Cloudoc against ransomware
Net-ID has advanced know-how through various projects since the beginning of the document centralization market in 2009. In particular, we have provided products to more than 50 new customers each year for three years from 2014 to 2017, with an average annual growth rate of 36%.
2. Total amount of
damage for 2016
Monthly income of
hackers
Ransomware
damage situation
(FBI investigation)
1billion $
10~50 million $
Infection Time 15 min.
Source Logrhythm
US information
security company
Amount of damage
due to Ransomware
3. 72%
32%
72% of infected enterprises
No data access for at least 2 days
32% of infected enterprises
No data access for more than 5 days
Ransomware Infection
Ransomware
damage situation
Downtime due to
Ransomware
Source Logrhythm
US information
security company
4. Ransomware seeking vulnerability in Microsoft's Windows operating system
Over 150 countries
Including government agencies
Paralyzing business of Global enterprise
About 200,000 damages occurred
Victim countries
May 12, 2017 -
Wannacry
Source Betanews
US IT Press
5. Infected through spam mails
Pay for data recovery
Download malicious file (code)
Infected documents in user's drive
Ransomware alert occurs
Ransomware
attack procedure
Source
US information
security company
Comodosslstore
6. Damaged enterprises that paid the required amount are 70%.
Recovery rate of lost data due to Ransomware is 42%.
50% of victim enterprises pay $ 10,000 to $ 40,000
70%
42%
50%
Ransomware
attack procedure
Source
Denmark
information
security company
Heimdalsecurity
8. Disk Lock
Disk Lock Plus
Document management & document collaboration
SW installation files management
Community function
Windows Explorer UI support
Prohibit screen capture
Prohibit print
Provide print log information
Prohibit Clipboard Copy
Print watermark
Ransomware blocking function
Prohibit local saving
Application-specific management
Export procedure
Basic Functions
Cloudoc
main functions
9. Mobile
Push service
PC LOG
Search engine
PC Backup
External DRM
Project version
management
External document
exchange service
Network Lock
Secure Viewer
Personal Information
Security
Backup
Appliance
Uses central drive on iOS and Android-based smart phones and tablet devices, and provides notifications such as
announcements or export approval.
Supports push services such as announcements, document export, link approval, etc. from mobile devices such as
iOS and Android which can be used by any business solution.
It stores the file input/output related logs generated in PC local and provides search function.
Provides 'Search Contents' and 'Meta Search' directly in Windows Explorer for files in various formats including MS
Office and PDF.
Provides functions such as instant / scheduled backup, incremental backup, file integrity check, restore, etc.
A function to forward encrypted files to partners for document security. The files and folders can be sent as well as
attachments and links. Documents sent are protected by functions such as passwords, OTP, real-time blocking, and
blocking by number of views.
It provides personal information detection and action functions by personal document box and departmental
document box for centralized documents.
Provides version control for a variety of documents including 3D CAD. Provides operational methods such as
scheduled backup, incremental backup, and recovery in case it is needed.
Provides the function to send documents via link to partner companies through DMZ's Document Exchange Server,
and to receive documents from partner companies.
Blocks the Internet while the user is using the intranet and blocks the intranet while the Internet is in use to prevent
information leakage from malicious code.
It converts Office documents to provide view-only functions without downloading documents from OS such as
Mobile / Macintosh / Windows.
Hardware integral type backup solution
10. WhiteList WhiteList-based I/O control
Allow I/O (White List)
Export program
All other programs
Control the use of applications to keep documents in Central Document
Drive secure
The export program is basically prohibited from reading and
cannot be used as a Ransomware infection path.
All unspecified programs
Export
approval folder
Cloudoc Central
Document Drive
Ransomware
blocking_1
11. I/O Control of Infected Windows Explorer
Infected Extension
Function
Windows Explorer
Blocks input/output by Windows Explorer extension function
which is infected with Ransomware for security target area.
Blocks I/O
Ransomware
blocking_2
Cloudoc Central
Document Drive
12. Restricting root login (Linux)
Restricting root login (Linux)
Firewall settings (Linux)
Firewall settings (Linux)
Firewall settings (Linux)
Restricting backup file
permission
Continuously provide Ransomware
countermeasure for customers
using Cloudoc.
ClouDoc
Server
Back up
Appliance
Service
management
13. Backup Appliance
Onestop solution service with
its own backup solution1
2
3
4
Full backups only once at first, then
just incremental backup, Forever!
Save full folder structure every day, keep
backups for as long as you want.
Select specific folders and files for
quick restores.
Ransomware
post-response
14. You can work anywhere, anytime freely, and your business documents are systematically
managed centrally.
In addition, you can move folders quickly and easily when you take over the work.
Introduction effect of Cloudoc
15. Access your document box when
you're on the go freely just by
internet service.
Urgent work requests can be handled
quickly by mobile
Provide collaboration and community
space to replace existing cafe fuction.
It has an ability to resolve work
transfer at once using data takeover
function.
Improved work efficiency through
systematic management of
department documents and various
search functions
Even if your PC is broken or lost, you
can continue to work with another PC
just by logging in your account.
User benefits
16. Net-ID has advanced know-how through various projects
since the beginning of the document centralization market
in 2009.
In particular, we have provided products to more than 50
new customers each year for three years from 2014 to 2016,
with an average annual growth rate of 36%.
Company that provides
solutions based on
customer trust