Switch to
external network
• Remove clipboard
• Remove temporary files
• Close applications used
for work documents
Exchange document
between networks
Export secure disk (F:)
Export
approved
External
use
Work
applied Download
ClouDoc document storage
NetID's Document Centralization SolutionPRODUCT FUNCTION
www.net-id.co.kr
• Allowed usage
Customers
19ClouDoc
Reference
growth rate
The following is the list of clients with over 500 executives and staff where the product
has been introduced as a solution.
Major client
companies
ClouDoc continues to be supplied to major corporations, public corporations, manufactu-
rers, distributors, pharmaceutical companies, IT, medical services, marketing, energy,
and chemical companies across all industries. Customers feel that the product is capable
of protecting a wide range of data and information.
Total number of client companies
Supplied
50 firms
in 2015
3,000 users 2,000 users5,000 users 1,000 users 1,000 users1,600 users
1,800 users 400 users1,000 users
1,000 users 500 users5500 users
500 users 500 usersSchool members
600 users 300 users500 users
55 users 100 users100 users 2,000 users 40 user
( + 40 casual user)1,200 users
500 users 440 users500 users
Product feature
Document management function
External document exchange server
Document security function
NetworkLock
ClouDoc Backup
Customers
SNS media
Hopepage ww.net-id.co.kr
Facebook www.facebook.com/cloudoc.netid
Youtube www.youtube.com/coreajazz2
Linkedin www.linkedin.com/pub/sang-yoo/22/a27/747
Slideshare www.slideshare.net/coreajazz
Google blog(English) mycloudoc.blogspot.kr/
Google blog (Japanese) cloudocjapan.blogspot.jp/
Naver blog (Korean) blog.naver.com/coreajazz
Weibo blog (Chinese) weibo.com/ClouDoc
Document Centralization Solution

More Related Content

What's hot

How can maximize your storage capabilities by using IBM backup & restore solu...
How can maximize your storage capabilities by using IBM backup & restore solu...How can maximize your storage capabilities by using IBM backup & restore solu...
How can maximize your storage capabilities by using IBM backup & restore solu...
Agora Group
 
Bit Level Preservation
Bit Level PreservationBit Level Preservation
Bit Level Preservation
Micah Altman
 
Identity-Based Distributed Provable Data Possession in Multicloud Storage
Identity-Based Distributed Provable Data Possession in Multicloud StorageIdentity-Based Distributed Provable Data Possession in Multicloud Storage
Identity-Based Distributed Provable Data Possession in Multicloud Storage
1crore projects
 
ShareDocs Enterpriser - Comprehensive Document Management Solution
ShareDocs Enterpriser - Comprehensive Document Management SolutionShareDocs Enterpriser - Comprehensive Document Management Solution
ShareDocs Enterpriser - Comprehensive Document Management Solution
Mahendra Kulkarni
 
LogicalDOC White Paper
LogicalDOC White PaperLogicalDOC White Paper
LogicalDOC White Paper
LogicalDOC
 
New Solutions for Security and Compliance in the Cloud
New Solutions for Security and Compliance in the CloudNew Solutions for Security and Compliance in the Cloud
New Solutions for Security and Compliance in the Cloud
Online Tech
 
Microsoft Windows Azure - VeriSign Manufacturing Help Customers Create Infras...
Microsoft Windows Azure - VeriSign Manufacturing Help Customers Create Infras...Microsoft Windows Azure - VeriSign Manufacturing Help Customers Create Infras...
Microsoft Windows Azure - VeriSign Manufacturing Help Customers Create Infras...Microsoft Private Cloud
 
Spir It Windows 7 Migration Match
Spir It Windows 7 Migration MatchSpir It Windows 7 Migration Match
Spir It Windows 7 Migration MatchMartin de Smit
 
WatchDox CDCR CaseStudy Dec2014
WatchDox CDCR CaseStudy Dec2014WatchDox CDCR CaseStudy Dec2014
WatchDox CDCR CaseStudy Dec2014joepanora
 
The Value of Memory-Dense Servers IBMs System x MAX5 for Its eX5 Server Family
The Value of Memory-Dense Servers IBMs System x MAX5 for Its eX5 Server FamilyThe Value of Memory-Dense Servers IBMs System x MAX5 for Its eX5 Server Family
The Value of Memory-Dense Servers IBMs System x MAX5 for Its eX5 Server Family
IBM India Smarter Computing
 
Citrix Virtual Desktop Handbook
Citrix Virtual Desktop HandbookCitrix Virtual Desktop Handbook
Citrix Virtual Desktop Handbook
Nuno Alves
 
Remote Access Outgoing VDI Gateway
Remote Access Outgoing VDI GatewayRemote Access Outgoing VDI Gateway
Remote Access Outgoing VDI Gateway
ObserveIT
 
Document management
Document managementDocument management
Document management
garciathomasbic
 
[Case Study ~ 2011] Baptist Hospitals of Southest Texas
[Case Study ~ 2011] Baptist Hospitals of Southest Texas[Case Study ~ 2011] Baptist Hospitals of Southest Texas
[Case Study ~ 2011] Baptist Hospitals of Southest Texas
Trend Micro
 
Data Protection Fde Solution Presentation
Data Protection Fde Solution PresentationData Protection Fde Solution Presentation
Data Protection Fde Solution Presentationjuniortstanley
 
Brochure content guardian_en
Brochure content guardian_enBrochure content guardian_en
Brochure content guardian_enDexon Software
 
Challenges and Proposed Solutions for Cloud Forensic
Challenges and Proposed Solutions for Cloud ForensicChallenges and Proposed Solutions for Cloud Forensic
Challenges and Proposed Solutions for Cloud Forensic
IJERA Editor
 
Vmware View VDI 2012
Vmware View VDI 2012Vmware View VDI 2012
Vmware View VDI 2012
blatrobe
 

What's hot (20)

Capstone Official (1)
Capstone Official (1)Capstone Official (1)
Capstone Official (1)
 
How can maximize your storage capabilities by using IBM backup & restore solu...
How can maximize your storage capabilities by using IBM backup & restore solu...How can maximize your storage capabilities by using IBM backup & restore solu...
How can maximize your storage capabilities by using IBM backup & restore solu...
 
Bit Level Preservation
Bit Level PreservationBit Level Preservation
Bit Level Preservation
 
Identity-Based Distributed Provable Data Possession in Multicloud Storage
Identity-Based Distributed Provable Data Possession in Multicloud StorageIdentity-Based Distributed Provable Data Possession in Multicloud Storage
Identity-Based Distributed Provable Data Possession in Multicloud Storage
 
ShareDocs Enterpriser - Comprehensive Document Management Solution
ShareDocs Enterpriser - Comprehensive Document Management SolutionShareDocs Enterpriser - Comprehensive Document Management Solution
ShareDocs Enterpriser - Comprehensive Document Management Solution
 
LogicalDOC White Paper
LogicalDOC White PaperLogicalDOC White Paper
LogicalDOC White Paper
 
New Solutions for Security and Compliance in the Cloud
New Solutions for Security and Compliance in the CloudNew Solutions for Security and Compliance in the Cloud
New Solutions for Security and Compliance in the Cloud
 
Microsoft Windows Azure - VeriSign Manufacturing Help Customers Create Infras...
Microsoft Windows Azure - VeriSign Manufacturing Help Customers Create Infras...Microsoft Windows Azure - VeriSign Manufacturing Help Customers Create Infras...
Microsoft Windows Azure - VeriSign Manufacturing Help Customers Create Infras...
 
Spir It Windows 7 Migration Match
Spir It Windows 7 Migration MatchSpir It Windows 7 Migration Match
Spir It Windows 7 Migration Match
 
WatchDox CDCR CaseStudy Dec2014
WatchDox CDCR CaseStudy Dec2014WatchDox CDCR CaseStudy Dec2014
WatchDox CDCR CaseStudy Dec2014
 
The Value of Memory-Dense Servers IBMs System x MAX5 for Its eX5 Server Family
The Value of Memory-Dense Servers IBMs System x MAX5 for Its eX5 Server FamilyThe Value of Memory-Dense Servers IBMs System x MAX5 for Its eX5 Server Family
The Value of Memory-Dense Servers IBMs System x MAX5 for Its eX5 Server Family
 
Citrix Virtual Desktop Handbook
Citrix Virtual Desktop HandbookCitrix Virtual Desktop Handbook
Citrix Virtual Desktop Handbook
 
Remote Access Outgoing VDI Gateway
Remote Access Outgoing VDI GatewayRemote Access Outgoing VDI Gateway
Remote Access Outgoing VDI Gateway
 
Document management
Document managementDocument management
Document management
 
IT__forum_11
IT__forum_11IT__forum_11
IT__forum_11
 
[Case Study ~ 2011] Baptist Hospitals of Southest Texas
[Case Study ~ 2011] Baptist Hospitals of Southest Texas[Case Study ~ 2011] Baptist Hospitals of Southest Texas
[Case Study ~ 2011] Baptist Hospitals of Southest Texas
 
Data Protection Fde Solution Presentation
Data Protection Fde Solution PresentationData Protection Fde Solution Presentation
Data Protection Fde Solution Presentation
 
Brochure content guardian_en
Brochure content guardian_enBrochure content guardian_en
Brochure content guardian_en
 
Challenges and Proposed Solutions for Cloud Forensic
Challenges and Proposed Solutions for Cloud ForensicChallenges and Proposed Solutions for Cloud Forensic
Challenges and Proposed Solutions for Cloud Forensic
 
Vmware View VDI 2012
Vmware View VDI 2012Vmware View VDI 2012
Vmware View VDI 2012
 

Similar to ClouDoc brochure_eng_20160708

Clou doc brochure_eng_20150406(전자메일첨부용)
Clou doc brochure_eng_20150406(전자메일첨부용)Clou doc brochure_eng_20150406(전자메일첨부용)
Clou doc brochure_eng_20150406(전자메일첨부용)
sang yoo
 
Why ClouDoc to protect CAD files?
Why ClouDoc to protect CAD files? Why ClouDoc to protect CAD files?
Why ClouDoc to protect CAD files?
Sang Yoo
 
Clou doc intro_eng_20160524
Clou doc intro_eng_20160524Clou doc intro_eng_20160524
Clou doc intro_eng_20160524
sang yoo
 
Cloudoc brochure eng_20170823
Cloudoc brochure eng_20170823Cloudoc brochure eng_20170823
Cloudoc brochure eng_20170823
sang yoo
 
ArchivePod a legacy data solution when migrating to the #CLOUD
ArchivePod a legacy data solution when migrating to the #CLOUDArchivePod a legacy data solution when migrating to the #CLOUD
ArchivePod a legacy data solution when migrating to the #CLOUD
Garet Keller
 
DG_Architecture_Training.pptx
DG_Architecture_Training.pptxDG_Architecture_Training.pptx
DG_Architecture_Training.pptx
TranVu383073
 
dinCloud Hosted Virtual Desktop
dinCloud Hosted Virtual DesktopdinCloud Hosted Virtual Desktop
dinCloud Hosted Virtual Desktop
dinCloud Inc.
 
Cloud Service Brief - dinCloud Hosted Virtual Desktop
Cloud Service Brief - dinCloud Hosted Virtual DesktopCloud Service Brief - dinCloud Hosted Virtual Desktop
Cloud Service Brief - dinCloud Hosted Virtual Desktop
dinCloud Inc.
 
Group 4
Group 4Group 4
Group 4
liujiaxuan
 
Group 4
Group 4Group 4
Group 4
liujiaxuan
 
I doc on cloud
I doc on cloudI doc on cloud
Cloud docu ppt
Cloud docu pptCloud docu ppt
Cloud Computing Architecture: Components, Importance, and Tips
Cloud Computing Architecture: Components, Importance, and TipsCloud Computing Architecture: Components, Importance, and Tips
Cloud Computing Architecture: Components, Importance, and Tips
Fibonalabs
 
Value Stories - 7th Issue
Value Stories - 7th Issue Value Stories - 7th Issue
Value Stories - 7th Issue
Redington Value Distribution
 
Why ClouDoc to protect CAD files?
Why ClouDoc to protect CAD files? Why ClouDoc to protect CAD files?
Why ClouDoc to protect CAD files?
Sang Yoo
 
Cloudciti Enterprise File Share Services
Cloudciti Enterprise File Share ServicesCloudciti Enterprise File Share Services
Cloudciti Enterprise File Share Services
PT Datacomm Diangraha
 
Glasswall - Safety and Integrity Through Trusted Files
Glasswall - Safety and Integrity Through Trusted FilesGlasswall - Safety and Integrity Through Trusted Files
Glasswall - Safety and Integrity Through Trusted Files
Dinis Cruz
 
Cloud computing and its security issues
Cloud computing and its security issuesCloud computing and its security issues
Cloud computing and its security issues
Jyoti Srivastava
 
Scanning To Cloud Presentation
Scanning To Cloud PresentationScanning To Cloud Presentation
Scanning To Cloud Presentation
guest3a3ab
 

Similar to ClouDoc brochure_eng_20160708 (20)

Clou doc brochure_eng_20150406(전자메일첨부용)
Clou doc brochure_eng_20150406(전자메일첨부용)Clou doc brochure_eng_20150406(전자메일첨부용)
Clou doc brochure_eng_20150406(전자메일첨부용)
 
Why ClouDoc to protect CAD files?
Why ClouDoc to protect CAD files? Why ClouDoc to protect CAD files?
Why ClouDoc to protect CAD files?
 
Clou doc intro_eng_20160524
Clou doc intro_eng_20160524Clou doc intro_eng_20160524
Clou doc intro_eng_20160524
 
Cloudoc brochure eng_20170823
Cloudoc brochure eng_20170823Cloudoc brochure eng_20170823
Cloudoc brochure eng_20170823
 
ArchivePod a legacy data solution when migrating to the #CLOUD
ArchivePod a legacy data solution when migrating to the #CLOUDArchivePod a legacy data solution when migrating to the #CLOUD
ArchivePod a legacy data solution when migrating to the #CLOUD
 
DG_Architecture_Training.pptx
DG_Architecture_Training.pptxDG_Architecture_Training.pptx
DG_Architecture_Training.pptx
 
dinCloud Hosted Virtual Desktop
dinCloud Hosted Virtual DesktopdinCloud Hosted Virtual Desktop
dinCloud Hosted Virtual Desktop
 
Cloud Service Brief - dinCloud Hosted Virtual Desktop
Cloud Service Brief - dinCloud Hosted Virtual DesktopCloud Service Brief - dinCloud Hosted Virtual Desktop
Cloud Service Brief - dinCloud Hosted Virtual Desktop
 
Group 4
Group 4Group 4
Group 4
 
Group 4
Group 4Group 4
Group 4
 
I doc on cloud
I doc on cloudI doc on cloud
I doc on cloud
 
Murali_CV
Murali_CVMurali_CV
Murali_CV
 
Cloud docu ppt
Cloud docu pptCloud docu ppt
Cloud docu ppt
 
Cloud Computing Architecture: Components, Importance, and Tips
Cloud Computing Architecture: Components, Importance, and TipsCloud Computing Architecture: Components, Importance, and Tips
Cloud Computing Architecture: Components, Importance, and Tips
 
Value Stories - 7th Issue
Value Stories - 7th Issue Value Stories - 7th Issue
Value Stories - 7th Issue
 
Why ClouDoc to protect CAD files?
Why ClouDoc to protect CAD files? Why ClouDoc to protect CAD files?
Why ClouDoc to protect CAD files?
 
Cloudciti Enterprise File Share Services
Cloudciti Enterprise File Share ServicesCloudciti Enterprise File Share Services
Cloudciti Enterprise File Share Services
 
Glasswall - Safety and Integrity Through Trusted Files
Glasswall - Safety and Integrity Through Trusted FilesGlasswall - Safety and Integrity Through Trusted Files
Glasswall - Safety and Integrity Through Trusted Files
 
Cloud computing and its security issues
Cloud computing and its security issuesCloud computing and its security issues
Cloud computing and its security issues
 
Scanning To Cloud Presentation
Scanning To Cloud PresentationScanning To Cloud Presentation
Scanning To Cloud Presentation
 

More from sang yoo

Mcloudoc based telework_jpn_200226
Mcloudoc based telework_jpn_200226Mcloudoc based telework_jpn_200226
Mcloudoc based telework_jpn_200226
sang yoo
 
Mcloudoc based telework_chn_200226
Mcloudoc based telework_chn_200226Mcloudoc based telework_chn_200226
Mcloudoc based telework_chn_200226
sang yoo
 
Mcloudoc based telework_eng_200226
Mcloudoc based telework_eng_200226Mcloudoc based telework_eng_200226
Mcloudoc based telework_eng_200226
sang yoo
 
Mcloudoc based telework_kor_200226
Mcloudoc based telework_kor_200226Mcloudoc based telework_kor_200226
Mcloudoc based telework_kor_200226
sang yoo
 
Mcloudoc intro kor_20200519
Mcloudoc intro kor_20200519Mcloudoc intro kor_20200519
Mcloudoc intro kor_20200519
sang yoo
 
mcloudoc brochure eng
mcloudoc brochure engmcloudoc brochure eng
mcloudoc brochure eng
sang yoo
 
mcloudoc based telework_chn_20190823
mcloudoc based telework_chn_20190823mcloudoc based telework_chn_20190823
mcloudoc based telework_chn_20190823
sang yoo
 
mcloudoc brochure chn
mcloudoc brochure chnmcloudoc brochure chn
mcloudoc brochure chn
sang yoo
 
mcloudoc brochure jpn
mcloudoc brochure jpnmcloudoc brochure jpn
mcloudoc brochure jpn
sang yoo
 
mcloudoc brochure kor
mcloudoc brochure kormcloudoc brochure kor
mcloudoc brochure kor
sang yoo
 
Clou doc backupdoc_intro_chn_20191111
Clou doc backupdoc_intro_chn_20191111Clou doc backupdoc_intro_chn_20191111
Clou doc backupdoc_intro_chn_20191111
sang yoo
 
Clou doc backupdoc_intro_jpn_20191112
Clou doc backupdoc_intro_jpn_20191112Clou doc backupdoc_intro_jpn_20191112
Clou doc backupdoc_intro_jpn_20191112
sang yoo
 
Clou doc backupdoc_intro_kor_20191111
Clou doc backupdoc_intro_kor_20191111Clou doc backupdoc_intro_kor_20191111
Clou doc backupdoc_intro_kor_20191111
sang yoo
 
Telework leaflet eng
Telework leaflet engTelework leaflet eng
Telework leaflet eng
sang yoo
 
Telework leaflet jpn
Telework leaflet jpnTelework leaflet jpn
Telework leaflet jpn
sang yoo
 
Telework leaflet chn
Telework leaflet chnTelework leaflet chn
Telework leaflet chn
sang yoo
 
mcloudoc telework leaflet_kor
mcloudoc telework leaflet_kormcloudoc telework leaflet_kor
mcloudoc telework leaflet_kor
sang yoo
 
Mcloudoc ransomware leaflet_jpn
Mcloudoc ransomware leaflet_jpnMcloudoc ransomware leaflet_jpn
Mcloudoc ransomware leaflet_jpn
sang yoo
 
mcloudoc ransomware leaflet_chn
mcloudoc ransomware leaflet_chnmcloudoc ransomware leaflet_chn
mcloudoc ransomware leaflet_chn
sang yoo
 
mcloudoc ransomware leaflet_kor
mcloudoc ransomware leaflet_kormcloudoc ransomware leaflet_kor
mcloudoc ransomware leaflet_kor
sang yoo
 

More from sang yoo (20)

Mcloudoc based telework_jpn_200226
Mcloudoc based telework_jpn_200226Mcloudoc based telework_jpn_200226
Mcloudoc based telework_jpn_200226
 
Mcloudoc based telework_chn_200226
Mcloudoc based telework_chn_200226Mcloudoc based telework_chn_200226
Mcloudoc based telework_chn_200226
 
Mcloudoc based telework_eng_200226
Mcloudoc based telework_eng_200226Mcloudoc based telework_eng_200226
Mcloudoc based telework_eng_200226
 
Mcloudoc based telework_kor_200226
Mcloudoc based telework_kor_200226Mcloudoc based telework_kor_200226
Mcloudoc based telework_kor_200226
 
Mcloudoc intro kor_20200519
Mcloudoc intro kor_20200519Mcloudoc intro kor_20200519
Mcloudoc intro kor_20200519
 
mcloudoc brochure eng
mcloudoc brochure engmcloudoc brochure eng
mcloudoc brochure eng
 
mcloudoc based telework_chn_20190823
mcloudoc based telework_chn_20190823mcloudoc based telework_chn_20190823
mcloudoc based telework_chn_20190823
 
mcloudoc brochure chn
mcloudoc brochure chnmcloudoc brochure chn
mcloudoc brochure chn
 
mcloudoc brochure jpn
mcloudoc brochure jpnmcloudoc brochure jpn
mcloudoc brochure jpn
 
mcloudoc brochure kor
mcloudoc brochure kormcloudoc brochure kor
mcloudoc brochure kor
 
Clou doc backupdoc_intro_chn_20191111
Clou doc backupdoc_intro_chn_20191111Clou doc backupdoc_intro_chn_20191111
Clou doc backupdoc_intro_chn_20191111
 
Clou doc backupdoc_intro_jpn_20191112
Clou doc backupdoc_intro_jpn_20191112Clou doc backupdoc_intro_jpn_20191112
Clou doc backupdoc_intro_jpn_20191112
 
Clou doc backupdoc_intro_kor_20191111
Clou doc backupdoc_intro_kor_20191111Clou doc backupdoc_intro_kor_20191111
Clou doc backupdoc_intro_kor_20191111
 
Telework leaflet eng
Telework leaflet engTelework leaflet eng
Telework leaflet eng
 
Telework leaflet jpn
Telework leaflet jpnTelework leaflet jpn
Telework leaflet jpn
 
Telework leaflet chn
Telework leaflet chnTelework leaflet chn
Telework leaflet chn
 
mcloudoc telework leaflet_kor
mcloudoc telework leaflet_kormcloudoc telework leaflet_kor
mcloudoc telework leaflet_kor
 
Mcloudoc ransomware leaflet_jpn
Mcloudoc ransomware leaflet_jpnMcloudoc ransomware leaflet_jpn
Mcloudoc ransomware leaflet_jpn
 
mcloudoc ransomware leaflet_chn
mcloudoc ransomware leaflet_chnmcloudoc ransomware leaflet_chn
mcloudoc ransomware leaflet_chn
 
mcloudoc ransomware leaflet_kor
mcloudoc ransomware leaflet_kormcloudoc ransomware leaflet_kor
mcloudoc ransomware leaflet_kor
 

Recently uploaded

Providing Globus Services to Users of JASMIN for Environmental Data Analysis
Providing Globus Services to Users of JASMIN for Environmental Data AnalysisProviding Globus Services to Users of JASMIN for Environmental Data Analysis
Providing Globus Services to Users of JASMIN for Environmental Data Analysis
Globus
 
Globus Compute wth IRI Workflows - GlobusWorld 2024
Globus Compute wth IRI Workflows - GlobusWorld 2024Globus Compute wth IRI Workflows - GlobusWorld 2024
Globus Compute wth IRI Workflows - GlobusWorld 2024
Globus
 
Multiple Your Crypto Portfolio with the Innovative Features of Advanced Crypt...
Multiple Your Crypto Portfolio with the Innovative Features of Advanced Crypt...Multiple Your Crypto Portfolio with the Innovative Features of Advanced Crypt...
Multiple Your Crypto Portfolio with the Innovative Features of Advanced Crypt...
Hivelance Technology
 
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital TransformationWSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2
 
De mooiste recreatieve routes ontdekken met RouteYou en FME
De mooiste recreatieve routes ontdekken met RouteYou en FMEDe mooiste recreatieve routes ontdekken met RouteYou en FME
De mooiste recreatieve routes ontdekken met RouteYou en FME
Jelle | Nordend
 
Quarkus Hidden and Forbidden Extensions
Quarkus Hidden and Forbidden ExtensionsQuarkus Hidden and Forbidden Extensions
Quarkus Hidden and Forbidden Extensions
Max Andersen
 
Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...
Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...
Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...
Anthony Dahanne
 
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, BetterWebinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
XfilesPro
 
Prosigns: Transforming Business with Tailored Technology Solutions
Prosigns: Transforming Business with Tailored Technology SolutionsProsigns: Transforming Business with Tailored Technology Solutions
Prosigns: Transforming Business with Tailored Technology Solutions
Prosigns
 
First Steps with Globus Compute Multi-User Endpoints
First Steps with Globus Compute Multi-User EndpointsFirst Steps with Globus Compute Multi-User Endpoints
First Steps with Globus Compute Multi-User Endpoints
Globus
 
Using IESVE for Room Loads Analysis - Australia & New Zealand
Using IESVE for Room Loads Analysis - Australia & New ZealandUsing IESVE for Room Loads Analysis - Australia & New Zealand
Using IESVE for Room Loads Analysis - Australia & New Zealand
IES VE
 
Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...
Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...
Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...
informapgpstrackings
 
SOCRadar Research Team: Latest Activities of IntelBroker
SOCRadar Research Team: Latest Activities of IntelBrokerSOCRadar Research Team: Latest Activities of IntelBroker
SOCRadar Research Team: Latest Activities of IntelBroker
SOCRadar
 
top nidhi software solution freedownload
top nidhi software solution freedownloadtop nidhi software solution freedownload
top nidhi software solution freedownload
vrstrong314
 
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdfDominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
AMB-Review
 
How to Position Your Globus Data Portal for Success Ten Good Practices
How to Position Your Globus Data Portal for Success Ten Good PracticesHow to Position Your Globus Data Portal for Success Ten Good Practices
How to Position Your Globus Data Portal for Success Ten Good Practices
Globus
 
OpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoam
OpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoamOpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoam
OpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoam
takuyayamamoto1800
 
Understanding Globus Data Transfers with NetSage
Understanding Globus Data Transfers with NetSageUnderstanding Globus Data Transfers with NetSage
Understanding Globus Data Transfers with NetSage
Globus
 
GlobusWorld 2024 Opening Keynote session
GlobusWorld 2024 Opening Keynote sessionGlobusWorld 2024 Opening Keynote session
GlobusWorld 2024 Opening Keynote session
Globus
 
Visitor Management System in India- Vizman.app
Visitor Management System in India- Vizman.appVisitor Management System in India- Vizman.app
Visitor Management System in India- Vizman.app
NaapbooksPrivateLimi
 

Recently uploaded (20)

Providing Globus Services to Users of JASMIN for Environmental Data Analysis
Providing Globus Services to Users of JASMIN for Environmental Data AnalysisProviding Globus Services to Users of JASMIN for Environmental Data Analysis
Providing Globus Services to Users of JASMIN for Environmental Data Analysis
 
Globus Compute wth IRI Workflows - GlobusWorld 2024
Globus Compute wth IRI Workflows - GlobusWorld 2024Globus Compute wth IRI Workflows - GlobusWorld 2024
Globus Compute wth IRI Workflows - GlobusWorld 2024
 
Multiple Your Crypto Portfolio with the Innovative Features of Advanced Crypt...
Multiple Your Crypto Portfolio with the Innovative Features of Advanced Crypt...Multiple Your Crypto Portfolio with the Innovative Features of Advanced Crypt...
Multiple Your Crypto Portfolio with the Innovative Features of Advanced Crypt...
 
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital TransformationWSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
 
De mooiste recreatieve routes ontdekken met RouteYou en FME
De mooiste recreatieve routes ontdekken met RouteYou en FMEDe mooiste recreatieve routes ontdekken met RouteYou en FME
De mooiste recreatieve routes ontdekken met RouteYou en FME
 
Quarkus Hidden and Forbidden Extensions
Quarkus Hidden and Forbidden ExtensionsQuarkus Hidden and Forbidden Extensions
Quarkus Hidden and Forbidden Extensions
 
Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...
Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...
Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...
 
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, BetterWebinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
 
Prosigns: Transforming Business with Tailored Technology Solutions
Prosigns: Transforming Business with Tailored Technology SolutionsProsigns: Transforming Business with Tailored Technology Solutions
Prosigns: Transforming Business with Tailored Technology Solutions
 
First Steps with Globus Compute Multi-User Endpoints
First Steps with Globus Compute Multi-User EndpointsFirst Steps with Globus Compute Multi-User Endpoints
First Steps with Globus Compute Multi-User Endpoints
 
Using IESVE for Room Loads Analysis - Australia & New Zealand
Using IESVE for Room Loads Analysis - Australia & New ZealandUsing IESVE for Room Loads Analysis - Australia & New Zealand
Using IESVE for Room Loads Analysis - Australia & New Zealand
 
Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...
Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...
Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...
 
SOCRadar Research Team: Latest Activities of IntelBroker
SOCRadar Research Team: Latest Activities of IntelBrokerSOCRadar Research Team: Latest Activities of IntelBroker
SOCRadar Research Team: Latest Activities of IntelBroker
 
top nidhi software solution freedownload
top nidhi software solution freedownloadtop nidhi software solution freedownload
top nidhi software solution freedownload
 
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdfDominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
 
How to Position Your Globus Data Portal for Success Ten Good Practices
How to Position Your Globus Data Portal for Success Ten Good PracticesHow to Position Your Globus Data Portal for Success Ten Good Practices
How to Position Your Globus Data Portal for Success Ten Good Practices
 
OpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoam
OpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoamOpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoam
OpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoam
 
Understanding Globus Data Transfers with NetSage
Understanding Globus Data Transfers with NetSageUnderstanding Globus Data Transfers with NetSage
Understanding Globus Data Transfers with NetSage
 
GlobusWorld 2024 Opening Keynote session
GlobusWorld 2024 Opening Keynote sessionGlobusWorld 2024 Opening Keynote session
GlobusWorld 2024 Opening Keynote session
 
Visitor Management System in India- Vizman.app
Visitor Management System in India- Vizman.appVisitor Management System in India- Vizman.app
Visitor Management System in India- Vizman.app
 

ClouDoc brochure_eng_20160708

  • 1. Homepage : www.net-id.co.kr Email : netid@net-id.co.kr Establish an environment for document management and safety based on document centralization Endpoint Security & Document Management at the same time! EDMSDRM DLP Document encryption Data Loss prevention Anti-Malware Document management NetworkLock Are you OK? I just bought one^^“ ” Document Management & Security by Only One Agent Environment EDMS DLP DRM
  • 2. Korea’s best information leakage prevention solution Revolutionary document management Prevent the leakage of corporate documents and customer information We provide cutting-edge solutions with the best engineers and advanced technological expertise. Since our establishment, we have strived to multiply sales and secure the highest quality manpower, and are now one of Korea’s top IT specialist companies. NetID is a company that develps and supplies frameworks, technologies and applications for the systematic aggregation, management and sharing of the information and knowledge owned bt organizations.
  • 3. Numerous case studies of Solution usage in large company and public agencies Regular operational training and product training for customers Providing you with the newest technology and services Research focused on R&D technology Rapid customer support Management that aims for customer satisfaction
  • 4. Corporate document management system with document centralization - ClouDoc Prevent the leakage of corporate documents and customer information 04 Suggest indicators for business performance based on documents Maintain ownership over and turn business documents into assets Centralization of Documents
  • 5. ClouDoc 0705 Anewsuggestions CloudDoc licensing method Respond to compliance needs Information protection management system Korean standards Information protection management system global standards Personal information protection management system Korean standards Data protection management systems for car suppliers ISMS ISO27001 PIMS Automobile manufacturers ‘H’ Built-type Rental-type Public cloud service Maintenance fees Maintenance fees Maintenance fees Maintenance fees Monthly usage fees & introduction fees AWS U Cloud Monthly fees Monthly fees Monthly fees Monthly fees small businesses small businesses Permanent license • 4.2 Information asset classification and treatment • 6.1.2 Role division • 8.1.2 Certificate and encryption functions • 8.1.3 Security log functions • 8.1.4 Permission functions • 8.2.5 Source program security • 8.3 External development security • 9.Password security • 10.1 External access policy • 10.2 Permissions management • 10.3 User certification and identification • 10.4 Permission restriction zone • 11.2.6 Smart work security • 11.2.9 Backup management • 11.3.2 Establish and conclude agreements on data transmission policies • 11.4 Media security • 11.5.1 Malware restrictions • A.6.2. Mobile devices and remote tasks • A.7.2.3 Disciplinary actions • A.8.2 Data classification • A.8.3 Media management • A.9.1 Requirements for permission restrictions • A.9.2 User access management • A.9.3 User responsibility • A.9.4 System and application access permissions • A.10 Encryption • A.12.2 Protection from malware programs • A.12.3 Backups • A.12.4 Evidence logs and monitoring of events • A.13.1 Network security management • A.13.2 Data transmissions • A.14.2 Development and support procedure security • A.18.2.3 Protection of documented data • A.18.2.4 Protection of personal information • 4.1.1 Putting effective protection measures into practice • 7.1.1 Establish permission restriction policy • 7.1.2 Register personal information handler • 7.1.3 Manage personal information handler permissions • 7.1.4 Manage user passwords • 7.1.5 Review personal information handler permissions • 7.1.7 Network access • 7.1.9 Application program access • 7.2.1 Password policy • 7.2.2 Use password • 7.2.3 Key management • 7.3.5 Internet access management • 7.3.7 Media issuance and storage • 7.3.8 Discard media • 7.3.9 Restrict malware programs • 7.3.10 Portable computing • 7.3.11 Working remotely • 4. Classify data assets and management history • 13. Prevent leakage of operating secrets • 14. Security-level specific usage, storage, transfer, and disuse • 22. Installation and usage indicators of security soltions • 23. Security management of former employees • 26. Internal security review/conduct audits • 6. Password creation requirements • 1. Block unnecessary network connections • 19. Certification, individual and password encryption • 25. Applying encryption • 26. Restrictions on mobile storage devices • 27. Protection measures for important files • 28. Restrictions on transmission of large files • 31. Server access restrictions • 37. Enforcement of password creation requirements • 38. Maintain logs for server access and use • 42. Restrictions on IT-related external employees • 44. System performance and storage management ClouDoc
  • 6. 06 ClouDoc CAD PSD OutsideInside Effectofintroduction A new concept corporatedocument management system prevent the leak of corporate documents and customer information As work documents are managed in the safe- zone by ClouDoc, you can prevent data leakage even when notebook computers are taken off- site or lost. In addition, if secured disks are connected to another PC outside of the safe- zone, the files cannot be opened. www.net-id.co.kr
  • 7. ClouDoc 07 Suggest work utilization indicators based on documents Transform workdocuments into corporate assets and enhance ownership Includes a restore function. Even if documents are intentionally deleted, centralized documents prevent losses due to employees leaving the company or transferring to a different depart- ment. All document storage must be central- ized to improve document management and for efficient workflow. Executives and the CEO can open work files for all employees using Windows Explorer. Additionally, statistical data for different types of documents, current status of membership, usage and other statistical data can be utilized.
  • 8. 08 DMZZONE External document exchange server Proxy server Push server NewNew External organizations Aworkenvironmentbasedon documentcentralization with enhanced support for mobile environments ClouDocfunctionstructure Providesamobile workenvironment ClouDoc OperationServer Outside Inside www.net-id.co.kr
  • 9. 09ClouDoc Productfeature Unlike competitor products which use restrictions based on file names or appli- cation names, ClouDoc uses hash value-based disk IO restrictions to make policy violations difficult. Based on hash values prohibited Standard methods VS. non-standard methods Protects not only CAD drawings and office documents but also designs, videos, music, and source code. Non-standard methods use applications with limited compatability and require additional development for use across different systems. ClouDoc provides a standard method using standard drives , taking into account the disadvantages of non-standard methods. Possible to avoid policy restrictions just by changing the file extension or name as restrictions are based on file extension or application name. Cannot override restrictions using name changes because policies are based on application hash values Competitorproducts ClouDoc 2b3sa Ga5ad 3fdDq 2b3sa Ga5ad 3fdDq Powerpoint.exe Powerpt.exe Powerpoint.exe Powerpt.exe CATIA AUTO CAD SolidWorks ProENGINEER Micro Office Excel Micro Office Word Micro Office Power Point ex) CAD drawing, design project ... Diverse document Requiring consideration of problems in Hooking/Exclusive search engine/Window shell(non-standard system) Product feature Document management function External document exchange server Document security function NetworkLock ClouDoc Backup Customers APP with no hooking development APP with hooking development C Local Disk C Local Disk C Local Disk Server Storage
  • 10. NetID's Document Centralization SolutionPRODUCT FUNCTION 10 www.net-id.co.kr Documentmanagementfunction Windows Explorer/ mobile/web/Java Explorer included ClouDoc provides a UI based on Windows Explorer for user convenience. . User WindowsExplorer (ClouDoc PC Client) Personaldrive(X:) An individual drive, possible to share one's files with other people Teamdrive(Y:) A storagespaceforworkdoneby individual teams and departments. Folder list and access rights can be set according to permissions Sharedrive(Z:) A list of folders on a drive shared with other people or departments. Onlinesecuredisk(E:) Use local secure storage when creating large-sized files or when smooth compression test the limits of central document storage capacity Offlinesecuredisk(F:) Stored locally temporarily in the event of a network outage Centralized document storage Secure disk Export secure disk (G:) A secure disk for files whose export has been approved business trip log-in MobileExplorer WebExplorer Mac-specificfilesystem JavaExplorer PC backup ClouDoc OperationServer ClouDocBackup Reserved backup Differentiated backup Restoration and logs
  • 11. Product feature Document management function External document exchange server Document security function NetworkLock ClouDoc Backup Customers OO Company TIP Safety management division Safety planning team Strategy establishment Weekly reports2016 201601 20160205 20160212 201602 Shared with team Safety management division Safety planning team Strategy establishment Downloads Common work Downloads Common work Downloads Common work Shared with division Shared with company ex) OO Company 11ClouDoc Setting permissions for the department document storage folder Permissions for the ability to open folders may be set differently within the same organization based on rank. Utilize department document storage Types of permissions View folder list Create folders Delete and delete sub Team Tilte Marketing team General Manager Person ex) John Doe Marketing team Sales team Server team HR team CEO Exhibit Publicize Share Plan Marketing team manager Marketing team memberex) ex) Example application: it is only possible to open folders a user has access permissions for Folder access permissions depent on rank within the organization and department Target permissions Read/Write/edit Document classification system and setting permissions Confidential document management A CEO (Team manager) B Staff member (Team document manager) C Manager (Team member) D General manager (Team manager) E Staff member (Team document manager) F Manager (Team member) G Team manager (Team manager) H Staff member (Team document manager) I Assistant Manager (Team member) Team manager/ team document manager function Folder-specific storage limits, set permissions, access log verification, current status of storage limits, current status of permission settings. Security Document Manage number of people with access Export approval Company/department document storage folders can be classified and defined to enable to management of confidential documents. Marketing team Work Publicize Marketing team Foldermanager 2 Designate foldermanager Documentutilizationtip 1 Designate aspecialfolder The'folder manager' isable to manage thenumberofpeopleofhaveaccessand approveexport. 3
  • 12. 12 Documentversion management Just saving office documents after editing allows storage and version management of prior versions. This can help prevent data loss from overwriting user documents or when documents are not saved completely. Automatic check in/ checkout To prevent redundant copies of files from being saved when working together, a check in/checkout function is provided. The current file user may be verified and usage permissions may be denied from the file properties window. Ai XPW P P P Ps Supportable application A BA A XP MS WORD MS POWER POINT MS EXCEL MS WORD 4. Document recovery 2. Store previous documents Original documents Old version 1. Store after document edition 3. Request document recovery MS POWER POINT MS EXCEL AUTO CAD PHOTOSHOP ILLUSTRATOR HANGUL ACROBAT X PRO AUTO CAD SOLID EDGE SOLID WORKS W 1. Edit document 2. Read only 4. Ability to deny usage permissions 3. Ability to see which user is currently using a file NetID's Document Centralization SolutionPRODUCT FUNCTION www.net-id.co.kr A Supportable application Version management including Office, and CAD documents Document double storage prevention during joint work
  • 13. 13ClouDoc Sharing documents with employees Centralized document storage allows documents to be shared with other users via a variety of different ways. Documents can even be shared with users who do not have ClouDoc accounts. Search functions Windows Explorer may be used to search for file names provided by ClouDoc. Additionally keyword management and analytics features as well as searches are provided when ClouDoc is connected to a specialist search engine KEY WORD When connected to a specialist search engine, provides search function within Windows Explorer Search within documents and manage keywords and analytics Searchinsidefiles/keyword managementandanalyticsfeatures KEY WORD Searchforfilenamesfrom WindowsExplorer ClouDoc provides its own search function Although Windows Explorer provides basic file name searches, there is a risk of overloading servers. John Doe Design team (design_guest) download upload Exhibit Plan Weekly report Marketing 201601 Marketing team Exhibit GEUST Share Plan (design_guest ) Pubilcize download upload Beakmanwon (mwbeak) Chunmanwon (mwchun) Departments withot document centralization Departments with document centralization ClouDoc sharing functions UNC Copy (secure) link mail, (secure) web link copy Folder Sharing Share Drive (Z:) Personal Drive (X:) Team Drive (Y:) (Secure) link mail, (secure) web link copy UNC Copy Share the link to a file using company/depart- ment document storage via a drive name for rapid collaboration. However, this feature is not available for individual document storage and can only be used by employees with accounts. Folder sharing Share folder links to provide access to specific folders to other users without permissions. However, this feature can only be used by em- ployees with accounts. (Secure) link mail, (secure) web link copy Share links to a file among employees without access to a folder. If a weblink is pasted into Out- look, a list of file appears in an organized table. Guest ID Provides temporary IDs for continued colla- boration with external users who do not have accounts. Design team WorkChunmanwon(mwchun) Marketing Exhibit Plan Product feature Document management function External document exchange server Document security function NetworkLock ClouDoc Backup Customers
  • 14. 14 Realtimedocument eventalarms When an event occurs in relation to use of department/individual document storage (read/write/delete/rename/move/copy), you may receive notifications of the action. However, this may depend on administrator settings related to document storage folder or type of event. Exchangedocuments withbusinesspartners provision of a safe environment to send and receive documents with the external document exchange server External document exchange server Status of event notification settings for user Select event notification document storage folder New Team Drive Personal Drive Read Write Delete Rename Move Copy Personal Drive (Z:) Team Drive(Y:) 1 2 3Read/write/delete/rename/move /copy or similar event occurs Depending on the setup of the customer's system, an email or push server alert may be used You can select the types of events and the document storage folders for which you wish to receive notifications Read/Write/Delete An email or push event notifi- cation will be sent to a user with access permissions PushServer Select event notification document storage folder Necessary permissions for an event notification recepient Select type of event DMZ ZONE 2 2 The office central server Approval document copy Upload document copy 4 1 Guest ID Upload Download/ download certificate email, ID/ password certification 1 3 Sending out interneal document and requesting for approval. Copying of the sent out documents and history management. Weblink, Link mail Request for approval for sending out External agencies External document Exchange server NetID's Document Centralization SolutionPRODUCT FUNCTION www.net-id.co.kr
  • 15. 15ClouDoc Windows PC security functions ClouDoc provides a range of Windows PC security functions to enable the management of documents safely within the scope of the secure zone Personal drive (X:) Team drive (Y:) Share Drive (Z:) Online secure disk (E:) Offline secure disk (F:) export secure disk (G:) Printing Export preventation Prevent exposure through on/offline media Storage prevention/ export prevention (DiskLock, DiskLock Plus) Local Drive (C:,D:..) Print control, print log, print watermark Prevent screenshots, & clipboard copy Prevent usage of regular zone Safe Zone NetworkLock (network separation) IEexemptionpolicies Block document moving/ copying within safe zone Prevent data leakage through Temp folder path The first file upload policy C: Users ~ Temp C: Users ~ Temp C: Temp C: programdata ~Temp Enhanced security functions Networkrestrictions block drag and drop be- tween drives (including USB drives) as well as copy/paste. prevent malware from being introduced and block harmful sites network separation function Active-X for Groupware and banking applications provide a separate security policy for the Temp folder path encourage users to upload files to the ClouDoc document storage system for a specified amount of time using the 'File collection disk' within the local safe zone for local documents when first installed Document security function Product feature Document management function External document exchange server Document security function NetworkLock ClouDoc Backup Customers
  • 16. 16 Exportingdocuments If the ClouDoc DiskLock policy is used, copying and moving files on local disks is prohibited in addition to the attachment of files to webmail, Outlook, and SNS. A separate approval process is necessary for files to be exported.e ClouDoc DiskLock policy is used, copying and moving files on local disks is prohibited in addition to the attachment of files to webmail, Outlook, and SNS. A separate approval process is necessary for files to be exported. Ransomware infectionresponse ClouDoc not only blocks regular ransomware but also provides a response mechanism to block ransomware infection from PDF documents and Windows Explorer. * Saves a copy of the file to be exported Export secure disk ClouDoc Server 1. Files cannot be exported without approval • Network Local disk Portable disk USB • • • • …. User • • • Approval management function Export storage restrictions Export timeframe Preapproval/postapproval setting 5. Export Online Offline File, folder export approval process approval permission manager Self protection function based on a White List Specified apps and uninfected Windows Explorer : read/write allowed Non-specified apps and infected Windows Explorer : read/write prohibited Programs/Windows shell extension DLLs White List SafeZone scope protection ? .EXE … Program Not approved Approved Response mechanism for each route of ransomware infection Malware ? .EXE Infected Windows Explorer Uninfected Windows Explorer Ransomware Block standard normal program ransomware infection Block ransomware based on Adobe PDF/ Flash Player DLL Lock: block input/output operations by ransomware of an infected Windows Explorer 2. Request file export approval 3. Approve/reject export request 4. Only allow export of approved folders Types of approval permission manager Team/team document managers Folder managers • • Central document storage PC secure disk NetID's Document Centralization SolutionPRODUCT FUNCTION www.net-id.co.kr
  • 17. 17ClouDoc Business partner Free~ Log in Apply policy List of file access log / Prohibit printing / Prohibit online attached/ Prohibit Clipboard copying /prohibit local saveing /... Policy application history History of PC policy applications Policy modification history Policy-specific information Monitoring Managers can monitor the usage of ClouDoc by users and managers as follows. Document security for business partners and telecommuters The exact same environmental that is supplied for existing employees can be provided for business partners as it pertains to external DRM. Unlike existing external DRM, no important documents or floorplans are sent to business partners while sufficient management is provided internally for document use history user permissions. DMZZONE Proxy server The office central server Administrator Allow all applications Allowed applications White List Installation status Deletion log Normal log Verify policy history applied to users and departments Verify policy hisallows for verification of users and departments to whom current policy is applied verify current status of policy History of modifications to specified policy Verify extension history of policies on user PCs Current status of current policy setting Current status of PC policy application • MAC address • OS version • User account • Date • IP address • Computer name • user IP • Request time • Reason for deletion • Work time • Permission settings log • Link copy log, link mail log • File access log • File export log • Print log • Member information log (verification/creation/modification/deletion) • Policy application date • policy name • targeted information • ID of user who applied policy • Create • Modify • Delete • Rename • Most recent PC policy extension • Extension history • Access IP restrictions • Manage ID, PWD access • Department/user • Policy settings • DiskLock • Document export • Smartphone control • Screenshot • Clipboard copy control • Print watermark • Print control • Print log Verify current status of policy application for specific user PCs • Business partner account/ policy management • Business partner allowed applications restrictions • Business partner log management Before login After login Reboot Disable policy • Storage • Screenshots • Printing • Clipboard • File sending Prohibit Product feature Document management function External document exchange server Document security function NetworkLock ClouDoc Backup Customers
  • 18. 18 2016.1.1 2016.1.2 365 Networkseparation This method allows for an internal and external network mode on the same PC. The disadvan- tages of previous physically separated network methods such as SBC and CBC are improved upon. One-stop service with an Cloudoc backup solution Maintain entire folder structure with incremental backups on desired dates Store full daily backups for full folder storage backup on a desired timeframe Allows for backup and restoration as a response to ransomware infection guarantees safety of ClouDoc server Allows for hourly/daily/weekly/ monthly backup schedule settings based on company schedule Provide a response using a daily full folder structure backup when infected with ransomware Stores only one copy of identi- calfiles regardless of different file dates Manage storage space by auto- matically deleting files past their storage maturity date Centralized corporate monitoring of current status of performance and backups with statistical data Provides an autonomous firewall, performance monitoring features for stable operation ClouDocBackup ClouDoc offers snapshot backups, incremental backups, automatic schedule manage- ment, monitoring of current status of performance and backup functions. ClouDoc Backup NetworkLock ClouDoc document storage Network allowed Groupware/ERP ExternalnetworkmodeInternalnetworkmode Network blocked Groupware/ERP • Any traffic to unknown IP addresses or Domains will be blocked. • You may add IP range or domains that will be allowed. • You may add IP ranges that will be blocked. • All traffic to all addresses and Domains will be allowed. • Cannot be used • Cannot access ClouDoc disk • However, access is provided to export secure disk (read/write access) • Allowed usage Switch to external network • Remove clipboard • Remove temporary files • Close applications used for work documents Exchange document between networks Export secure disk (F:) Export approved External use Work applied Download ClouDoc document storage NetID's Document Centralization SolutionPRODUCT FUNCTION www.net-id.co.kr • Allowed usage
  • 19. Customers 19ClouDoc Reference growth rate The following is the list of clients with over 500 executives and staff where the product has been introduced as a solution. Major client companies ClouDoc continues to be supplied to major corporations, public corporations, manufactu- rers, distributors, pharmaceutical companies, IT, medical services, marketing, energy, and chemical companies across all industries. Customers feel that the product is capable of protecting a wide range of data and information. Total number of client companies Supplied 50 firms in 2015 3,000 users 2,000 users5,000 users 1,000 users 1,000 users1,600 users 1,800 users 400 users1,000 users 1,000 users 500 users5500 users 500 users 500 usersSchool members 600 users 300 users500 users 55 users 100 users100 users 2,000 users 40 user ( + 40 casual user)1,200 users 500 users 440 users500 users Product feature Document management function External document exchange server Document security function NetworkLock ClouDoc Backup Customers
  • 20. SNS media Hopepage ww.net-id.co.kr Facebook www.facebook.com/cloudoc.netid Youtube www.youtube.com/coreajazz2 Linkedin www.linkedin.com/pub/sang-yoo/22/a27/747 Slideshare www.slideshare.net/coreajazz Google blog(English) mycloudoc.blogspot.kr/ Google blog (Japanese) cloudocjapan.blogspot.jp/ Naver blog (Korean) blog.naver.com/coreajazz Weibo blog (Chinese) weibo.com/ClouDoc Document Centralization Solution