SlideShare a Scribd company logo
Work Less and Get More
ClouDoc Document centralization
The optimal choice for document management and document security
Since its foundation in 2002, NET-ID has been committed to
providing solutions based on long-term trust with customers under
the slogan of ‘Create conscientious software!’
We prioritize this value most from product design through to
production as well as maintenance.
Document centralization
Necessity of document centralization
Document centralization is an entirely new concept
in document management and document security
solutions which is still at an early stage in the world.
Document centralization uses the existing PC work
environment, but it does not use the VDI (Virtual
Desktop Infrastructure) and there is a ‘forced
centralization of document saving effect’ when VDI
(Virtual Desktop Infrastructure) is introduced.
In addition, high-performance tasks such as CAD
drawing and graphic work can be performed by using
the CPU and memory of the user PC as it is.
Background of document centralization
Loss of documents
from ransomware
Leakage of industry-
leading technology
by industrial spies
Frequent customer
privacy leakage
Loss of time/money
due to loss of
document or searching
Conventional method
Problems
Management plan
Lack of ransomware response
Increased TCO due to ‘introduction·
troubleshooting·maintenance’ by solution
All employees’ PCs are management targets
Lack of document encryption compatibility
Possibility of information leakage during PC
disposal·replacement
Risk of possible loss of personal information
encryption key
Concerns regarding reduced PC performance
due to various security features
Media control
Document encryption
Document management
Existing document management and security solutions are challenged by the requirements of today's changing business environment, including
ransomware response.
Personal information
protection
Document centralization response method
The scattered documents saved on the PC are centralized, simplifying management and security targets.
NO DATA
UserUser
User
Ransomware
blocking
Prohibiting PC saving
Controls media,
including USB
Clipboard Copy / Screen Capture / Print control
Central server
Windows Explorer drive
document management
Features of the response method of
document centralization
Centralized document
management
Business continuity
Document management point is
one central server
Documents always stay in the
central server, so work is continued
One Stop service, low-cost
operation, simple troubleshooting,
etc.
No possibility of information
leakage due to replacement or
disposal of PC equipment
Work takeover is smooth for
transferring departments,
retirement, etc.
Ransomware blocking and
follow up response functions
One Agent integrated
environment
Information leakage
prevention
Ransomware blocking
Smooth takeover
ClouDoc
ClouDoc’s differentiated security · management functions
Based on the Windows Explorer drive technology,
ClouDoc offers leading-edge compatibility in
performance, safety, networking, and security.
Also, it provides security architecture based on a hash
value rather than a program name, and is the only
document centralization solution that can replace DLP
and DRM functionality.
In addition to this, ClouDoc offers the additional
features that industry needs most ahead of the curve.
Compatibility
Expandability
Security
Convenience
The only Windows Explorer drive-based product
that meets convenience/performance/minimal
traffic/compatibility
The only product that can save everything from
general documents to 3D CAD drawings directly to
the central server and print
The only product with direct central input and
output without leaving a copy of the document on
the PC
Manufacturing support
Prevention of information leakage
The only product with excellent compatibility with
a wide range of applications for business needs
The only product that can prevent security
control bypass from changing the file extension,
application name, etc.
Provides the additional features required by industry ahead of the curve
Compatibility
Security
Expandability
The only product that saves directly to the central
server without going through the inconvenient
method of uploading to the server after saving
the PC
Fast speed
Permanent license, not a built in unit, so it can
be transferred to any performance server
The only product that can provide Active-Active
service with only L4 switching without separate
paid WAS such as JEUS
Permanent license
Economic feasibility
Features of ClouDoc
Module configuration by ClouDoc functionality
Push service
External document
exchange service
Backup appliance 
Basic functions
centralized document
management
PC backup
PC log
Mobile
Disk lock
External DRM
Search engine
Disk lock plus
Secure viewer
Project version
management
Network lock
Personal information
protection
Overview of ClouDoc function
ClouDoc provides a convenient collaborative environment through systematic document management.
Basic functions
ClouDoc
main functions
Provides personal/team/shared
document drive environment with
HTTP (S)-based internal protocol
Preventing document loss from
simultaneous editing between
first user and other users
Document sharing with employees from a
department without document centralization
or a partner company
Supports IE, Chrome, Safari, Firefox, etc.Provides personal/team/shared
document drive
Prepare for loss of documents due to
overwriting when editing office documents, etc.
Provides functions to set permissions for the
management scope, to manage capacity,
and to assign a sub folder manager
Sharing documents on a central server with
other employees via Share Folder or Copy
Document Link
Provides community functions for
teams, TFTs or clubs
Manages the software installation files and
provides the installation files for user requested
products
Provides Java Explorer UI
for Linux and Macintosh
Auto lock files in use
(auto check in/check out)
Collaborate with other departments and
partners via guest ID function
Heterogeneous web browser UI
support
Windows Explorer drive UI support
Version management of
MS office documents etc.
Permission and capacity management by
folder manager
Document collaboration
between employees
Web page-based community features
SW installation file application system
15
Disk lock
Provides functions to prohibit document saving on the local PC and control media.
ClouDoc
main functions
The only product that uses a hash-value based
no-save policy, not an application name based
one
Proactively prevent ransomware from
affecting documents in the centralized drive
Business application list registration,
category definition and management
Provides various media control functions to
completely replace existing DLP
Requires approval from team
leader/folder manager to attach
or export documents to email
Blocks existing document leaks present on
the PC and provides a central upload
environment
Windows PC application
category management
PC saving prohibition policy by
application category
Ransomware blocking functions
Direct device control
Export procedures by export purpose
Collect and protect work files
scattered on existing PCs
16
Disk lock plus
This feature allows you to replace DRM, a security solution using document encryption.
ClouDoc
main functions
A function that allows only business
programs to open the document in the
central drive and prevent the contents of
the document from being copied to a non-
business program.
It is designed so that copying the contents
of documents between business programs
is still allowed, so that the convenience of
work is not hindered.
Prevents information leakage through
screen capture of business programs
Function to register printers to allow printing
Flexible structure that can design different policies
by team or individual employee
Various items related to printing are logged
and can be viewed by the administrator
Copyrighted information can be identified
by printing the registered image or text in
the user's background when printing
Function to adjust transparency, angle, text
size of watermark image/text as background,
user information output location setting is also
possible
Screen capture prohibition
Clipboard copy prohibition Print prohibition
Print log
Print watermark
17
Mobile support
Provides the ability to use ClouDoc on mobile devices such as smart phones and tablets.
Provides IOS, Android, smart phone,
tablet UI
Camera and album linking function
Viewing personal/team/shared
documents drive
Security functions such as Device Register,
Pursuit Location, and Remote Delete
Internal connection via external proxy
server
Employees can install the ClouDoc app for use
Function to directly upload videos and photos from a camera to the central drive
Multiple photos can be selected and uploaded to a central server at once
Provides functions such as copy, move, delete, restore, upload, download and browse, as well as
viewing the list of central device document drive folders available for the mobile device
Provides security measures for approval of use, loss response, and data stored on mobile
devices
Without a VPN client, you can connect to the internal ClouDoc server only by proxy server
setting from the outside
18
Search engine
Provides file content search function through a search engine in addition to file name search.
Provides content search function in
Windows Explorer
Provides contents search of various
file formats
Convenient search results UI
Provides search function for
document metainformation
Indexing and searching contents of
scanned documents
Provides content search function in Windows Explorer
Function to search contents by extracting text from scanned documents
Provides search function for the metainformation contained in files such as JPG, PNG, MP3, MP4,
DWG
Searchable file formats
Html, xhtml, XML, Microsoft Office, Open office, Hwp, pdf, Tar, AR, CPIO, Zip, 7Zip, Gzip, BZip2, XZ, Pack200, txt,
rtf, mp3, bmp, gif, png, jpeg, tiff, mp4, quick time, 3gpp, Java, C, C++, Groovy, dwg
Convenient searching for personal/team/ shared documents drive
19
External DRM
Encrypts the exported items and sends them via e-mail attachment or link for secure file transfer to external partner companies.
Send encrypted files to partner
companies
Online recipients are protected by
OTP, real-time blocking, browsing
limits
Send encrypted folder as well as file
Send file as attachment and link
Offline recipients are protected by a
password
Encrypts the exported item so that only authenticated partner company users within its permitted
authority can view the document
For users with Internet access, it provides more secure e-mail OTP, limiting the number of browsers
and checking file blocking in real time.
Folder can be transferred by improving existing DRM function, so the folder structure can be
maintained when transferring CAD drawings or project documents.
Users can set export details such as file transfer method (file attachment/link) and authentication
method (online/offline) etc.
For offline users who cannot connect to the Internet, an authentication method through password
is provided.
20
External document exchange service
Provides a service for sending large files to the outside via its own server.
External document exchange server
in DMZ
Receive documents from partner
companies
Internal employee sends document
link to partner company
Non-repudiation of document downloads
by partner company employees
DMZ: Internet section accessible by internal employees and partner companies.
Provide a secure environment for exchanging large documents safely by installing server in DMZ
The external partner companies can upload to the external document exchange server with a
guest ID. Documents uploaded to the external document exchange server are automatically copied
to the internal document central server.
The internal employee can send documents to an external company through link mail after
requesting approval from the team leader. Sent documents are duplicated for tracing in case of
emergency and also to manage the history log.
Partner company employees who receive large-sized file links must receive the One Time Password
via email and enter it to download. The email is sent by the original document sender and it is
impossible to receive a one time password through an alternate email.
21
Network lock
This function is used to prevent information leakage from malicious code by dividing the network into internal and external networks that a
PC can access.
Internal network mode, external
network mode
Internal network blocking in external
network mode
External network blocking in internal
network mode
Document exchange between networks
Internal network = The company's internal network IP band /
External network = The IP band that can use the Internet.
The IP bands are set by the administrator and the domain name can be used instead of the IP band.
The connection to the internal network, groupware, ERP, etc. is blocked and the Internet is allowed.
The groupware and ERP can be used with the internal network, but the use of the internet is blocked.
(However, access to the site used by employees for business purposes is permitted.)
ClouDoc offers documents exported off of the central server in the internal network mode or the use
of the document downloaded from the Internet in the external network mode while in the internal
network mode by utilizing the export security disk present in the PC.
22
PC log
Provides search function by storing the file input and output related logs to PC local disk.
Record various local disk inputs and
outputs
Browse and search saved logs
Assign log subject file input and
output
Provides statistical charts related to
various logs
Restricts log acquisition subjects such
as application, extension, path, and
etc.
Creates multiple policies to apply to
individuals and teams
Record input and output of fixed disk, USB/external disk, network drive, CD/DVD, various disks
provided by ClouDoc, and other disks
Provides the administrator search function for saved logs
It specifies work for each log such as creating, reading, writing, deleting, renaming, copying,
and moving files.
Log acquisition subject by application type, file extension type, log subject folder path,
assign log exclusion subject folder
Provides statistical charts by application, document type, device, time.
Creates and manages multiple policies in advance, and specifies policies to apply to individuals
and teams in the organization chart.
23
Secure viewer
It converts Office documents to provide view-only functions without downloading documents from the OS such as Mobile/Macintosh/Windows, etc.
Office document conversion
View-only function without downloading
Provides office document conversion functions through document conversion server
View without downloading using the ClouDoc mobile App or Web Explorer for Macintosh, view
linked documents without downloading
Write function Provides the function of inserting text or graphics in 'Office documents converted to PDF'
24
Personal information protection
Detection pattern management
User management functions for detecting
personal information
Detecting personal information by
personal and team document drives
Email report to individual, team leader,
service manager, etc.
Registers and manages various detection patterns corresponding to personal information.
Provides user management functions such as retention, false positives, isolation, deletion, and release
Provides statistical information along with the functions to check the detection file name,
detection pattern, etc. by document drive.
Providing personal information detection guidance emails for individuals, team leaders,
service managers, etc.
25
Provides personal information detection and action for the personal and team document drives for centralized documents.
Project version management
This function is applicable to all kinds of documents. This is an especially effective version control method for 3D CAD projects.
Version management regardless of
document type
Scheduled backup, incremental
backup, restore in case
Useful for 3D CAD drawing version
management
This function backs up the whole folder in the current state in an incremental backup method regardless
of document extension or header type.
This can be useful for simple document-oriented projects, program source code, CAD drawing production projects,
and even projects with many different types of mixed documents.
The entire structure of the folder is backed up and only the added or modified files are copied
 → Minimize required storage capacity & restore documents in Windows Explorer if needed
The project version control function provides the version control function of the drawing, which is excellent
for the security of the manufacturer’s most important property
26
Push service
Service to deliver various events to users in real time. This function allows you to receive events related to ClouDoc service on various devices.
Push service
Enterprise solution architecture that
anyone can use
Support for mobile devices such as
iOS and Android
Push service such as announcements, document export, link mail, payment approval,
confirmation of approval request, approval, rejection
A function created considering general purpose push service environments
 → ClouDoc Push API can be used on systems other than ClouDoc
Push services available on iOS and Android-based smart phones and tablets
27
PC backup
This feature is for when you want to securely back up your PC's data to a central server for those who only use the basic
Instant / scheduled backup
File integrity check
Incremental backup
Provides restoration functions
Schedule a backup so that if the PC is connected to the server at that time, the backup will start
automatically
In addition to backing up the source files of the PC to the central server, it also compares the hash
values of the source and backup files to complete the backup
Only new or modified files for existing backup source files on the PC are backed up to the server
Function to restore central backed up files to PC
Backup and restore related tasks and error history can be logged and verified
28
functions of the document folder without centralizing the documents.
Net-ID has advanced know-how through various projects
since the beginning of the document centralization market
in 2009.
In particular, we have provided products to more than 50
new customers each year for three years from 2014 to 2016,
with an average annual growth rate of 36%.
Company that provides
solutions based on
customer trust
Customers
More than 50 new customers each year for 3 years, 2014~2016 and annual sales growth rate is 36%!
Major company
Semiconductor
Distribution &
Service
IT
Automobile
Finance
Defense Industry
Medical &
Pharmaceutical
Energy
Civil Engineering
Architecture
Public Educational
Institutions
Food & Beverage
International
Social Media
Homepage
Facebook
Youtube
Linkedin
Slideshare
Naver blog (KR)
Tistory blog (KR)
Google blog (EN)
Google blog (JP)
Weibo blog (CN)
www.net-id.co.kr
www.facebook.com/cloudoc.netid
www.youtube.com/coreajazz2
www.linkedin.com/pub/sang-yoo/22/a27/747
www.slideshare.net/slyoo
blog.naver.com/coreajazz
cloudoc.tistory.com/category
mycloudoc.blogspot.kr
cloudocjapan.blogspot.jp
weibo.com/cloudoc
Work Less and Get More

More Related Content

What's hot

10 key components of a document management system ppt
10 key components of a document management system ppt10 key components of a document management system ppt
10 key components of a document management system ppt
Discus Business Solutions
 
Documentum Overview
Documentum OverviewDocumentum Overview
Documentum Overview
Hisham Abdel Moneim
 
Microsoft Forefront - Identity and Access Management Whitepaper
Microsoft Forefront - Identity and Access Management WhitepaperMicrosoft Forefront - Identity and Access Management Whitepaper
Microsoft Forefront - Identity and Access Management WhitepaperMicrosoft Private Cloud
 
Fine docs product presentation latest
Fine docs product presentation latestFine docs product presentation latest
Fine docs product presentation latestSatyajit Roy
 
Laserfiche10 highlights- how the new features can benefit your mobile and wor...
Laserfiche10 highlights- how the new features can benefit your mobile and wor...Laserfiche10 highlights- how the new features can benefit your mobile and wor...
Laserfiche10 highlights- how the new features can benefit your mobile and wor...
Christopher Wynder
 
Document management the buyers handbook by Laserfiche.
Document management  the buyers handbook by Laserfiche.Document management  the buyers handbook by Laserfiche.
Document management the buyers handbook by Laserfiche.
Luis Santos
 
SoftAge eDMS
SoftAge eDMSSoftAge eDMS
View 4 Customer Presentation
View 4 Customer PresentationView 4 Customer Presentation
View 4 Customer Presentationepenedos
 
docEdge - Enterprise Document Management Platform
docEdge - Enterprise Document Management PlatformdocEdge - Enterprise Document Management Platform
docEdge - Enterprise Document Management Platform
PERICENT
 
XenDesktop 7 Blueprint
XenDesktop 7 BlueprintXenDesktop 7 Blueprint
XenDesktop 7 Blueprint
Nuno Alves
 
ClevaDesk - Document management system
ClevaDesk - Document management systemClevaDesk - Document management system
ClevaDesk - Document management system
Costa Voloskov
 
Unified client management session from Microsoft partner boot camp
Unified client management session from Microsoft partner boot campUnified client management session from Microsoft partner boot camp
Unified client management session from Microsoft partner boot campOlav Tvedt
 

What's hot (12)

10 key components of a document management system ppt
10 key components of a document management system ppt10 key components of a document management system ppt
10 key components of a document management system ppt
 
Documentum Overview
Documentum OverviewDocumentum Overview
Documentum Overview
 
Microsoft Forefront - Identity and Access Management Whitepaper
Microsoft Forefront - Identity and Access Management WhitepaperMicrosoft Forefront - Identity and Access Management Whitepaper
Microsoft Forefront - Identity and Access Management Whitepaper
 
Fine docs product presentation latest
Fine docs product presentation latestFine docs product presentation latest
Fine docs product presentation latest
 
Laserfiche10 highlights- how the new features can benefit your mobile and wor...
Laserfiche10 highlights- how the new features can benefit your mobile and wor...Laserfiche10 highlights- how the new features can benefit your mobile and wor...
Laserfiche10 highlights- how the new features can benefit your mobile and wor...
 
Document management the buyers handbook by Laserfiche.
Document management  the buyers handbook by Laserfiche.Document management  the buyers handbook by Laserfiche.
Document management the buyers handbook by Laserfiche.
 
SoftAge eDMS
SoftAge eDMSSoftAge eDMS
SoftAge eDMS
 
View 4 Customer Presentation
View 4 Customer PresentationView 4 Customer Presentation
View 4 Customer Presentation
 
docEdge - Enterprise Document Management Platform
docEdge - Enterprise Document Management PlatformdocEdge - Enterprise Document Management Platform
docEdge - Enterprise Document Management Platform
 
XenDesktop 7 Blueprint
XenDesktop 7 BlueprintXenDesktop 7 Blueprint
XenDesktop 7 Blueprint
 
ClevaDesk - Document management system
ClevaDesk - Document management systemClevaDesk - Document management system
ClevaDesk - Document management system
 
Unified client management session from Microsoft partner boot camp
Unified client management session from Microsoft partner boot campUnified client management session from Microsoft partner boot camp
Unified client management session from Microsoft partner boot camp
 

Similar to Cloudoc brochure eng_20170823

ClouDoc brochure_eng_20160708
ClouDoc brochure_eng_20160708ClouDoc brochure_eng_20160708
ClouDoc brochure_eng_20160708
sang yoo
 
Cloud docu ppt
Cloud docu pptCloud docu ppt
Why ClouDoc to protect CAD files?
Why ClouDoc to protect CAD files? Why ClouDoc to protect CAD files?
Why ClouDoc to protect CAD files?
Sang Yoo
 
Document Management System - docManager
Document Management System - docManagerDocument Management System - docManager
Document Management System - docManager
Rajesh Shah
 
Clou doc brochure_eng_20150406(전자메일첨부용)
Clou doc brochure_eng_20150406(전자메일첨부용)Clou doc brochure_eng_20150406(전자메일첨부용)
Clou doc brochure_eng_20150406(전자메일첨부용)
sang yoo
 
Why ClouDoc to protect CAD files?
Why ClouDoc to protect CAD files? Why ClouDoc to protect CAD files?
Why ClouDoc to protect CAD files?
Sang Yoo
 
Secure File Sharing Basics - What Every File Sharing Provider Should Have
Secure File Sharing Basics -  What Every File Sharing Provider Should HaveSecure File Sharing Basics -  What Every File Sharing Provider Should Have
Secure File Sharing Basics - What Every File Sharing Provider Should HaveBoxHQ
 
N2WDMS - A Workflow and Document Management Software
N2WDMS - A Workflow and Document Management SoftwareN2WDMS - A Workflow and Document Management Software
N2WDMS - A Workflow and Document Management Software
PranaySoluSoft
 
Document Centralization, SOFTCAMP MAXEON FX_ENG
Document Centralization, SOFTCAMP MAXEON FX_ENGDocument Centralization, SOFTCAMP MAXEON FX_ENG
Document Centralization, SOFTCAMP MAXEON FX_ENG
Softcamp Co., Ltd.
 
mcloudoc brochure eng
mcloudoc brochure engmcloudoc brochure eng
mcloudoc brochure eng
sang yoo
 
Wave 14 - Winodws 7 Security Story Core by MVP Azra Rizal
Wave 14 - Winodws 7 Security Story Core by MVP Azra RizalWave 14 - Winodws 7 Security Story Core by MVP Azra Rizal
Wave 14 - Winodws 7 Security Story Core by MVP Azra Rizal
Quek Lilian
 
Enadoc - Business Solutions: The Next Step
Enadoc - Business Solutions: The Next StepEnadoc - Business Solutions: The Next Step
Enadoc - Business Solutions: The Next Step
Dawn Ventura
 
MyWorkDrive
MyWorkDriveMyWorkDrive
MyWorkDrive
DrSajivS
 
Windows 10: Security Focus (part II)
Windows 10: Security Focus (part II)Windows 10: Security Focus (part II)
Windows 10: Security Focus (part II)
Juan Ignacio Oller Aznar
 
Windows 7 Enhanced Security And Control
Windows 7 Enhanced Security And ControlWindows 7 Enhanced Security And Control
Windows 7 Enhanced Security And Control
Keith Combs
 
Cloudciti Enterprise File Share Services
Cloudciti Enterprise File Share ServicesCloudciti Enterprise File Share Services
Cloudciti Enterprise File Share Services
PT Datacomm Diangraha
 
Cloudciti Enterprise File Share (EFS)
Cloudciti Enterprise File Share (EFS)Cloudciti Enterprise File Share (EFS)
Cloudciti Enterprise File Share (EFS)
PT Datacomm Diangraha
 
Paperless office
Paperless officePaperless office
Paperless office
LogicalDOC
 

Similar to Cloudoc brochure eng_20170823 (20)

ClouDoc brochure_eng_20160708
ClouDoc brochure_eng_20160708ClouDoc brochure_eng_20160708
ClouDoc brochure_eng_20160708
 
Cloud docu ppt
Cloud docu pptCloud docu ppt
Cloud docu ppt
 
Why ClouDoc to protect CAD files?
Why ClouDoc to protect CAD files? Why ClouDoc to protect CAD files?
Why ClouDoc to protect CAD files?
 
Document Management System - docManager
Document Management System - docManagerDocument Management System - docManager
Document Management System - docManager
 
Clou doc brochure_eng_20150406(전자메일첨부용)
Clou doc brochure_eng_20150406(전자메일첨부용)Clou doc brochure_eng_20150406(전자메일첨부용)
Clou doc brochure_eng_20150406(전자메일첨부용)
 
Why ClouDoc to protect CAD files?
Why ClouDoc to protect CAD files? Why ClouDoc to protect CAD files?
Why ClouDoc to protect CAD files?
 
Secure File Sharing Basics - What Every File Sharing Provider Should Have
Secure File Sharing Basics -  What Every File Sharing Provider Should HaveSecure File Sharing Basics -  What Every File Sharing Provider Should Have
Secure File Sharing Basics - What Every File Sharing Provider Should Have
 
N2WDMS - A Workflow and Document Management Software
N2WDMS - A Workflow and Document Management SoftwareN2WDMS - A Workflow and Document Management Software
N2WDMS - A Workflow and Document Management Software
 
Document Centralization, SOFTCAMP MAXEON FX_ENG
Document Centralization, SOFTCAMP MAXEON FX_ENGDocument Centralization, SOFTCAMP MAXEON FX_ENG
Document Centralization, SOFTCAMP MAXEON FX_ENG
 
DLP and MDM Datasheet
DLP and MDM DatasheetDLP and MDM Datasheet
DLP and MDM Datasheet
 
mcloudoc brochure eng
mcloudoc brochure engmcloudoc brochure eng
mcloudoc brochure eng
 
Wave 14 - Winodws 7 Security Story Core by MVP Azra Rizal
Wave 14 - Winodws 7 Security Story Core by MVP Azra RizalWave 14 - Winodws 7 Security Story Core by MVP Azra Rizal
Wave 14 - Winodws 7 Security Story Core by MVP Azra Rizal
 
Enadoc - Business Solutions: The Next Step
Enadoc - Business Solutions: The Next StepEnadoc - Business Solutions: The Next Step
Enadoc - Business Solutions: The Next Step
 
MyWorkDrive
MyWorkDriveMyWorkDrive
MyWorkDrive
 
Windows 10: Security Focus (part II)
Windows 10: Security Focus (part II)Windows 10: Security Focus (part II)
Windows 10: Security Focus (part II)
 
Windows 7 Enhanced Security And Control
Windows 7 Enhanced Security And ControlWindows 7 Enhanced Security And Control
Windows 7 Enhanced Security And Control
 
Cloudciti Enterprise File Share Services
Cloudciti Enterprise File Share ServicesCloudciti Enterprise File Share Services
Cloudciti Enterprise File Share Services
 
Cloudciti Enterprise File Share (EFS)
Cloudciti Enterprise File Share (EFS)Cloudciti Enterprise File Share (EFS)
Cloudciti Enterprise File Share (EFS)
 
LiveDOCS
LiveDOCSLiveDOCS
LiveDOCS
 
Paperless office
Paperless officePaperless office
Paperless office
 

More from sang yoo

Mcloudoc based telework_jpn_200226
Mcloudoc based telework_jpn_200226Mcloudoc based telework_jpn_200226
Mcloudoc based telework_jpn_200226
sang yoo
 
Mcloudoc based telework_chn_200226
Mcloudoc based telework_chn_200226Mcloudoc based telework_chn_200226
Mcloudoc based telework_chn_200226
sang yoo
 
Mcloudoc based telework_eng_200226
Mcloudoc based telework_eng_200226Mcloudoc based telework_eng_200226
Mcloudoc based telework_eng_200226
sang yoo
 
Mcloudoc based telework_kor_200226
Mcloudoc based telework_kor_200226Mcloudoc based telework_kor_200226
Mcloudoc based telework_kor_200226
sang yoo
 
Mcloudoc intro kor_20200519
Mcloudoc intro kor_20200519Mcloudoc intro kor_20200519
Mcloudoc intro kor_20200519
sang yoo
 
mcloudoc based telework_chn_20190823
mcloudoc based telework_chn_20190823mcloudoc based telework_chn_20190823
mcloudoc based telework_chn_20190823
sang yoo
 
mcloudoc brochure chn
mcloudoc brochure chnmcloudoc brochure chn
mcloudoc brochure chn
sang yoo
 
mcloudoc brochure jpn
mcloudoc brochure jpnmcloudoc brochure jpn
mcloudoc brochure jpn
sang yoo
 
mcloudoc brochure kor
mcloudoc brochure kormcloudoc brochure kor
mcloudoc brochure kor
sang yoo
 
Clou doc backupdoc_intro_chn_20191111
Clou doc backupdoc_intro_chn_20191111Clou doc backupdoc_intro_chn_20191111
Clou doc backupdoc_intro_chn_20191111
sang yoo
 
Clou doc backupdoc_intro_jpn_20191112
Clou doc backupdoc_intro_jpn_20191112Clou doc backupdoc_intro_jpn_20191112
Clou doc backupdoc_intro_jpn_20191112
sang yoo
 
Clou doc backupdoc_intro_kor_20191111
Clou doc backupdoc_intro_kor_20191111Clou doc backupdoc_intro_kor_20191111
Clou doc backupdoc_intro_kor_20191111
sang yoo
 
Telework leaflet eng
Telework leaflet engTelework leaflet eng
Telework leaflet eng
sang yoo
 
Telework leaflet jpn
Telework leaflet jpnTelework leaflet jpn
Telework leaflet jpn
sang yoo
 
Telework leaflet chn
Telework leaflet chnTelework leaflet chn
Telework leaflet chn
sang yoo
 
mcloudoc telework leaflet_kor
mcloudoc telework leaflet_kormcloudoc telework leaflet_kor
mcloudoc telework leaflet_kor
sang yoo
 
Mcloudoc ransomware leaflet_jpn
Mcloudoc ransomware leaflet_jpnMcloudoc ransomware leaflet_jpn
Mcloudoc ransomware leaflet_jpn
sang yoo
 
mcloudoc ransomware leaflet_chn
mcloudoc ransomware leaflet_chnmcloudoc ransomware leaflet_chn
mcloudoc ransomware leaflet_chn
sang yoo
 
mcloudoc ransomware leaflet_kor
mcloudoc ransomware leaflet_kormcloudoc ransomware leaflet_kor
mcloudoc ransomware leaflet_kor
sang yoo
 
Protect customer's personal information chn 191018
Protect customer's personal information chn 191018Protect customer's personal information chn 191018
Protect customer's personal information chn 191018
sang yoo
 

More from sang yoo (20)

Mcloudoc based telework_jpn_200226
Mcloudoc based telework_jpn_200226Mcloudoc based telework_jpn_200226
Mcloudoc based telework_jpn_200226
 
Mcloudoc based telework_chn_200226
Mcloudoc based telework_chn_200226Mcloudoc based telework_chn_200226
Mcloudoc based telework_chn_200226
 
Mcloudoc based telework_eng_200226
Mcloudoc based telework_eng_200226Mcloudoc based telework_eng_200226
Mcloudoc based telework_eng_200226
 
Mcloudoc based telework_kor_200226
Mcloudoc based telework_kor_200226Mcloudoc based telework_kor_200226
Mcloudoc based telework_kor_200226
 
Mcloudoc intro kor_20200519
Mcloudoc intro kor_20200519Mcloudoc intro kor_20200519
Mcloudoc intro kor_20200519
 
mcloudoc based telework_chn_20190823
mcloudoc based telework_chn_20190823mcloudoc based telework_chn_20190823
mcloudoc based telework_chn_20190823
 
mcloudoc brochure chn
mcloudoc brochure chnmcloudoc brochure chn
mcloudoc brochure chn
 
mcloudoc brochure jpn
mcloudoc brochure jpnmcloudoc brochure jpn
mcloudoc brochure jpn
 
mcloudoc brochure kor
mcloudoc brochure kormcloudoc brochure kor
mcloudoc brochure kor
 
Clou doc backupdoc_intro_chn_20191111
Clou doc backupdoc_intro_chn_20191111Clou doc backupdoc_intro_chn_20191111
Clou doc backupdoc_intro_chn_20191111
 
Clou doc backupdoc_intro_jpn_20191112
Clou doc backupdoc_intro_jpn_20191112Clou doc backupdoc_intro_jpn_20191112
Clou doc backupdoc_intro_jpn_20191112
 
Clou doc backupdoc_intro_kor_20191111
Clou doc backupdoc_intro_kor_20191111Clou doc backupdoc_intro_kor_20191111
Clou doc backupdoc_intro_kor_20191111
 
Telework leaflet eng
Telework leaflet engTelework leaflet eng
Telework leaflet eng
 
Telework leaflet jpn
Telework leaflet jpnTelework leaflet jpn
Telework leaflet jpn
 
Telework leaflet chn
Telework leaflet chnTelework leaflet chn
Telework leaflet chn
 
mcloudoc telework leaflet_kor
mcloudoc telework leaflet_kormcloudoc telework leaflet_kor
mcloudoc telework leaflet_kor
 
Mcloudoc ransomware leaflet_jpn
Mcloudoc ransomware leaflet_jpnMcloudoc ransomware leaflet_jpn
Mcloudoc ransomware leaflet_jpn
 
mcloudoc ransomware leaflet_chn
mcloudoc ransomware leaflet_chnmcloudoc ransomware leaflet_chn
mcloudoc ransomware leaflet_chn
 
mcloudoc ransomware leaflet_kor
mcloudoc ransomware leaflet_kormcloudoc ransomware leaflet_kor
mcloudoc ransomware leaflet_kor
 
Protect customer's personal information chn 191018
Protect customer's personal information chn 191018Protect customer's personal information chn 191018
Protect customer's personal information chn 191018
 

Recently uploaded

Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
Globus
 
Quarkus Hidden and Forbidden Extensions
Quarkus Hidden and Forbidden ExtensionsQuarkus Hidden and Forbidden Extensions
Quarkus Hidden and Forbidden Extensions
Max Andersen
 
First Steps with Globus Compute Multi-User Endpoints
First Steps with Globus Compute Multi-User EndpointsFirst Steps with Globus Compute Multi-User Endpoints
First Steps with Globus Compute Multi-User Endpoints
Globus
 
Developing Distributed High-performance Computing Capabilities of an Open Sci...
Developing Distributed High-performance Computing Capabilities of an Open Sci...Developing Distributed High-performance Computing Capabilities of an Open Sci...
Developing Distributed High-performance Computing Capabilities of an Open Sci...
Globus
 
Software Testing Exam imp Ques Notes.pdf
Software Testing Exam imp Ques Notes.pdfSoftware Testing Exam imp Ques Notes.pdf
Software Testing Exam imp Ques Notes.pdf
MayankTawar1
 
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...
Globus
 
SOCRadar Research Team: Latest Activities of IntelBroker
SOCRadar Research Team: Latest Activities of IntelBrokerSOCRadar Research Team: Latest Activities of IntelBroker
SOCRadar Research Team: Latest Activities of IntelBroker
SOCRadar
 
How Recreation Management Software Can Streamline Your Operations.pptx
How Recreation Management Software Can Streamline Your Operations.pptxHow Recreation Management Software Can Streamline Your Operations.pptx
How Recreation Management Software Can Streamline Your Operations.pptx
wottaspaceseo
 
Using IESVE for Room Loads Analysis - Australia & New Zealand
Using IESVE for Room Loads Analysis - Australia & New ZealandUsing IESVE for Room Loads Analysis - Australia & New Zealand
Using IESVE for Room Loads Analysis - Australia & New Zealand
IES VE
 
A Comprehensive Look at Generative AI in Retail App Testing.pdf
A Comprehensive Look at Generative AI in Retail App Testing.pdfA Comprehensive Look at Generative AI in Retail App Testing.pdf
A Comprehensive Look at Generative AI in Retail App Testing.pdf
kalichargn70th171
 
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, BetterWebinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
XfilesPro
 
Advanced Flow Concepts Every Developer Should Know
Advanced Flow Concepts Every Developer Should KnowAdvanced Flow Concepts Every Developer Should Know
Advanced Flow Concepts Every Developer Should Know
Peter Caitens
 
De mooiste recreatieve routes ontdekken met RouteYou en FME
De mooiste recreatieve routes ontdekken met RouteYou en FMEDe mooiste recreatieve routes ontdekken met RouteYou en FME
De mooiste recreatieve routes ontdekken met RouteYou en FME
Jelle | Nordend
 
Visitor Management System in India- Vizman.app
Visitor Management System in India- Vizman.appVisitor Management System in India- Vizman.app
Visitor Management System in India- Vizman.app
NaapbooksPrivateLimi
 
Why React Native as a Strategic Advantage for Startup Innovation.pdf
Why React Native as a Strategic Advantage for Startup Innovation.pdfWhy React Native as a Strategic Advantage for Startup Innovation.pdf
Why React Native as a Strategic Advantage for Startup Innovation.pdf
ayushiqss
 
Large Language Models and the End of Programming
Large Language Models and the End of ProgrammingLarge Language Models and the End of Programming
Large Language Models and the End of Programming
Matt Welsh
 
Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...
Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...
Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...
Anthony Dahanne
 
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...
Shahin Sheidaei
 
How to Position Your Globus Data Portal for Success Ten Good Practices
How to Position Your Globus Data Portal for Success Ten Good PracticesHow to Position Your Globus Data Portal for Success Ten Good Practices
How to Position Your Globus Data Portal for Success Ten Good Practices
Globus
 
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital TransformationWSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2
 

Recently uploaded (20)

Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
 
Quarkus Hidden and Forbidden Extensions
Quarkus Hidden and Forbidden ExtensionsQuarkus Hidden and Forbidden Extensions
Quarkus Hidden and Forbidden Extensions
 
First Steps with Globus Compute Multi-User Endpoints
First Steps with Globus Compute Multi-User EndpointsFirst Steps with Globus Compute Multi-User Endpoints
First Steps with Globus Compute Multi-User Endpoints
 
Developing Distributed High-performance Computing Capabilities of an Open Sci...
Developing Distributed High-performance Computing Capabilities of an Open Sci...Developing Distributed High-performance Computing Capabilities of an Open Sci...
Developing Distributed High-performance Computing Capabilities of an Open Sci...
 
Software Testing Exam imp Ques Notes.pdf
Software Testing Exam imp Ques Notes.pdfSoftware Testing Exam imp Ques Notes.pdf
Software Testing Exam imp Ques Notes.pdf
 
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...
 
SOCRadar Research Team: Latest Activities of IntelBroker
SOCRadar Research Team: Latest Activities of IntelBrokerSOCRadar Research Team: Latest Activities of IntelBroker
SOCRadar Research Team: Latest Activities of IntelBroker
 
How Recreation Management Software Can Streamline Your Operations.pptx
How Recreation Management Software Can Streamline Your Operations.pptxHow Recreation Management Software Can Streamline Your Operations.pptx
How Recreation Management Software Can Streamline Your Operations.pptx
 
Using IESVE for Room Loads Analysis - Australia & New Zealand
Using IESVE for Room Loads Analysis - Australia & New ZealandUsing IESVE for Room Loads Analysis - Australia & New Zealand
Using IESVE for Room Loads Analysis - Australia & New Zealand
 
A Comprehensive Look at Generative AI in Retail App Testing.pdf
A Comprehensive Look at Generative AI in Retail App Testing.pdfA Comprehensive Look at Generative AI in Retail App Testing.pdf
A Comprehensive Look at Generative AI in Retail App Testing.pdf
 
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, BetterWebinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
 
Advanced Flow Concepts Every Developer Should Know
Advanced Flow Concepts Every Developer Should KnowAdvanced Flow Concepts Every Developer Should Know
Advanced Flow Concepts Every Developer Should Know
 
De mooiste recreatieve routes ontdekken met RouteYou en FME
De mooiste recreatieve routes ontdekken met RouteYou en FMEDe mooiste recreatieve routes ontdekken met RouteYou en FME
De mooiste recreatieve routes ontdekken met RouteYou en FME
 
Visitor Management System in India- Vizman.app
Visitor Management System in India- Vizman.appVisitor Management System in India- Vizman.app
Visitor Management System in India- Vizman.app
 
Why React Native as a Strategic Advantage for Startup Innovation.pdf
Why React Native as a Strategic Advantage for Startup Innovation.pdfWhy React Native as a Strategic Advantage for Startup Innovation.pdf
Why React Native as a Strategic Advantage for Startup Innovation.pdf
 
Large Language Models and the End of Programming
Large Language Models and the End of ProgrammingLarge Language Models and the End of Programming
Large Language Models and the End of Programming
 
Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...
Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...
Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...
 
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...
 
How to Position Your Globus Data Portal for Success Ten Good Practices
How to Position Your Globus Data Portal for Success Ten Good PracticesHow to Position Your Globus Data Portal for Success Ten Good Practices
How to Position Your Globus Data Portal for Success Ten Good Practices
 
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital TransformationWSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
 

Cloudoc brochure eng_20170823

  • 1. Work Less and Get More ClouDoc Document centralization The optimal choice for document management and document security
  • 2.
  • 3. Since its foundation in 2002, NET-ID has been committed to providing solutions based on long-term trust with customers under the slogan of ‘Create conscientious software!’ We prioritize this value most from product design through to production as well as maintenance.
  • 4. Document centralization Necessity of document centralization Document centralization is an entirely new concept in document management and document security solutions which is still at an early stage in the world. Document centralization uses the existing PC work environment, but it does not use the VDI (Virtual Desktop Infrastructure) and there is a ‘forced centralization of document saving effect’ when VDI (Virtual Desktop Infrastructure) is introduced. In addition, high-performance tasks such as CAD drawing and graphic work can be performed by using the CPU and memory of the user PC as it is.
  • 5. Background of document centralization Loss of documents from ransomware Leakage of industry- leading technology by industrial spies Frequent customer privacy leakage Loss of time/money due to loss of document or searching
  • 6. Conventional method Problems Management plan Lack of ransomware response Increased TCO due to ‘introduction· troubleshooting·maintenance’ by solution All employees’ PCs are management targets Lack of document encryption compatibility Possibility of information leakage during PC disposal·replacement Risk of possible loss of personal information encryption key Concerns regarding reduced PC performance due to various security features Media control Document encryption Document management Existing document management and security solutions are challenged by the requirements of today's changing business environment, including ransomware response. Personal information protection
  • 7. Document centralization response method The scattered documents saved on the PC are centralized, simplifying management and security targets. NO DATA UserUser User Ransomware blocking Prohibiting PC saving Controls media, including USB Clipboard Copy / Screen Capture / Print control Central server Windows Explorer drive document management
  • 8. Features of the response method of document centralization Centralized document management Business continuity Document management point is one central server Documents always stay in the central server, so work is continued One Stop service, low-cost operation, simple troubleshooting, etc. No possibility of information leakage due to replacement or disposal of PC equipment Work takeover is smooth for transferring departments, retirement, etc. Ransomware blocking and follow up response functions One Agent integrated environment Information leakage prevention Ransomware blocking Smooth takeover
  • 9. ClouDoc ClouDoc’s differentiated security · management functions Based on the Windows Explorer drive technology, ClouDoc offers leading-edge compatibility in performance, safety, networking, and security. Also, it provides security architecture based on a hash value rather than a program name, and is the only document centralization solution that can replace DLP and DRM functionality. In addition to this, ClouDoc offers the additional features that industry needs most ahead of the curve.
  • 10. Compatibility Expandability Security Convenience The only Windows Explorer drive-based product that meets convenience/performance/minimal traffic/compatibility The only product that can save everything from general documents to 3D CAD drawings directly to the central server and print The only product with direct central input and output without leaving a copy of the document on the PC Manufacturing support Prevention of information leakage The only product with excellent compatibility with a wide range of applications for business needs The only product that can prevent security control bypass from changing the file extension, application name, etc. Provides the additional features required by industry ahead of the curve Compatibility Security Expandability The only product that saves directly to the central server without going through the inconvenient method of uploading to the server after saving the PC Fast speed Permanent license, not a built in unit, so it can be transferred to any performance server The only product that can provide Active-Active service with only L4 switching without separate paid WAS such as JEUS Permanent license Economic feasibility Features of ClouDoc
  • 11. Module configuration by ClouDoc functionality Push service External document exchange service Backup appliance  Basic functions centralized document management PC backup PC log Mobile Disk lock External DRM Search engine Disk lock plus Secure viewer Project version management Network lock Personal information protection Overview of ClouDoc function
  • 12. ClouDoc provides a convenient collaborative environment through systematic document management. Basic functions ClouDoc main functions Provides personal/team/shared document drive environment with HTTP (S)-based internal protocol Preventing document loss from simultaneous editing between first user and other users Document sharing with employees from a department without document centralization or a partner company Supports IE, Chrome, Safari, Firefox, etc.Provides personal/team/shared document drive Prepare for loss of documents due to overwriting when editing office documents, etc. Provides functions to set permissions for the management scope, to manage capacity, and to assign a sub folder manager Sharing documents on a central server with other employees via Share Folder or Copy Document Link Provides community functions for teams, TFTs or clubs Manages the software installation files and provides the installation files for user requested products Provides Java Explorer UI for Linux and Macintosh Auto lock files in use (auto check in/check out) Collaborate with other departments and partners via guest ID function Heterogeneous web browser UI support Windows Explorer drive UI support Version management of MS office documents etc. Permission and capacity management by folder manager Document collaboration between employees Web page-based community features SW installation file application system 15
  • 13. Disk lock Provides functions to prohibit document saving on the local PC and control media. ClouDoc main functions The only product that uses a hash-value based no-save policy, not an application name based one Proactively prevent ransomware from affecting documents in the centralized drive Business application list registration, category definition and management Provides various media control functions to completely replace existing DLP Requires approval from team leader/folder manager to attach or export documents to email Blocks existing document leaks present on the PC and provides a central upload environment Windows PC application category management PC saving prohibition policy by application category Ransomware blocking functions Direct device control Export procedures by export purpose Collect and protect work files scattered on existing PCs 16
  • 14. Disk lock plus This feature allows you to replace DRM, a security solution using document encryption. ClouDoc main functions A function that allows only business programs to open the document in the central drive and prevent the contents of the document from being copied to a non- business program. It is designed so that copying the contents of documents between business programs is still allowed, so that the convenience of work is not hindered. Prevents information leakage through screen capture of business programs Function to register printers to allow printing Flexible structure that can design different policies by team or individual employee Various items related to printing are logged and can be viewed by the administrator Copyrighted information can be identified by printing the registered image or text in the user's background when printing Function to adjust transparency, angle, text size of watermark image/text as background, user information output location setting is also possible Screen capture prohibition Clipboard copy prohibition Print prohibition Print log Print watermark 17
  • 15. Mobile support Provides the ability to use ClouDoc on mobile devices such as smart phones and tablets. Provides IOS, Android, smart phone, tablet UI Camera and album linking function Viewing personal/team/shared documents drive Security functions such as Device Register, Pursuit Location, and Remote Delete Internal connection via external proxy server Employees can install the ClouDoc app for use Function to directly upload videos and photos from a camera to the central drive Multiple photos can be selected and uploaded to a central server at once Provides functions such as copy, move, delete, restore, upload, download and browse, as well as viewing the list of central device document drive folders available for the mobile device Provides security measures for approval of use, loss response, and data stored on mobile devices Without a VPN client, you can connect to the internal ClouDoc server only by proxy server setting from the outside 18
  • 16. Search engine Provides file content search function through a search engine in addition to file name search. Provides content search function in Windows Explorer Provides contents search of various file formats Convenient search results UI Provides search function for document metainformation Indexing and searching contents of scanned documents Provides content search function in Windows Explorer Function to search contents by extracting text from scanned documents Provides search function for the metainformation contained in files such as JPG, PNG, MP3, MP4, DWG Searchable file formats Html, xhtml, XML, Microsoft Office, Open office, Hwp, pdf, Tar, AR, CPIO, Zip, 7Zip, Gzip, BZip2, XZ, Pack200, txt, rtf, mp3, bmp, gif, png, jpeg, tiff, mp4, quick time, 3gpp, Java, C, C++, Groovy, dwg Convenient searching for personal/team/ shared documents drive 19
  • 17. External DRM Encrypts the exported items and sends them via e-mail attachment or link for secure file transfer to external partner companies. Send encrypted files to partner companies Online recipients are protected by OTP, real-time blocking, browsing limits Send encrypted folder as well as file Send file as attachment and link Offline recipients are protected by a password Encrypts the exported item so that only authenticated partner company users within its permitted authority can view the document For users with Internet access, it provides more secure e-mail OTP, limiting the number of browsers and checking file blocking in real time. Folder can be transferred by improving existing DRM function, so the folder structure can be maintained when transferring CAD drawings or project documents. Users can set export details such as file transfer method (file attachment/link) and authentication method (online/offline) etc. For offline users who cannot connect to the Internet, an authentication method through password is provided. 20
  • 18. External document exchange service Provides a service for sending large files to the outside via its own server. External document exchange server in DMZ Receive documents from partner companies Internal employee sends document link to partner company Non-repudiation of document downloads by partner company employees DMZ: Internet section accessible by internal employees and partner companies. Provide a secure environment for exchanging large documents safely by installing server in DMZ The external partner companies can upload to the external document exchange server with a guest ID. Documents uploaded to the external document exchange server are automatically copied to the internal document central server. The internal employee can send documents to an external company through link mail after requesting approval from the team leader. Sent documents are duplicated for tracing in case of emergency and also to manage the history log. Partner company employees who receive large-sized file links must receive the One Time Password via email and enter it to download. The email is sent by the original document sender and it is impossible to receive a one time password through an alternate email. 21
  • 19. Network lock This function is used to prevent information leakage from malicious code by dividing the network into internal and external networks that a PC can access. Internal network mode, external network mode Internal network blocking in external network mode External network blocking in internal network mode Document exchange between networks Internal network = The company's internal network IP band / External network = The IP band that can use the Internet. The IP bands are set by the administrator and the domain name can be used instead of the IP band. The connection to the internal network, groupware, ERP, etc. is blocked and the Internet is allowed. The groupware and ERP can be used with the internal network, but the use of the internet is blocked. (However, access to the site used by employees for business purposes is permitted.) ClouDoc offers documents exported off of the central server in the internal network mode or the use of the document downloaded from the Internet in the external network mode while in the internal network mode by utilizing the export security disk present in the PC. 22
  • 20. PC log Provides search function by storing the file input and output related logs to PC local disk. Record various local disk inputs and outputs Browse and search saved logs Assign log subject file input and output Provides statistical charts related to various logs Restricts log acquisition subjects such as application, extension, path, and etc. Creates multiple policies to apply to individuals and teams Record input and output of fixed disk, USB/external disk, network drive, CD/DVD, various disks provided by ClouDoc, and other disks Provides the administrator search function for saved logs It specifies work for each log such as creating, reading, writing, deleting, renaming, copying, and moving files. Log acquisition subject by application type, file extension type, log subject folder path, assign log exclusion subject folder Provides statistical charts by application, document type, device, time. Creates and manages multiple policies in advance, and specifies policies to apply to individuals and teams in the organization chart. 23
  • 21. Secure viewer It converts Office documents to provide view-only functions without downloading documents from the OS such as Mobile/Macintosh/Windows, etc. Office document conversion View-only function without downloading Provides office document conversion functions through document conversion server View without downloading using the ClouDoc mobile App or Web Explorer for Macintosh, view linked documents without downloading Write function Provides the function of inserting text or graphics in 'Office documents converted to PDF' 24
  • 22. Personal information protection Detection pattern management User management functions for detecting personal information Detecting personal information by personal and team document drives Email report to individual, team leader, service manager, etc. Registers and manages various detection patterns corresponding to personal information. Provides user management functions such as retention, false positives, isolation, deletion, and release Provides statistical information along with the functions to check the detection file name, detection pattern, etc. by document drive. Providing personal information detection guidance emails for individuals, team leaders, service managers, etc. 25 Provides personal information detection and action for the personal and team document drives for centralized documents.
  • 23. Project version management This function is applicable to all kinds of documents. This is an especially effective version control method for 3D CAD projects. Version management regardless of document type Scheduled backup, incremental backup, restore in case Useful for 3D CAD drawing version management This function backs up the whole folder in the current state in an incremental backup method regardless of document extension or header type. This can be useful for simple document-oriented projects, program source code, CAD drawing production projects, and even projects with many different types of mixed documents. The entire structure of the folder is backed up and only the added or modified files are copied  → Minimize required storage capacity & restore documents in Windows Explorer if needed The project version control function provides the version control function of the drawing, which is excellent for the security of the manufacturer’s most important property 26
  • 24. Push service Service to deliver various events to users in real time. This function allows you to receive events related to ClouDoc service on various devices. Push service Enterprise solution architecture that anyone can use Support for mobile devices such as iOS and Android Push service such as announcements, document export, link mail, payment approval, confirmation of approval request, approval, rejection A function created considering general purpose push service environments  → ClouDoc Push API can be used on systems other than ClouDoc Push services available on iOS and Android-based smart phones and tablets 27
  • 25. PC backup This feature is for when you want to securely back up your PC's data to a central server for those who only use the basic Instant / scheduled backup File integrity check Incremental backup Provides restoration functions Schedule a backup so that if the PC is connected to the server at that time, the backup will start automatically In addition to backing up the source files of the PC to the central server, it also compares the hash values of the source and backup files to complete the backup Only new or modified files for existing backup source files on the PC are backed up to the server Function to restore central backed up files to PC Backup and restore related tasks and error history can be logged and verified 28 functions of the document folder without centralizing the documents.
  • 26. Net-ID has advanced know-how through various projects since the beginning of the document centralization market in 2009. In particular, we have provided products to more than 50 new customers each year for three years from 2014 to 2016, with an average annual growth rate of 36%. Company that provides solutions based on customer trust
  • 27. Customers More than 50 new customers each year for 3 years, 2014~2016 and annual sales growth rate is 36%! Major company Semiconductor Distribution & Service IT Automobile Finance Defense Industry Medical & Pharmaceutical Energy Civil Engineering Architecture Public Educational Institutions Food & Beverage International
  • 28. Social Media Homepage Facebook Youtube Linkedin Slideshare Naver blog (KR) Tistory blog (KR) Google blog (EN) Google blog (JP) Weibo blog (CN) www.net-id.co.kr www.facebook.com/cloudoc.netid www.youtube.com/coreajazz2 www.linkedin.com/pub/sang-yoo/22/a27/747 www.slideshare.net/slyoo blog.naver.com/coreajazz cloudoc.tistory.com/category mycloudoc.blogspot.kr cloudocjapan.blogspot.jp weibo.com/cloudoc Work Less and Get More