SlideShare a Scribd company logo
1 of 16
Download to read offline
ClouDocCloudoc_Against Ransomware
Ransomware
Countermeasure
Total amount of
damage for 2016
Monthly income of
hackers
Ransomware
damage situation
(FBI investigation)
1billion $
10~50 million $
Infection Time	 15 min.
Source Logrhythm
US information
security company
Amount of damage
due to Ransomware
72%
32%
72% of infected enterprises
No data access for at least 2 days
32% of infected enterprises
No data access for more than 5 days
Ransomware Infection
Ransomware
damage situation
Downtime due to
Ransomware
Source Logrhythm
US information
security company
Ransomware seeking vulnerability in Microsoft's Windows operating system
Over 150 countries
Including government agencies
Paralyzing business of Global enterprise
About 200,000 damages occurred
Victim countries
May 12, 2017 -
Wannacry
Source Betanews
US IT Press
Infected through spam mails
Pay for data recovery
Download malicious file (code)
Infected documents in user's drive
Ransomware alert occurs
Ransomware
attack procedure
Source
US information
security company
Comodosslstore
Damaged enterprises that paid the required amount are 70%.
Recovery rate of lost data due to Ransomware is 42%.
50% of victim enterprises pay $ 10,000 to $ 40,000
70%
42%
50%
Ransomware
attack procedure
Source
Denmark
information
security company
Heimdalsecurity
Against
Ransomware
Disk Lock
Disk Lock Plus
Document management & document collaboration
SW installation files management
Community function
Windows Explorer UI support
Prohibit screen capture
Prohibit print
Provide print log information
Prohibit Clipboard Copy
Print watermark
Ransomware blocking function
Prohibit local saving
Application-specific management
Export procedure
Basic Functions
Cloudoc
main functions
Mobile
Push service
PC LOG
Search engine
PC Backup
External DRM
Project version
management
External document
exchange service
Network Lock
Secure Viewer
Personal Information
Security
Backup
Appliance
Uses central drive on iOS and Android-based smart phones and tablet devices, and provides notifications such as
announcements or export approval.
Supports push services such as announcements, document export, link approval, etc. from mobile devices such as
iOS and Android which can be used by any business solution.
It stores the file input/output related logs generated in PC local and provides search function.
Provides 'Search Contents' and 'Meta Search' directly in Windows Explorer for files in various formats including MS
Office and PDF.
Provides functions such as instant / scheduled backup, incremental backup, file integrity check, restore, etc.
A function to forward encrypted files to partners for document security. The files and folders can be sent as well as
attachments and links. Documents sent are protected by functions such as passwords, OTP, real-time blocking, and
blocking by number of views.
It provides personal information detection and action functions by personal document box and departmental
document box for centralized documents.
Provides version control for a variety of documents including 3D CAD. Provides operational methods such as
scheduled backup, incremental backup, and recovery in case it is needed.
Provides the function to send documents via link to partner companies through DMZ's Document Exchange Server,
and to receive documents from partner companies.
Blocks the Internet while the user is using the intranet and blocks the intranet while the Internet is in use to prevent
information leakage from malicious code.
It converts Office documents to provide view-only functions without downloading documents from OS such as
Mobile / Macintosh / Windows.
Hardware integral type backup solution
WhiteList WhiteList-based I/O control
Allow I/O (White List)
Export program
All other programs
Control the use of applications to keep documents in Central Document
Drive secure
The export program is basically prohibited from reading and
cannot be used as a Ransomware infection path.
All unspecified programs
Export
approval folder
Cloudoc Central
Document Drive
Ransomware
blocking_1
I/O Control of Infected Windows Explorer
Infected Extension
Function
Windows Explorer
Blocks input/output by Windows Explorer extension function
which is infected with Ransomware for security target area.
Blocks I/O
Ransomware
blocking_2
Cloudoc Central
Document Drive
Restricting root login (Linux)
Restricting root login (Linux)
Firewall settings (Linux)
Firewall settings (Linux)
Firewall settings (Linux)
Restricting backup file
permission
Continuously provide Ransomware
countermeasure for customers
using Cloudoc.
ClouDoc
Server
Back up
Appliance
Service
management
Backup Appliance
Onestop solution service with
its own backup solution1
2
3
4
Full backups only once at first, then
just incremental backup, Forever!
Save full folder structure every day, keep
backups for as long as you want.
Select specific folders and files for
quick restores.
Ransomware
post-response
You can work anywhere, anytime freely, and your business documents are systematically
managed centrally.
In addition, you can move folders quickly and easily when you take over the work.
Introduction effect of Cloudoc
Access your document box when
you're on the go freely just by
internet service.
Urgent work requests can be handled
quickly by mobile
Provide collaboration and community
space to replace existing cafe fuction.
It has an ability to resolve work
transfer at once using data takeover
function.
Improved work efficiency through
systematic management of
department documents and various
search functions
Even if your PC is broken or lost, you
can continue to work with another PC
just by logging in your account.
User benefits
Net-ID has advanced know-how through various projects
since the beginning of the document centralization market
in 2009.
In particular, we have provided products to more than 50
new customers each year for three years from 2014 to 2016,
with an average annual growth rate of 36%.
Company that provides
solutions based on
customer trust

More Related Content

Similar to Cloudoc against ransomware_Eng

festival ICT 2013: Gli attacchi mirati e la Difesa Personalizzata Trend Micro
festival ICT 2013: Gli attacchi mirati e la Difesa Personalizzata Trend Microfestival ICT 2013: Gli attacchi mirati e la Difesa Personalizzata Trend Micro
festival ICT 2013: Gli attacchi mirati e la Difesa Personalizzata Trend Microfestival ICT 2016
 
Meeting02_RoT.pptx
Meeting02_RoT.pptxMeeting02_RoT.pptx
Meeting02_RoT.pptxothmanomar13
 
Vista Presentation
Vista PresentationVista Presentation
Vista Presentationsdrayin
 
Secure Data Workflow
Secure Data WorkflowSecure Data Workflow
Secure Data WorkflowOPSWAT
 
Ch14 Desktop Protection
Ch14 Desktop ProtectionCh14 Desktop Protection
Ch14 Desktop Protectionphanleson
 
2018 11-29 - Future Of SharePoint - SharePoint Keynote and Security
2018 11-29 - Future Of SharePoint - SharePoint Keynote and Security2018 11-29 - Future Of SharePoint - SharePoint Keynote and Security
2018 11-29 - Future Of SharePoint - SharePoint Keynote and SecurityCreate IT
 
Network Diagram of a company ABCD Roshan basnet it 29
Network Diagram of a company ABCD Roshan basnet it 29Network Diagram of a company ABCD Roshan basnet it 29
Network Diagram of a company ABCD Roshan basnet it 29rosu555
 
An Inconvenient Truth: Evading the Ransomware Protection in Windows 10
An Inconvenient Truth: Evading the Ransomware Protection in Windows 10An Inconvenient Truth: Evading the Ransomware Protection in Windows 10
An Inconvenient Truth: Evading the Ransomware Protection in Windows 10Soya Aoyama
 
Ne Course Part One
Ne Course Part OneNe Course Part One
Ne Course Part Onebackdoor
 
Introduction trend micro malicious email
Introduction    trend micro malicious emailIntroduction    trend micro malicious email
Introduction trend micro malicious emailAndrew Wong
 
Sirt roundtable malicious-emailtrendmicro
Sirt roundtable malicious-emailtrendmicroSirt roundtable malicious-emailtrendmicro
Sirt roundtable malicious-emailtrendmicroSumit Tambe
 
"Evolving Cybersecurity Strategies" - Threat protection and incident managment
"Evolving Cybersecurity Strategies" - Threat protection and incident managment"Evolving Cybersecurity Strategies" - Threat protection and incident managment
"Evolving Cybersecurity Strategies" - Threat protection and incident managmentDean Iacovelli
 
Computer virus and antivirus
Computer virus and antivirusComputer virus and antivirus
Computer virus and antivirusBESOR ACADEMY
 
AI for Ransomware Detection & Prevention Insights from Patents
AI for Ransomware Detection & Prevention Insights from PatentsAI for Ransomware Detection & Prevention Insights from Patents
AI for Ransomware Detection & Prevention Insights from PatentsAlex G. Lee, Ph.D. Esq. CLP
 
Fasoo Secure Document (FSD) for SharePoint
Fasoo Secure Document (FSD) for SharePoint Fasoo Secure Document (FSD) for SharePoint
Fasoo Secure Document (FSD) for SharePoint Fasoo
 
Comodo advanced endpoint protection
Comodo advanced endpoint protectionComodo advanced endpoint protection
Comodo advanced endpoint protectionDavid Waugh
 

Similar to Cloudoc against ransomware_Eng (20)

festival ICT 2013: Gli attacchi mirati e la Difesa Personalizzata Trend Micro
festival ICT 2013: Gli attacchi mirati e la Difesa Personalizzata Trend Microfestival ICT 2013: Gli attacchi mirati e la Difesa Personalizzata Trend Micro
festival ICT 2013: Gli attacchi mirati e la Difesa Personalizzata Trend Micro
 
Meeting02_RoT.pptx
Meeting02_RoT.pptxMeeting02_RoT.pptx
Meeting02_RoT.pptx
 
Vista Presentation
Vista PresentationVista Presentation
Vista Presentation
 
Secure Data Workflow
Secure Data WorkflowSecure Data Workflow
Secure Data Workflow
 
Ch14 Desktop Protection
Ch14 Desktop ProtectionCh14 Desktop Protection
Ch14 Desktop Protection
 
2018 11-29 - Future Of SharePoint - SharePoint Keynote and Security
2018 11-29 - Future Of SharePoint - SharePoint Keynote and Security2018 11-29 - Future Of SharePoint - SharePoint Keynote and Security
2018 11-29 - Future Of SharePoint - SharePoint Keynote and Security
 
LiveDOCS
LiveDOCSLiveDOCS
LiveDOCS
 
Network Diagram of a company ABCD Roshan basnet it 29
Network Diagram of a company ABCD Roshan basnet it 29Network Diagram of a company ABCD Roshan basnet it 29
Network Diagram of a company ABCD Roshan basnet it 29
 
An Inconvenient Truth: Evading the Ransomware Protection in Windows 10
An Inconvenient Truth: Evading the Ransomware Protection in Windows 10An Inconvenient Truth: Evading the Ransomware Protection in Windows 10
An Inconvenient Truth: Evading the Ransomware Protection in Windows 10
 
SysInfoTools MS Word Doc Repair
SysInfoTools MS Word Doc RepairSysInfoTools MS Word Doc Repair
SysInfoTools MS Word Doc Repair
 
Ne Course Part One
Ne Course Part OneNe Course Part One
Ne Course Part One
 
Other Systems & Application Software
Other Systems & Application SoftwareOther Systems & Application Software
Other Systems & Application Software
 
Introduction trend micro malicious email
Introduction    trend micro malicious emailIntroduction    trend micro malicious email
Introduction trend micro malicious email
 
Sirt roundtable malicious-emailtrendmicro
Sirt roundtable malicious-emailtrendmicroSirt roundtable malicious-emailtrendmicro
Sirt roundtable malicious-emailtrendmicro
 
Secure Objects
Secure ObjectsSecure Objects
Secure Objects
 
"Evolving Cybersecurity Strategies" - Threat protection and incident managment
"Evolving Cybersecurity Strategies" - Threat protection and incident managment"Evolving Cybersecurity Strategies" - Threat protection and incident managment
"Evolving Cybersecurity Strategies" - Threat protection and incident managment
 
Computer virus and antivirus
Computer virus and antivirusComputer virus and antivirus
Computer virus and antivirus
 
AI for Ransomware Detection & Prevention Insights from Patents
AI for Ransomware Detection & Prevention Insights from PatentsAI for Ransomware Detection & Prevention Insights from Patents
AI for Ransomware Detection & Prevention Insights from Patents
 
Fasoo Secure Document (FSD) for SharePoint
Fasoo Secure Document (FSD) for SharePoint Fasoo Secure Document (FSD) for SharePoint
Fasoo Secure Document (FSD) for SharePoint
 
Comodo advanced endpoint protection
Comodo advanced endpoint protectionComodo advanced endpoint protection
Comodo advanced endpoint protection
 

More from sang yoo

Mcloudoc based telework_jpn_200226
Mcloudoc based telework_jpn_200226Mcloudoc based telework_jpn_200226
Mcloudoc based telework_jpn_200226sang yoo
 
Mcloudoc based telework_chn_200226
Mcloudoc based telework_chn_200226Mcloudoc based telework_chn_200226
Mcloudoc based telework_chn_200226sang yoo
 
Mcloudoc based telework_eng_200226
Mcloudoc based telework_eng_200226Mcloudoc based telework_eng_200226
Mcloudoc based telework_eng_200226sang yoo
 
Mcloudoc based telework_kor_200226
Mcloudoc based telework_kor_200226Mcloudoc based telework_kor_200226
Mcloudoc based telework_kor_200226sang yoo
 
Mcloudoc intro kor_20200519
Mcloudoc intro kor_20200519Mcloudoc intro kor_20200519
Mcloudoc intro kor_20200519sang yoo
 
mcloudoc based telework_chn_20190823
mcloudoc based telework_chn_20190823mcloudoc based telework_chn_20190823
mcloudoc based telework_chn_20190823sang yoo
 
mcloudoc brochure chn
mcloudoc brochure chnmcloudoc brochure chn
mcloudoc brochure chnsang yoo
 
mcloudoc brochure jpn
mcloudoc brochure jpnmcloudoc brochure jpn
mcloudoc brochure jpnsang yoo
 
mcloudoc brochure kor
mcloudoc brochure kormcloudoc brochure kor
mcloudoc brochure korsang yoo
 
Clou doc backupdoc_intro_chn_20191111
Clou doc backupdoc_intro_chn_20191111Clou doc backupdoc_intro_chn_20191111
Clou doc backupdoc_intro_chn_20191111sang yoo
 
Clou doc backupdoc_intro_jpn_20191112
Clou doc backupdoc_intro_jpn_20191112Clou doc backupdoc_intro_jpn_20191112
Clou doc backupdoc_intro_jpn_20191112sang yoo
 
Clou doc backupdoc_intro_kor_20191111
Clou doc backupdoc_intro_kor_20191111Clou doc backupdoc_intro_kor_20191111
Clou doc backupdoc_intro_kor_20191111sang yoo
 
Telework leaflet eng
Telework leaflet engTelework leaflet eng
Telework leaflet engsang yoo
 
Telework leaflet jpn
Telework leaflet jpnTelework leaflet jpn
Telework leaflet jpnsang yoo
 
Telework leaflet chn
Telework leaflet chnTelework leaflet chn
Telework leaflet chnsang yoo
 
mcloudoc telework leaflet_kor
mcloudoc telework leaflet_kormcloudoc telework leaflet_kor
mcloudoc telework leaflet_korsang yoo
 
Mcloudoc ransomware leaflet_jpn
Mcloudoc ransomware leaflet_jpnMcloudoc ransomware leaflet_jpn
Mcloudoc ransomware leaflet_jpnsang yoo
 
mcloudoc ransomware leaflet_chn
mcloudoc ransomware leaflet_chnmcloudoc ransomware leaflet_chn
mcloudoc ransomware leaflet_chnsang yoo
 
mcloudoc ransomware leaflet_kor
mcloudoc ransomware leaflet_kormcloudoc ransomware leaflet_kor
mcloudoc ransomware leaflet_korsang yoo
 
Protect customer's personal information chn 191018
Protect customer's personal information chn 191018Protect customer's personal information chn 191018
Protect customer's personal information chn 191018sang yoo
 

More from sang yoo (20)

Mcloudoc based telework_jpn_200226
Mcloudoc based telework_jpn_200226Mcloudoc based telework_jpn_200226
Mcloudoc based telework_jpn_200226
 
Mcloudoc based telework_chn_200226
Mcloudoc based telework_chn_200226Mcloudoc based telework_chn_200226
Mcloudoc based telework_chn_200226
 
Mcloudoc based telework_eng_200226
Mcloudoc based telework_eng_200226Mcloudoc based telework_eng_200226
Mcloudoc based telework_eng_200226
 
Mcloudoc based telework_kor_200226
Mcloudoc based telework_kor_200226Mcloudoc based telework_kor_200226
Mcloudoc based telework_kor_200226
 
Mcloudoc intro kor_20200519
Mcloudoc intro kor_20200519Mcloudoc intro kor_20200519
Mcloudoc intro kor_20200519
 
mcloudoc based telework_chn_20190823
mcloudoc based telework_chn_20190823mcloudoc based telework_chn_20190823
mcloudoc based telework_chn_20190823
 
mcloudoc brochure chn
mcloudoc brochure chnmcloudoc brochure chn
mcloudoc brochure chn
 
mcloudoc brochure jpn
mcloudoc brochure jpnmcloudoc brochure jpn
mcloudoc brochure jpn
 
mcloudoc brochure kor
mcloudoc brochure kormcloudoc brochure kor
mcloudoc brochure kor
 
Clou doc backupdoc_intro_chn_20191111
Clou doc backupdoc_intro_chn_20191111Clou doc backupdoc_intro_chn_20191111
Clou doc backupdoc_intro_chn_20191111
 
Clou doc backupdoc_intro_jpn_20191112
Clou doc backupdoc_intro_jpn_20191112Clou doc backupdoc_intro_jpn_20191112
Clou doc backupdoc_intro_jpn_20191112
 
Clou doc backupdoc_intro_kor_20191111
Clou doc backupdoc_intro_kor_20191111Clou doc backupdoc_intro_kor_20191111
Clou doc backupdoc_intro_kor_20191111
 
Telework leaflet eng
Telework leaflet engTelework leaflet eng
Telework leaflet eng
 
Telework leaflet jpn
Telework leaflet jpnTelework leaflet jpn
Telework leaflet jpn
 
Telework leaflet chn
Telework leaflet chnTelework leaflet chn
Telework leaflet chn
 
mcloudoc telework leaflet_kor
mcloudoc telework leaflet_kormcloudoc telework leaflet_kor
mcloudoc telework leaflet_kor
 
Mcloudoc ransomware leaflet_jpn
Mcloudoc ransomware leaflet_jpnMcloudoc ransomware leaflet_jpn
Mcloudoc ransomware leaflet_jpn
 
mcloudoc ransomware leaflet_chn
mcloudoc ransomware leaflet_chnmcloudoc ransomware leaflet_chn
mcloudoc ransomware leaflet_chn
 
mcloudoc ransomware leaflet_kor
mcloudoc ransomware leaflet_kormcloudoc ransomware leaflet_kor
mcloudoc ransomware leaflet_kor
 
Protect customer's personal information chn 191018
Protect customer's personal information chn 191018Protect customer's personal information chn 191018
Protect customer's personal information chn 191018
 

Recently uploaded

A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxComplianceQuest1
 
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideChristina Lin
 
Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...OnePlan Solutions
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfkalichargn70th171
 
why an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfwhy an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfjoe51371421
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...MyIntelliSource, Inc.
 
DNT_Corporate presentation know about us
DNT_Corporate presentation know about usDNT_Corporate presentation know about us
DNT_Corporate presentation know about usDynamic Netsoft
 
Project Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanationProject Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanationkaushalgiri8080
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comFatema Valibhai
 
Engage Usergroup 2024 - The Good The Bad_The Ugly
Engage Usergroup 2024 - The Good The Bad_The UglyEngage Usergroup 2024 - The Good The Bad_The Ugly
Engage Usergroup 2024 - The Good The Bad_The UglyFrank van der Linden
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsAlberto González Trastoy
 
Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software DevelopersVinodh Ram
 
Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)OPEN KNOWLEDGE GmbH
 
5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdfWave PLM
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfkalichargn70th171
 
chapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptchapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptkotipi9215
 
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataAdobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataBradBedford3
 
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...soniya singh
 
What is Binary Language? Computer Number Systems
What is Binary Language?  Computer Number SystemsWhat is Binary Language?  Computer Number Systems
What is Binary Language? Computer Number SystemsJheuzeDellosa
 
Asset Management Software - Infographic
Asset Management Software - InfographicAsset Management Software - Infographic
Asset Management Software - InfographicHr365.us smith
 

Recently uploaded (20)

A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docx
 
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
 
Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
 
why an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfwhy an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdf
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
 
DNT_Corporate presentation know about us
DNT_Corporate presentation know about usDNT_Corporate presentation know about us
DNT_Corporate presentation know about us
 
Project Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanationProject Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanation
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.com
 
Engage Usergroup 2024 - The Good The Bad_The Ugly
Engage Usergroup 2024 - The Good The Bad_The UglyEngage Usergroup 2024 - The Good The Bad_The Ugly
Engage Usergroup 2024 - The Good The Bad_The Ugly
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
 
Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software Developers
 
Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)
 
5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
 
chapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptchapter--4-software-project-planning.ppt
chapter--4-software-project-planning.ppt
 
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataAdobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
 
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
 
What is Binary Language? Computer Number Systems
What is Binary Language?  Computer Number SystemsWhat is Binary Language?  Computer Number Systems
What is Binary Language? Computer Number Systems
 
Asset Management Software - Infographic
Asset Management Software - InfographicAsset Management Software - Infographic
Asset Management Software - Infographic
 

Cloudoc against ransomware_Eng

  • 2. Total amount of damage for 2016 Monthly income of hackers Ransomware damage situation (FBI investigation) 1billion $ 10~50 million $ Infection Time 15 min. Source Logrhythm US information security company Amount of damage due to Ransomware
  • 3. 72% 32% 72% of infected enterprises No data access for at least 2 days 32% of infected enterprises No data access for more than 5 days Ransomware Infection Ransomware damage situation Downtime due to Ransomware Source Logrhythm US information security company
  • 4. Ransomware seeking vulnerability in Microsoft's Windows operating system Over 150 countries Including government agencies Paralyzing business of Global enterprise About 200,000 damages occurred Victim countries May 12, 2017 - Wannacry Source Betanews US IT Press
  • 5. Infected through spam mails Pay for data recovery Download malicious file (code) Infected documents in user's drive Ransomware alert occurs Ransomware attack procedure Source US information security company Comodosslstore
  • 6. Damaged enterprises that paid the required amount are 70%. Recovery rate of lost data due to Ransomware is 42%. 50% of victim enterprises pay $ 10,000 to $ 40,000 70% 42% 50% Ransomware attack procedure Source Denmark information security company Heimdalsecurity
  • 8. Disk Lock Disk Lock Plus Document management & document collaboration SW installation files management Community function Windows Explorer UI support Prohibit screen capture Prohibit print Provide print log information Prohibit Clipboard Copy Print watermark Ransomware blocking function Prohibit local saving Application-specific management Export procedure Basic Functions Cloudoc main functions
  • 9. Mobile Push service PC LOG Search engine PC Backup External DRM Project version management External document exchange service Network Lock Secure Viewer Personal Information Security Backup Appliance Uses central drive on iOS and Android-based smart phones and tablet devices, and provides notifications such as announcements or export approval. Supports push services such as announcements, document export, link approval, etc. from mobile devices such as iOS and Android which can be used by any business solution. It stores the file input/output related logs generated in PC local and provides search function. Provides 'Search Contents' and 'Meta Search' directly in Windows Explorer for files in various formats including MS Office and PDF. Provides functions such as instant / scheduled backup, incremental backup, file integrity check, restore, etc. A function to forward encrypted files to partners for document security. The files and folders can be sent as well as attachments and links. Documents sent are protected by functions such as passwords, OTP, real-time blocking, and blocking by number of views. It provides personal information detection and action functions by personal document box and departmental document box for centralized documents. Provides version control for a variety of documents including 3D CAD. Provides operational methods such as scheduled backup, incremental backup, and recovery in case it is needed. Provides the function to send documents via link to partner companies through DMZ's Document Exchange Server, and to receive documents from partner companies. Blocks the Internet while the user is using the intranet and blocks the intranet while the Internet is in use to prevent information leakage from malicious code. It converts Office documents to provide view-only functions without downloading documents from OS such as Mobile / Macintosh / Windows. Hardware integral type backup solution
  • 10. WhiteList WhiteList-based I/O control Allow I/O (White List) Export program All other programs Control the use of applications to keep documents in Central Document Drive secure The export program is basically prohibited from reading and cannot be used as a Ransomware infection path. All unspecified programs Export approval folder Cloudoc Central Document Drive Ransomware blocking_1
  • 11. I/O Control of Infected Windows Explorer Infected Extension Function Windows Explorer Blocks input/output by Windows Explorer extension function which is infected with Ransomware for security target area. Blocks I/O Ransomware blocking_2 Cloudoc Central Document Drive
  • 12. Restricting root login (Linux) Restricting root login (Linux) Firewall settings (Linux) Firewall settings (Linux) Firewall settings (Linux) Restricting backup file permission Continuously provide Ransomware countermeasure for customers using Cloudoc. ClouDoc Server Back up Appliance Service management
  • 13. Backup Appliance Onestop solution service with its own backup solution1 2 3 4 Full backups only once at first, then just incremental backup, Forever! Save full folder structure every day, keep backups for as long as you want. Select specific folders and files for quick restores. Ransomware post-response
  • 14. You can work anywhere, anytime freely, and your business documents are systematically managed centrally. In addition, you can move folders quickly and easily when you take over the work. Introduction effect of Cloudoc
  • 15. Access your document box when you're on the go freely just by internet service. Urgent work requests can be handled quickly by mobile Provide collaboration and community space to replace existing cafe fuction. It has an ability to resolve work transfer at once using data takeover function. Improved work efficiency through systematic management of department documents and various search functions Even if your PC is broken or lost, you can continue to work with another PC just by logging in your account. User benefits
  • 16. Net-ID has advanced know-how through various projects since the beginning of the document centralization market in 2009. In particular, we have provided products to more than 50 new customers each year for three years from 2014 to 2016, with an average annual growth rate of 36%. Company that provides solutions based on customer trust