SlideShare a Scribd company logo
1 of 26
SoftCamp Company Introduction
2018.05
www.softcamp.co.kr
The power to do safely
2
Contents
01/ SoftCamp Introduction
02/ Security Market Status
03/ Key Product Introduction
3
Contents
SoftCamp Company Introduction
General Status
Company History
Organization Structure
Business Area
Awards and Certifications
Major Clients
Overseas Business
Corporate Vision
Competitiveness
© SOFTCAMP Co., LTD. All rights reserved.
4
SoftCamp General Status01
ㅣ Total
Revenue
ㅣ Number of
Employees
ㅣ CEO
ㅣ Established
ㅣ Company SoftCamp Co., Ltd.
July, 1999
Bae Hwan-kuk
115 (71% on R&D)
13.7 billion KRW (as of 2017)
Technology-oriented
management
Verified
Technological
prowess
Stable overseas
business
ㅣ Address
17, Pangyo-ro 228beon-gil, Bundang-gu,
Seongnam-si, Gyeonggi-do
ㅣ Contact
Info.
TEL: 1644-9366 ㅣ FAX: 031-697-4599
ㅣ Website
Homepage : www.softcamp.co.kr
Blog : http://story.softcamp.co.kr/
We ensure our clients
to perform their task safely
and securely
SoftCamp Co., Ltd.
SoftCamp is a security company equipped to protect information properties
of client enterprises from both internal and external threats
© SOFTCAMP Co., LTD. All rights reserved.
5
SoftCamp Company History01
1999 - 2005 2006 - 2011 2012 - Present
1999 - SoftCamp established
- Released shared PC management product PC Keeper
- Concluded export contract with Japan’s ALSI for
PC-Keeper
2000 - PC-Keeper selected as software for administrative
operation
2001 - PC-Keeper selected as excellent training software
2002 - Released DRM Document Security
- Released keyboard security product Secure KeyStroke
2003 - Selected as ‘Optimal SME for Export’ led by Small
and Medium Business Administration
- Document Security won GS certification
- Concluded distribution contract with Japan’s ALSI for
PC-Keeper
2004 - Won Information and Communications Minister
Award at the Digital Innovation Award
- Secure KeyStroke won bronze prize at the Small and
Medium Business Technology Innovation Award
2005 - Obtained Korea Technology Finance Corporation’s
Transparent Management Certification
- Selected as Document DRM for IT Security
Certification Agency verified encryption module
2006 - Won ‘One Million Dollar Tower of Export’ on the 43th
Trade Day
- Obtained Ministry of Science and Technology New
Excellent Technology certification
- Secure KeyStroke obtained GS certification
2007 - Selected as keyboard security for IT Security Certification
Agency verified encryption module
- Document Security obtained GS certification
2008 - Won SME Business Cooperation Foundation President’s
Award and Beautiful Partnership Award
2009 - Selected as Area DRM for IT Security Certification
Agency verified encryption module
- Area DRM won GS certification
2010 - Keyboard security won GS certification
- Document security recorded largest market share in Japan
2011 - Selected as Area DRM for IT Security Certification
Agency verified encryption module
- Released Mobile DRM
2012 - Patent registration in the U.S. and Japan for keyboard security
in kernel area
2013 - Released SHIELDEX for CDR Solution
- Patent registration in Korea for secure data carrying-out control
system
2014 - Patent registration of technology for full-time surveillance and
isolation of incoming files
- Listed on the KONEX
2015 - Achieved ISO/IEC 27001 Information Security Certification
- Achieved GS Certification for 'SHIELDEX’
- Won SW industry development award and Ministry of Science, ICP,
and Future Planning award
- Won IT Convergence Entrepreneur award by Ministry of Trade,
Industry, and Energy
2016 - Won Industry Security award by Ministry of Commerce, Industry,
and Energy
- Achieved GS Certification for Keyboard security Secure KeyStroke WS
2017 - Released S-Work FX for PC Virtualization Solution
- Released OneStop CDR Solution SHIELDEX AD
- Transferred the office to Pangyo Seven Venture Valley
For the last 19 years, we have been the leader of the information security market,
providing new security technology and service
© SOFTCAMP Co., LTD. All rights reserved.
6
SoftCamp Organization Structure01
SoftCamp is a R&D driven enterprise with 115 employees,
71% of which are engineers and development personnel
Business Strategy
Business Support
Dept.
CEO
Total 115
Sales
Consultant
Financial Sales Dept.
Enterprise Sales Dept.
Public Sales Dept.
Overseas Sales Dept.
23 Employees
(20%)
Special Sales Dept.
Japan Branch
Sales Management
7 Employees
(6%)
Level Number of people
Premium 21
Top 6
Medium 16
Beginner 38
Other 1
Total 82
Premium
level
26%
Top
level
7%
Medium
level
20%
Beginner
level
46%
Business Strategy
Dept.
R&D Business
R&D Dept.
DevOps Dept.
DS Business Dept.
DS R&D
SW Business Dept.
SW R&D
MX Business Dept.
MX R&D
SD Business Dept.
SD R&D
65 Employees
(57%)
19 Employees
(17%)
<Based on the Software Industry Promotion Act’s technician level standards>
© SOFTCAMP Co., LTD. All rights reserved.
7
SoftCamp Business Area01
We provide the optimal security solution for internal leakage and external threat
based on kernel based security technology
Document DRM
Document Security
Electronic document encryption
Various permission control
Information leakage
prevention/control solutions
Area DRM
S-Work FX
Storing/Controlling in a specific virtual
security area and leakage prevention
through PC virtualization technology,
unstructured data security solution
Document Centralization
MAXEON FX
Store electronic documents in central storage facility
Comprehensive management based on Distributed
File System
Solutions achieving innovative business collaborative
system
Document Disarm &
Reconstruction
SHIELDEX
Content disarm and reconstruction through
CDR technology
APT, Ransomware malware prevention solution that
allows only safe documents
SECURE OS
Performing security
on the OS level
© SOFTCAMP Co., LTD. All rights reserved.
8
SoftCamp Awards and Certifications01
Our technological skills are approved by various certifications and our feats
on SW development are acknowledged by multiple awards
2009.10
Ministry of
Knowledge Economy
Industry technology
security award
2009.02
Ministry of
Knowledge Economy
Certified for the company
Leading new development
2006.11
Korea International
Trade Association
Top of 1 million
dollars export
2016.06
Korea Industry Security
Research Association
Industry security award
For SME
2015.11
Ministry Future Science
SW industry
development
award
2015.11
Ministry of
Trade Industry
and Energy
IT convergence
Entrepreneur award
NIS IT Security Certification Center
Selected as the national encryption product
Bureau Veritas
Certified International standard information security
ISO 27001
Ministry of Knowledge Economy
Designated as the leading manufacturing technology
research center
Telecommunications Technology Association
Certified Software quality
Korea Industrial Technology Association
Certified as new technology retaining company
Ministry of SME
Designated as adequate medium sized company
for export
Technology Finance Corporation
Designated as blue-chip technology company
International Industry Certification Center
Designated as ISO-9001 quality business
International Industry Certification Center
Designated as ISO-14001 environment business
© SOFTCAMP Co., LTD. All rights reserved.
9
SoftCamp Major Clients01
Retaining 400 domestic and 100 Japanese clients,
we have been selected as the standard product for domestic groups
OverseasDomestic
© SOFTCAMP Co., LTD. All rights reserved.
10
SoftCamp Overseas Business01
From early stage of establishment, we have successfully expanded to Japan
and created new development drives through overseas business
SOFTCAMP
41%
HITACHI
18%
ADOBE
9%
ORACLE
7%
EMC 3%
Etc.
22%
Japan IRM(DRM) Market Share
[ITR Market View – Contents market 2010 report]
Japan
IRM
(DRM)
Japanese Local Partners Overseas Market Expansion Efforts
1999 Expanded to Japanese market
Upon Establishment, successfully expanded to Japan through public PC
management program ‘Win-Keeper’
Successfully settled in the Japanese
document security market
Launched document DRM ‘Document Security’ in Japan through Alps
System Integration(ALSI)
Introduced and settled in large corporates with over 1000 employees
Gained first position in Japanese document
security market share
2010 ‘ ITR : ITR Market View contents management market report
Launched Japan CDR/Disarm & Reconstruction
market
Launched CDR/Disarm & Reconstruction solution ‘SHIELDEX’ complying
with the Japanese municipal government’s ‘Regulation on Network
separation and disarmament’
Introduced and led the market for disarm solution all over Japanese
municipal government
© SOFTCAMP Co., LTD. All rights reserved.
11
SoftCamp Overseas Business01
We are considering expansion toward security market
in South East Asia, America, and EU based on the success in Japan
North
America
EU
Middle
East
Japan
ASEAN
© SOFTCAMP Co., LTD. All rights reserved.
12
SoftCamp Corporate Vision01
The Global Star Security Company
Develop and service SW that enables safer usage of document
The Global Star Security Company
The power to do safely
A company that helps customers perform their task safely and securely
Develop and service SW that enables safer usage of document
more
Create
Innovative Product
Creating innovative products that
currently does not exist
more
Reduction
Reduce Opportunity Cost
Reducing product development,
operation cost, and employee efforts
more
Increase
Increase Value
Service value
Customer satisfaction
more
Confidence
Trust Based
Providing high quality
product and service
핵심
가치
핵심
역량
기업
비전
슬로건
미션
Core Value
Core
Competency
Corporate
vision
Slogan
Mission
© SOFTCAMP Co., LTD. All rights reserved.
13
SoftCamp Competitiveness01
We pursue stable overseas business based on verified document security technology
and research & technology oriented management in Japan
Verified Technological
Prowess
The largest domestic group
Designated as the standard product for
information leakage prevention for
financial holding company
Introduced domestic document security
1st in financial and corporate
Holds the most number of clients
Designated as the standard product for
document security, blueprint security for
Hyundai Motor Group.
Technology-oriented
Management
A research oriented company with
retaining 72% of its employees as
developer and engineers
Registered multiple domestic/overseas
patents
Gains intellectual properties with various
technology verifications
Designated as national encryption
product for document/area DRM,
keyboard security for NIS IT security
certification center
Stable Overseas
Business
Formed strategic partnership with Japan’s
local ALSI company, which has been
maintained for over 10 years
Settled in the Japanese market for
document security, disarm solution with
verified technological prowess
Researched and expanded to Chinese,
South East, American markets based on
the stable overseas business in Japan
Technology-oriented
management
Verified
Technological
prowess
Stable overseas
business
14
Contents
Security Market Status
Change in the information security paradigm
Status and response of cyber attacks
Information leakage prevention market status
Laws on information leakage prevention
© SOFTCAMP Co., LTD. All rights reserved.
15
Change in Information Security Paradigm02
As the loss on cyber attacks grows, the environment of IT usage is changing
and the information security paradigm for countermeasures are being developed
3rd Generation
1st Generation
2nd Generation
4th Generation
Environment
Year
2017201220032000
Network Security
(External access control)
Response to external attack
(APT, Ransomware)
Physical Security
Data/System Security
(Prevention of internal
information leakage)
© SOFTCAMP Co., LTD. All rights reserved.
16
Change in Information Security Paradigm02
As the loss on cyber attacks grows, the environment of IT usage is changing
and the information security paradigm for countermeasures are being developed
Policy
Growing need for collaborative policies on
global security threat response
Discussions on information security by major
international organizations
Economy
Increasing damages on leakage of industrial secret
Increasing damages due to growing number of
cyber crimes
Creating new market by combining industry/secret
Environment
Increasing vulnerabilities in information
security environment
Spreading of Eco-friendly U-City and
smart work
Technology
Developing various response techniques for
security threats
Emergence of converged security technology
Society
Growing number of Cyber infestation incidents
Emergence of new types of cyber crime
© SOFTCAMP Co., LTD. All rights reserved.
17
Status and Response of Cyber Attacks02
Global cyber attacks are growing and evolving at a phenomenal pace,
and new security technologies are gaining attention as countermeasures
Number of personal information leakages and APT
attacks increasing!
Growing need for information leakage prevention
Domestic and Overseas Major Cyber Attacks and Information Leakage Cases
Operation Aurora
Leaked source codes and
industrial secrets of 30
companies including Google
and Dow Chemical
APPSILON
Email Infringement
Extorted 50 client email
accounts including Citi
Bank and Disney
KHNP APT Attack
Infected 8 internal PCs,
destroyed 5 PCs
Leaked 94 employee addresses
and power plant blue prints
SONY PSNHacking
SONY PlayStation Network
Leaked 77 million users’
personal information
Suspended service for
2 months
2010
1 2
2011
3
2011
4
2014
Seoul Metro Hacking
Hacked computer
management server
Infected 53 PCs with malicious
code
Gained unauthorized access
to 213 PCs
5
2015
6
2016
Hanjin, SK Hacking
Infected internal PCs
with malicious code
Leaked 42,608 documents
related to domestic
defense industry
2000 2002 2004 2006 2008 2010 2013 2017
Increase in cyber threats in domestic and overseas
Danger level
DDoS attack
Personal information leakage
APT attack
© SOFTCAMP Co., LTD. All rights reserved.
18
Status and Response of Cyber Attacks02
Global cyber attacks are growing and evolving at a phenomenal pace,
and new security technologies are gaining attention as countermeasures
Japanese Government Policy and Gartner ProposalGrowth and Evolution of Global Cyber Attacks
Gartner’s original APT countermeasure is in dilemma.
Instead of relying on behavior analysis method using
Sandbox, we proposed a new technology of
Contents Disarm and Reconstruction (CDR)
Japan’s Adoption of Regulation on Contents Disarm and Reconstruction (CDR)
by Ministry of Internal Affairs and Communications
Gartner Technology Proposal‘2017 Iran Hack attempted to explode a Saudi Petro-chemical company
‘2016 Russia Hack attempted to penetrate US energy nuclear/capital/airport infrastructures
‘2015 China Hacked US personnel management department, leaked 21.5 million federal officials’
personal information
‘2014 China Hacked 24 blueprints of high-tech weapon system including F-35
‘2013 North Korea Carried out cyber terrorism on South Korean Broadcasts/Finance facilities
‘2012 Iran Carried out cyber attacks on US finance facilities and Israeli government
‘2011 North Korea Paralyzed NH bank network, disrupted South Koreans communication devices
Cases of Global Cyber Attacks
APT Attack
Advanced Persistent Threat
Intellectual target attack
Ransomware
A hack that holds the data
hostage and demands ransom
© SOFTCAMP Co., LTD. All rights reserved.
19
Information Leakage Prevention Market Status02
The information leakage prevention market is on the rise, as the loss
on technology leakage caused by industrial spies continue to increase
6
26
29
31 32
42 43 41
46
30
49
63
0
10
20
30
40
50
60
70
2003 2004 2005 2006 2007 2008 2009 2010 2011 2012 2013 2014
Number of detection of industrial spies according to year
The higher the technology,
the more industrial spies there are!
“Industrial spies are one of the biggest business in the 21st
century, and they will never disappear!”
– Futurist Alvin Toffler –
Industrial spies in scale  field
16%
64%
Large
corporate
s
SMEs
Large Corporate<SME
The damage is greater
2010~2014 / 5 years base
*Other 20%
University
Public research center
Precision instrument
Electric
Communication Bioengineering
Other Chemical
34%
26%
16%
14%
7%
3%
Precision instrument was
the highest at 34%
Moved from electric
to precision instrument
2010~2014 / 5 years base
Expected loss
on technology leakage
Average annual loss of
technology leaked
companies
50 trillion
KRW estimate
KAITS source
3% of GDP in 2014
SMEs X 4,700
Equivalent to an SME’s
annual revenue
SME’s annual revenue
10.7 billion(2013)
[Source : NIS industrial secret protection center]
© SOFTCAMP Co., LTD. All rights reserved.
20
Laws on Information Leakage Prevention02
SoftCamp reinforces information security laws related to information leakage
prevention, and develops and provides legitimate security solutions
Laws on Prevention and
Protection of Industrial
Technology Leakage
Clause 14 (Protection of Core National Technology)
 The institution retaining and managing core national technology must abide by the following protection measures
 Protection of core national technology related data process and the data related to the result
 Establishing response system for core national technology leakages
Management and Protection of Personal Information
 Managing unique identification number such as social security number, license number, military number, passport number, etc.
Mandatory security measures such as encryption when managing prohibited and unique identification information
Privacy Act
Information and
Communication
Network Act
Personal Information Technical Management Protection Standards
The following are specific technical and managerial standards taken to ensure prevention of loss, theft, leakage, falsification,
and damage when information communication service provider is dealing with its clients’ personal information
 Controlling access to personal information management system and detecting signs of leakage
 Configuring settings to prevent personal information leakage via P2P and internet bulletin boards
 Encryption of personal information(algorithm encryption on social security number, credit card and account number,
store the information encrypted in a PC)
 Regulations on storing personal information management system logs and falsification prevention
 Regulations on printing out and copying personal information
21
Contents
Major Product Introduction
Document DRM ㅣ Document Security
Area DRM ㅣ S-Work FX
Document Centralizationㅣ MAXEON FX
CDR/File Disarm ㅣ SHIELDEX
© SOFTCAMP Co., LTD. All rights reserved.
22
Document DRM ㅣ Document Security03
The most fundamental information leakage prevention solution
for corporate information security
Provides comprehensive security on LIFE CYCLE of electronic documents
Create electronic
document
Use electronic
document
Dispose
electronic
document
Electronic
document
distribution
through network
Printed material
Electronic
document
distribution by
portable devices
Integrated policy management over organization, user authority,
and the lifecycle of electronic document from creation to disposal.
Document Security
Internal Information Leakage
Prevention Solution
 Preventing corporate/organizational
confidential information leakage by
document encryption and user authentication
 Blocking unauthorized document usage by
user authentication and policy settings of
crucial documents, and prevention and
surveillance for information leakage through
log information
 Possible to safely create, distribute, store,
and extract the crucial corporate document
with systematic management based on
company-wide security policy
© SOFTCAMP Co., LTD. All rights reserved.
23
AreA DRM ㅣ S-Work FX03
Virtualization solution for internal information leakage prevention
Responds to special requirements of internal information through virtual area security
PC Virtualization Solution
for information leakage
prevention
 Creating an isolated work environment with
PC virtualization technology
 Implementing Virtual Secured Workspace
environment
 Separating and isolation a single PC into a
general and secured environment to store
and control all work related data in a secured
drive after encryption
 Preventing DB/personal information leakage
of majority of clients and confidential
information in the form of unstructured data
type
Normal Disk Encrypted Disk
© SOFTCAMP Co., LTD. All rights reserved.
24
Document Centralization ㅣ MAXEON FX03
Document centralization solution based on distributed file system
Centralizes all work data to a central repositoryDocument Centralization
Document collaboration system
implementation solution
 Using distributed file system which handles
big data instead of configuring the DBMS for
high speed processing
 Performing integrated management and
control by centralizing the work data into a
central repository
 Improving UX for better user experience,
utilizing Windows explorer which enables
custom usage, and Providing user-centered
major functions such as Check-IN/OUT
User’s local PC
Mandatory save
Central Storage
Save
Disabled
© SOFTCAMP Co., LTD. All rights reserved.
25
CDR/File Disarm & Reconstruction ㅣ SHIELDEX03
Response solutions for APT, Ransomware, and document type
malicious codes
Disarms and Reconstructs Incoming Documents through CDR TechnologyCDR/File Disarm
Ransomware, Mail Security
Solution
 Disarming incoming files using CDR
technology, and reconstructing the safe files
before allowing access
 Blocking any malicious code and responding to
ransomware by disarming and reconstructing
every document/file coming from emails, USB,
and networked internet through document
structure analysis
 Japan’s Ministry of Internal Affairs and
Communications complies with ‘Network
separation and disarmament’, and introduced
the product as municipal government’s CDR
solution
External document
with malicious
code
Internet
Network connection
E-mail
Inflow of files from
the Internet/network
connection, e-mail,
USB, etc.
Inflow of malicious codes
hidden in texts, images,
tables, etc.
Use document structure analysis
method of CDR technology
to filter and reconstruct contents
of the file
Only transfer the
reconstructed
document that
contains safe contents
CDR technology Reconstructed
document
ⓒ SOFTCAMP Co., LTD. All rights reserved.
Thank you
The power to do safely

More Related Content

What's hot

Turkey en tmt-fast50-2010-winner_ce_osurvey_281010
Turkey en tmt-fast50-2010-winner_ce_osurvey_281010Turkey en tmt-fast50-2010-winner_ce_osurvey_281010
Turkey en tmt-fast50-2010-winner_ce_osurvey_281010tradesoft
 
Innominds Corporate Overview June 2016 - PE Focused
Innominds Corporate Overview June 2016 - PE FocusedInnominds Corporate Overview June 2016 - PE Focused
Innominds Corporate Overview June 2016 - PE FocusedSuresh Kumar Kandipalli
 
Frank oracle strategy v2.3 fb.ppt [compatibility m
Frank   oracle strategy v2.3 fb.ppt [compatibility mFrank   oracle strategy v2.3 fb.ppt [compatibility m
Frank oracle strategy v2.3 fb.ppt [compatibility mOracle Hrvatska
 
Csc Company Profile
Csc Company ProfileCsc Company Profile
Csc Company ProfileWader Zhang
 
eInfochips-corporate-presentation
eInfochips-corporate-presentationeInfochips-corporate-presentation
eInfochips-corporate-presentationAnshul Burse
 
IGATE - Corporate Presentation - An overview of the Company and its offerings
IGATE - Corporate Presentation - An overview of the Company and its offeringsIGATE - Corporate Presentation - An overview of the Company and its offerings
IGATE - Corporate Presentation - An overview of the Company and its offeringsIGATE Corporation
 
Delta g ric_consulting_presentation_erpscan_2015
Delta g ric_consulting_presentation_erpscan_2015Delta g ric_consulting_presentation_erpscan_2015
Delta g ric_consulting_presentation_erpscan_2015Tunde Ogunkoya
 
Oracle reimagining IT Neil Sholay
Oracle reimagining IT Neil SholayOracle reimagining IT Neil Sholay
Oracle reimagining IT Neil SholayNeil Sholay
 
Neil Sholay's presentation November 2015
Neil Sholay's presentation November 2015Neil Sholay's presentation November 2015
Neil Sholay's presentation November 2015DavidAllder
 
Explorelogy Corporate Profile
Explorelogy Corporate ProfileExplorelogy Corporate Profile
Explorelogy Corporate ProfileKasun Chamara
 
Cynoteck Technology Solutions - Company Profile
Cynoteck Technology Solutions - Company Profile Cynoteck Technology Solutions - Company Profile
Cynoteck Technology Solutions - Company Profile Rosa Aguiar Catraio
 
Vc persistent systems venture relationship
Vc persistent systems venture relationshipVc persistent systems venture relationship
Vc persistent systems venture relationshipChristopher P. Geddes
 
Ergo overview brochure
Ergo overview brochure Ergo overview brochure
Ergo overview brochure markkennyergo
 

What's hot (18)

Turkey en tmt-fast50-2010-winner_ce_osurvey_281010
Turkey en tmt-fast50-2010-winner_ce_osurvey_281010Turkey en tmt-fast50-2010-winner_ce_osurvey_281010
Turkey en tmt-fast50-2010-winner_ce_osurvey_281010
 
Innominds Corporate Overview June 2016 - PE Focused
Innominds Corporate Overview June 2016 - PE FocusedInnominds Corporate Overview June 2016 - PE Focused
Innominds Corporate Overview June 2016 - PE Focused
 
Frank oracle strategy v2.3 fb.ppt [compatibility m
Frank   oracle strategy v2.3 fb.ppt [compatibility mFrank   oracle strategy v2.3 fb.ppt [compatibility m
Frank oracle strategy v2.3 fb.ppt [compatibility m
 
Csc Company Profile
Csc Company ProfileCsc Company Profile
Csc Company Profile
 
Solutions2015
Solutions2015Solutions2015
Solutions2015
 
eInfochips-corporate-presentation
eInfochips-corporate-presentationeInfochips-corporate-presentation
eInfochips-corporate-presentation
 
IGATE - Corporate Presentation - An overview of the Company and its offerings
IGATE - Corporate Presentation - An overview of the Company and its offeringsIGATE - Corporate Presentation - An overview of the Company and its offerings
IGATE - Corporate Presentation - An overview of the Company and its offerings
 
WIPRO
WIPROWIPRO
WIPRO
 
Delta g ric_consulting_presentation_erpscan_2015
Delta g ric_consulting_presentation_erpscan_2015Delta g ric_consulting_presentation_erpscan_2015
Delta g ric_consulting_presentation_erpscan_2015
 
Oracle reimagining IT Neil Sholay
Oracle reimagining IT Neil SholayOracle reimagining IT Neil Sholay
Oracle reimagining IT Neil Sholay
 
Epicor-Chin-Hin-CS-ENS
Epicor-Chin-Hin-CS-ENSEpicor-Chin-Hin-CS-ENS
Epicor-Chin-Hin-CS-ENS
 
Neil Sholay's presentation November 2015
Neil Sholay's presentation November 2015Neil Sholay's presentation November 2015
Neil Sholay's presentation November 2015
 
Revised profile
Revised profileRevised profile
Revised profile
 
Explorelogy Corporate Profile
Explorelogy Corporate ProfileExplorelogy Corporate Profile
Explorelogy Corporate Profile
 
Spark Technology Profile
Spark Technology ProfileSpark Technology Profile
Spark Technology Profile
 
Cynoteck Technology Solutions - Company Profile
Cynoteck Technology Solutions - Company Profile Cynoteck Technology Solutions - Company Profile
Cynoteck Technology Solutions - Company Profile
 
Vc persistent systems venture relationship
Vc persistent systems venture relationshipVc persistent systems venture relationship
Vc persistent systems venture relationship
 
Ergo overview brochure
Ergo overview brochure Ergo overview brochure
Ergo overview brochure
 

Similar to Softcamp Company Introduction_ENG

COMPANY PROFILE (2)
COMPANY PROFILE (2)COMPANY PROFILE (2)
COMPANY PROFILE (2)Allan K Kili
 
GSS Infosoft Pvt Ltd V0.1
GSS Infosoft Pvt Ltd V0.1GSS Infosoft Pvt Ltd V0.1
GSS Infosoft Pvt Ltd V0.1becoder
 
GSS Infosoft Pvt Ltd
GSS Infosoft Pvt LtdGSS Infosoft Pvt Ltd
GSS Infosoft Pvt Ltdbecoder
 
iSecureCyber - Short Pitch Deck
iSecureCyber - Short Pitch DeckiSecureCyber - Short Pitch Deck
iSecureCyber - Short Pitch DeckPrabir Saha
 
eGestalt Technologies Named Winner of 2013 TiE50 “Top Startup” at TiEcon 2013
eGestalt Technologies Named Winner of 2013 TiE50 “Top Startup” at TiEcon 2013eGestalt Technologies Named Winner of 2013 TiE50 “Top Startup” at TiEcon 2013
eGestalt Technologies Named Winner of 2013 TiE50 “Top Startup” at TiEcon 2013Aegify Inc.
 
Rural Digitization - AdStringO Software Pvt Ltd
Rural Digitization - AdStringO Software Pvt LtdRural Digitization - AdStringO Software Pvt Ltd
Rural Digitization - AdStringO Software Pvt LtdAdStringO Software Pvt Ltd
 
Samsung Group, An Electronics Company
Samsung Group, An Electronics CompanySamsung Group, An Electronics Company
Samsung Group, An Electronics CompanyRachel Phillips
 
ODA Target Markets – Partnering to Win
ODA Target Markets – Partnering to WinODA Target Markets – Partnering to Win
ODA Target Markets – Partnering to WinMarketingArrowECS_CZ
 
Unicom Overview Sept 2009 V1.3
Unicom Overview Sept 2009 V1.3Unicom Overview Sept 2009 V1.3
Unicom Overview Sept 2009 V1.3Tu Nguyen Vinh
 
iContro corporate presentation 2015 (complete version)
iContro corporate presentation 2015 (complete version)iContro corporate presentation 2015 (complete version)
iContro corporate presentation 2015 (complete version)Taofiq Hidayah
 
Nityo Infotech - Company Profile 1.1
Nityo Infotech - Company Profile 1.1Nityo Infotech - Company Profile 1.1
Nityo Infotech - Company Profile 1.1Muhambiga Selvaraja
 
FAST Digital Telco
FAST Digital TelcoFAST Digital Telco
FAST Digital TelcoCapgemini
 
Ramzi Haidamus-Nokia Technologies 2014
Ramzi Haidamus-Nokia Technologies 2014Ramzi Haidamus-Nokia Technologies 2014
Ramzi Haidamus-Nokia Technologies 2014Dmitry Tseitlin
 
Gateway Corporate Presentation
Gateway Corporate PresentationGateway Corporate Presentation
Gateway Corporate PresentationRavi Krishna
 
How a Leading Saudi Bank Matured Security to Better Partner the Business
How a Leading Saudi Bank Matured Security to Better Partner the BusinessHow a Leading Saudi Bank Matured Security to Better Partner the Business
How a Leading Saudi Bank Matured Security to Better Partner the BusinessSplunk
 
Op5 Ftg Pres 2010
Op5 Ftg Pres 2010Op5 Ftg Pres 2010
Op5 Ftg Pres 2010jjop5
 

Similar to Softcamp Company Introduction_ENG (20)

COMPANY PROFILE (2)
COMPANY PROFILE (2)COMPANY PROFILE (2)
COMPANY PROFILE (2)
 
Jan Oeberg, ITAMOrg: New IT Asset Management Organization launched (TFT14 Sum...
Jan Oeberg, ITAMOrg: New IT Asset Management Organization launched (TFT14 Sum...Jan Oeberg, ITAMOrg: New IT Asset Management Organization launched (TFT14 Sum...
Jan Oeberg, ITAMOrg: New IT Asset Management Organization launched (TFT14 Sum...
 
GSS Infosoft Pvt Ltd V0.1
GSS Infosoft Pvt Ltd V0.1GSS Infosoft Pvt Ltd V0.1
GSS Infosoft Pvt Ltd V0.1
 
GSS Infosoft Pvt Ltd
GSS Infosoft Pvt LtdGSS Infosoft Pvt Ltd
GSS Infosoft Pvt Ltd
 
iSecureCyber - Short Pitch Deck
iSecureCyber - Short Pitch DeckiSecureCyber - Short Pitch Deck
iSecureCyber - Short Pitch Deck
 
eGestalt Technologies Named Winner of 2013 TiE50 “Top Startup” at TiEcon 2013
eGestalt Technologies Named Winner of 2013 TiE50 “Top Startup” at TiEcon 2013eGestalt Technologies Named Winner of 2013 TiE50 “Top Startup” at TiEcon 2013
eGestalt Technologies Named Winner of 2013 TiE50 “Top Startup” at TiEcon 2013
 
Introducing Peppercan. Business at your fingertips in real-time.
Introducing Peppercan. Business at your fingertips in real-time.Introducing Peppercan. Business at your fingertips in real-time.
Introducing Peppercan. Business at your fingertips in real-time.
 
Rural Digitization - AdStringO Software Pvt Ltd
Rural Digitization - AdStringO Software Pvt LtdRural Digitization - AdStringO Software Pvt Ltd
Rural Digitization - AdStringO Software Pvt Ltd
 
Galaxy Office Automation Pvt. Ltd ppt
Galaxy Office Automation Pvt. Ltd pptGalaxy Office Automation Pvt. Ltd ppt
Galaxy Office Automation Pvt. Ltd ppt
 
Samsung Group, An Electronics Company
Samsung Group, An Electronics CompanySamsung Group, An Electronics Company
Samsung Group, An Electronics Company
 
ODA Target Markets – Partnering to Win
ODA Target Markets – Partnering to WinODA Target Markets – Partnering to Win
ODA Target Markets – Partnering to Win
 
Unicom Overview Sept 2009 V1.3
Unicom Overview Sept 2009 V1.3Unicom Overview Sept 2009 V1.3
Unicom Overview Sept 2009 V1.3
 
iContro corporate presentation 2015 (complete version)
iContro corporate presentation 2015 (complete version)iContro corporate presentation 2015 (complete version)
iContro corporate presentation 2015 (complete version)
 
Nityo Infotech - Company Profile 1.1
Nityo Infotech - Company Profile 1.1Nityo Infotech - Company Profile 1.1
Nityo Infotech - Company Profile 1.1
 
FAST Digital Telco
FAST Digital TelcoFAST Digital Telco
FAST Digital Telco
 
Ramzi Haidamus-Nokia Technologies 2014
Ramzi Haidamus-Nokia Technologies 2014Ramzi Haidamus-Nokia Technologies 2014
Ramzi Haidamus-Nokia Technologies 2014
 
Gateway Corporate Presentation
Gateway Corporate PresentationGateway Corporate Presentation
Gateway Corporate Presentation
 
How a Leading Saudi Bank Matured Security to Better Partner the Business
How a Leading Saudi Bank Matured Security to Better Partner the BusinessHow a Leading Saudi Bank Matured Security to Better Partner the Business
How a Leading Saudi Bank Matured Security to Better Partner the Business
 
Op5 Ftg Pres 2010
Op5 Ftg Pres 2010Op5 Ftg Pres 2010
Op5 Ftg Pres 2010
 
digat3
digat3digat3
digat3
 

More from Softcamp Co., Ltd.

SHIELD@Homeㅣテレワークソリューション
SHIELD@HomeㅣテレワークソリューションSHIELD@Homeㅣテレワークソリューション
SHIELD@HomeㅣテレワークソリューションSoftcamp Co., Ltd.
 
SHIELD@Home (실드앳홈)ㅣ재택근무솔루션ㅣ소프트캠프
SHIELD@Home (실드앳홈)ㅣ재택근무솔루션ㅣ소프트캠프SHIELD@Home (실드앳홈)ㅣ재택근무솔루션ㅣ소프트캠프
SHIELD@Home (실드앳홈)ㅣ재택근무솔루션ㅣ소프트캠프Softcamp Co., Ltd.
 
SHIELD@Homeㅣ재택근무를 위한 원격접속솔루션ㅣ소프트캠프
SHIELD@Homeㅣ재택근무를 위한 원격접속솔루션ㅣ소프트캠프SHIELD@Homeㅣ재택근무를 위한 원격접속솔루션ㅣ소프트캠프
SHIELD@Homeㅣ재택근무를 위한 원격접속솔루션ㅣ소프트캠프Softcamp Co., Ltd.
 
CDR/Incoming File Control, SOFTCAMP SHIELDEX_ENG
CDR/Incoming File Control, SOFTCAMP SHIELDEX_ENGCDR/Incoming File Control, SOFTCAMP SHIELDEX_ENG
CDR/Incoming File Control, SOFTCAMP SHIELDEX_ENGSoftcamp Co., Ltd.
 
SHIELDEX - CDR/Incoming File Control, SOFTCAMP
SHIELDEX - CDR/Incoming File Control, SOFTCAMPSHIELDEX - CDR/Incoming File Control, SOFTCAMP
SHIELDEX - CDR/Incoming File Control, SOFTCAMPSoftcamp Co., Ltd.
 
Document Centralization, SOFTCAMP MAXEON FX_ENG
Document Centralization, SOFTCAMP MAXEON FX_ENGDocument Centralization, SOFTCAMP MAXEON FX_ENG
Document Centralization, SOFTCAMP MAXEON FX_ENGSoftcamp Co., Ltd.
 
MAXEON - Document Centralization, SOFTCAMP
MAXEON - Document Centralization, SOFTCAMP MAXEON - Document Centralization, SOFTCAMP
MAXEON - Document Centralization, SOFTCAMP Softcamp Co., Ltd.
 
Virtual Domains Software, SOFTCAMP S-Work FX_ENG
Virtual Domains Software, SOFTCAMP S-Work FX_ENGVirtual Domains Software, SOFTCAMP S-Work FX_ENG
Virtual Domains Software, SOFTCAMP S-Work FX_ENGSoftcamp Co., Ltd.
 
S-Work - Virtual Domains Software, SOFTCAMP
S-Work - Virtual Domains Software, SOFTCAMPS-Work - Virtual Domains Software, SOFTCAMP
S-Work - Virtual Domains Software, SOFTCAMPSoftcamp Co., Ltd.
 
Document DRM, SOFTCAMP Document Security_ENG
Document DRM, SOFTCAMP Document Security_ENGDocument DRM, SOFTCAMP Document Security_ENG
Document DRM, SOFTCAMP Document Security_ENGSoftcamp Co., Ltd.
 
Document Security - Document DRM, SOFTCAMP
Document Security - Document DRM, SOFTCAMPDocument Security - Document DRM, SOFTCAMP
Document Security - Document DRM, SOFTCAMPSoftcamp Co., Ltd.
 
소프트캠프 회사소개서 - Softcamp Company Introduction
소프트캠프 회사소개서 - Softcamp Company Introduction소프트캠프 회사소개서 - Softcamp Company Introduction
소프트캠프 회사소개서 - Softcamp Company IntroductionSoftcamp Co., Ltd.
 
SOFTCAMP SHIELDEX SaniTrans Mail
SOFTCAMP SHIELDEX SaniTrans Mail SOFTCAMP SHIELDEX SaniTrans Mail
SOFTCAMP SHIELDEX SaniTrans Mail Softcamp Co., Ltd.
 

More from Softcamp Co., Ltd. (20)

SHIELD@Homeㅣテレワークソリューション
SHIELD@HomeㅣテレワークソリューションSHIELD@Homeㅣテレワークソリューション
SHIELD@Homeㅣテレワークソリューション
 
SHIELDEX GateXcanner
SHIELDEX GateXcannerSHIELDEX GateXcanner
SHIELDEX GateXcanner
 
SHIELDEX GateXcanner
SHIELDEX GateXcannerSHIELDEX GateXcanner
SHIELDEX GateXcanner
 
SHIELD@Home (실드앳홈)ㅣ재택근무솔루션ㅣ소프트캠프
SHIELD@Home (실드앳홈)ㅣ재택근무솔루션ㅣ소프트캠프SHIELD@Home (실드앳홈)ㅣ재택근무솔루션ㅣ소프트캠프
SHIELD@Home (실드앳홈)ㅣ재택근무솔루션ㅣ소프트캠프
 
SHIELD@Homeㅣ재택근무를 위한 원격접속솔루션ㅣ소프트캠프
SHIELD@Homeㅣ재택근무를 위한 원격접속솔루션ㅣ소프트캠프SHIELD@Homeㅣ재택근무를 위한 원격접속솔루션ㅣ소프트캠프
SHIELD@Homeㅣ재택근무를 위한 원격접속솔루션ㅣ소프트캠프
 
SHIELDEX GateXcanner
SHIELDEX GateXcannerSHIELDEX GateXcanner
SHIELDEX GateXcanner
 
SHIELDEX EnCrypto
SHIELDEX EnCryptoSHIELDEX EnCrypto
SHIELDEX EnCrypto
 
[SEG] SHIELDEX Email Gateway
[SEG] SHIELDEX Email Gateway[SEG] SHIELDEX Email Gateway
[SEG] SHIELDEX Email Gateway
 
CDR/Shieldex Kiosk
CDR/Shieldex KioskCDR/Shieldex Kiosk
CDR/Shieldex Kiosk
 
Threat management, Ex-Scan
Threat management, Ex-ScanThreat management, Ex-Scan
Threat management, Ex-Scan
 
CDR/Incoming File Control, SOFTCAMP SHIELDEX_ENG
CDR/Incoming File Control, SOFTCAMP SHIELDEX_ENGCDR/Incoming File Control, SOFTCAMP SHIELDEX_ENG
CDR/Incoming File Control, SOFTCAMP SHIELDEX_ENG
 
SHIELDEX - CDR/Incoming File Control, SOFTCAMP
SHIELDEX - CDR/Incoming File Control, SOFTCAMPSHIELDEX - CDR/Incoming File Control, SOFTCAMP
SHIELDEX - CDR/Incoming File Control, SOFTCAMP
 
Document Centralization, SOFTCAMP MAXEON FX_ENG
Document Centralization, SOFTCAMP MAXEON FX_ENGDocument Centralization, SOFTCAMP MAXEON FX_ENG
Document Centralization, SOFTCAMP MAXEON FX_ENG
 
MAXEON - Document Centralization, SOFTCAMP
MAXEON - Document Centralization, SOFTCAMP MAXEON - Document Centralization, SOFTCAMP
MAXEON - Document Centralization, SOFTCAMP
 
Virtual Domains Software, SOFTCAMP S-Work FX_ENG
Virtual Domains Software, SOFTCAMP S-Work FX_ENGVirtual Domains Software, SOFTCAMP S-Work FX_ENG
Virtual Domains Software, SOFTCAMP S-Work FX_ENG
 
S-Work - Virtual Domains Software, SOFTCAMP
S-Work - Virtual Domains Software, SOFTCAMPS-Work - Virtual Domains Software, SOFTCAMP
S-Work - Virtual Domains Software, SOFTCAMP
 
Document DRM, SOFTCAMP Document Security_ENG
Document DRM, SOFTCAMP Document Security_ENGDocument DRM, SOFTCAMP Document Security_ENG
Document DRM, SOFTCAMP Document Security_ENG
 
Document Security - Document DRM, SOFTCAMP
Document Security - Document DRM, SOFTCAMPDocument Security - Document DRM, SOFTCAMP
Document Security - Document DRM, SOFTCAMP
 
소프트캠프 회사소개서 - Softcamp Company Introduction
소프트캠프 회사소개서 - Softcamp Company Introduction소프트캠프 회사소개서 - Softcamp Company Introduction
소프트캠프 회사소개서 - Softcamp Company Introduction
 
SOFTCAMP SHIELDEX SaniTrans Mail
SOFTCAMP SHIELDEX SaniTrans Mail SOFTCAMP SHIELDEX SaniTrans Mail
SOFTCAMP SHIELDEX SaniTrans Mail
 

Recently uploaded

Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 

Recently uploaded (20)

Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 

Softcamp Company Introduction_ENG

  • 2. 2 Contents 01/ SoftCamp Introduction 02/ Security Market Status 03/ Key Product Introduction
  • 3. 3 Contents SoftCamp Company Introduction General Status Company History Organization Structure Business Area Awards and Certifications Major Clients Overseas Business Corporate Vision Competitiveness
  • 4. © SOFTCAMP Co., LTD. All rights reserved. 4 SoftCamp General Status01 ㅣ Total Revenue ㅣ Number of Employees ㅣ CEO ㅣ Established ㅣ Company SoftCamp Co., Ltd. July, 1999 Bae Hwan-kuk 115 (71% on R&D) 13.7 billion KRW (as of 2017) Technology-oriented management Verified Technological prowess Stable overseas business ㅣ Address 17, Pangyo-ro 228beon-gil, Bundang-gu, Seongnam-si, Gyeonggi-do ㅣ Contact Info. TEL: 1644-9366 ㅣ FAX: 031-697-4599 ㅣ Website Homepage : www.softcamp.co.kr Blog : http://story.softcamp.co.kr/ We ensure our clients to perform their task safely and securely SoftCamp Co., Ltd. SoftCamp is a security company equipped to protect information properties of client enterprises from both internal and external threats
  • 5. © SOFTCAMP Co., LTD. All rights reserved. 5 SoftCamp Company History01 1999 - 2005 2006 - 2011 2012 - Present 1999 - SoftCamp established - Released shared PC management product PC Keeper - Concluded export contract with Japan’s ALSI for PC-Keeper 2000 - PC-Keeper selected as software for administrative operation 2001 - PC-Keeper selected as excellent training software 2002 - Released DRM Document Security - Released keyboard security product Secure KeyStroke 2003 - Selected as ‘Optimal SME for Export’ led by Small and Medium Business Administration - Document Security won GS certification - Concluded distribution contract with Japan’s ALSI for PC-Keeper 2004 - Won Information and Communications Minister Award at the Digital Innovation Award - Secure KeyStroke won bronze prize at the Small and Medium Business Technology Innovation Award 2005 - Obtained Korea Technology Finance Corporation’s Transparent Management Certification - Selected as Document DRM for IT Security Certification Agency verified encryption module 2006 - Won ‘One Million Dollar Tower of Export’ on the 43th Trade Day - Obtained Ministry of Science and Technology New Excellent Technology certification - Secure KeyStroke obtained GS certification 2007 - Selected as keyboard security for IT Security Certification Agency verified encryption module - Document Security obtained GS certification 2008 - Won SME Business Cooperation Foundation President’s Award and Beautiful Partnership Award 2009 - Selected as Area DRM for IT Security Certification Agency verified encryption module - Area DRM won GS certification 2010 - Keyboard security won GS certification - Document security recorded largest market share in Japan 2011 - Selected as Area DRM for IT Security Certification Agency verified encryption module - Released Mobile DRM 2012 - Patent registration in the U.S. and Japan for keyboard security in kernel area 2013 - Released SHIELDEX for CDR Solution - Patent registration in Korea for secure data carrying-out control system 2014 - Patent registration of technology for full-time surveillance and isolation of incoming files - Listed on the KONEX 2015 - Achieved ISO/IEC 27001 Information Security Certification - Achieved GS Certification for 'SHIELDEX’ - Won SW industry development award and Ministry of Science, ICP, and Future Planning award - Won IT Convergence Entrepreneur award by Ministry of Trade, Industry, and Energy 2016 - Won Industry Security award by Ministry of Commerce, Industry, and Energy - Achieved GS Certification for Keyboard security Secure KeyStroke WS 2017 - Released S-Work FX for PC Virtualization Solution - Released OneStop CDR Solution SHIELDEX AD - Transferred the office to Pangyo Seven Venture Valley For the last 19 years, we have been the leader of the information security market, providing new security technology and service
  • 6. © SOFTCAMP Co., LTD. All rights reserved. 6 SoftCamp Organization Structure01 SoftCamp is a R&D driven enterprise with 115 employees, 71% of which are engineers and development personnel Business Strategy Business Support Dept. CEO Total 115 Sales Consultant Financial Sales Dept. Enterprise Sales Dept. Public Sales Dept. Overseas Sales Dept. 23 Employees (20%) Special Sales Dept. Japan Branch Sales Management 7 Employees (6%) Level Number of people Premium 21 Top 6 Medium 16 Beginner 38 Other 1 Total 82 Premium level 26% Top level 7% Medium level 20% Beginner level 46% Business Strategy Dept. R&D Business R&D Dept. DevOps Dept. DS Business Dept. DS R&D SW Business Dept. SW R&D MX Business Dept. MX R&D SD Business Dept. SD R&D 65 Employees (57%) 19 Employees (17%) <Based on the Software Industry Promotion Act’s technician level standards>
  • 7. © SOFTCAMP Co., LTD. All rights reserved. 7 SoftCamp Business Area01 We provide the optimal security solution for internal leakage and external threat based on kernel based security technology Document DRM Document Security Electronic document encryption Various permission control Information leakage prevention/control solutions Area DRM S-Work FX Storing/Controlling in a specific virtual security area and leakage prevention through PC virtualization technology, unstructured data security solution Document Centralization MAXEON FX Store electronic documents in central storage facility Comprehensive management based on Distributed File System Solutions achieving innovative business collaborative system Document Disarm & Reconstruction SHIELDEX Content disarm and reconstruction through CDR technology APT, Ransomware malware prevention solution that allows only safe documents SECURE OS Performing security on the OS level
  • 8. © SOFTCAMP Co., LTD. All rights reserved. 8 SoftCamp Awards and Certifications01 Our technological skills are approved by various certifications and our feats on SW development are acknowledged by multiple awards 2009.10 Ministry of Knowledge Economy Industry technology security award 2009.02 Ministry of Knowledge Economy Certified for the company Leading new development 2006.11 Korea International Trade Association Top of 1 million dollars export 2016.06 Korea Industry Security Research Association Industry security award For SME 2015.11 Ministry Future Science SW industry development award 2015.11 Ministry of Trade Industry and Energy IT convergence Entrepreneur award NIS IT Security Certification Center Selected as the national encryption product Bureau Veritas Certified International standard information security ISO 27001 Ministry of Knowledge Economy Designated as the leading manufacturing technology research center Telecommunications Technology Association Certified Software quality Korea Industrial Technology Association Certified as new technology retaining company Ministry of SME Designated as adequate medium sized company for export Technology Finance Corporation Designated as blue-chip technology company International Industry Certification Center Designated as ISO-9001 quality business International Industry Certification Center Designated as ISO-14001 environment business
  • 9. © SOFTCAMP Co., LTD. All rights reserved. 9 SoftCamp Major Clients01 Retaining 400 domestic and 100 Japanese clients, we have been selected as the standard product for domestic groups OverseasDomestic
  • 10. © SOFTCAMP Co., LTD. All rights reserved. 10 SoftCamp Overseas Business01 From early stage of establishment, we have successfully expanded to Japan and created new development drives through overseas business SOFTCAMP 41% HITACHI 18% ADOBE 9% ORACLE 7% EMC 3% Etc. 22% Japan IRM(DRM) Market Share [ITR Market View – Contents market 2010 report] Japan IRM (DRM) Japanese Local Partners Overseas Market Expansion Efforts 1999 Expanded to Japanese market Upon Establishment, successfully expanded to Japan through public PC management program ‘Win-Keeper’ Successfully settled in the Japanese document security market Launched document DRM ‘Document Security’ in Japan through Alps System Integration(ALSI) Introduced and settled in large corporates with over 1000 employees Gained first position in Japanese document security market share 2010 ‘ ITR : ITR Market View contents management market report Launched Japan CDR/Disarm & Reconstruction market Launched CDR/Disarm & Reconstruction solution ‘SHIELDEX’ complying with the Japanese municipal government’s ‘Regulation on Network separation and disarmament’ Introduced and led the market for disarm solution all over Japanese municipal government
  • 11. © SOFTCAMP Co., LTD. All rights reserved. 11 SoftCamp Overseas Business01 We are considering expansion toward security market in South East Asia, America, and EU based on the success in Japan North America EU Middle East Japan ASEAN
  • 12. © SOFTCAMP Co., LTD. All rights reserved. 12 SoftCamp Corporate Vision01 The Global Star Security Company Develop and service SW that enables safer usage of document The Global Star Security Company The power to do safely A company that helps customers perform their task safely and securely Develop and service SW that enables safer usage of document more Create Innovative Product Creating innovative products that currently does not exist more Reduction Reduce Opportunity Cost Reducing product development, operation cost, and employee efforts more Increase Increase Value Service value Customer satisfaction more Confidence Trust Based Providing high quality product and service 핵심 가치 핵심 역량 기업 비전 슬로건 미션 Core Value Core Competency Corporate vision Slogan Mission
  • 13. © SOFTCAMP Co., LTD. All rights reserved. 13 SoftCamp Competitiveness01 We pursue stable overseas business based on verified document security technology and research & technology oriented management in Japan Verified Technological Prowess The largest domestic group Designated as the standard product for information leakage prevention for financial holding company Introduced domestic document security 1st in financial and corporate Holds the most number of clients Designated as the standard product for document security, blueprint security for Hyundai Motor Group. Technology-oriented Management A research oriented company with retaining 72% of its employees as developer and engineers Registered multiple domestic/overseas patents Gains intellectual properties with various technology verifications Designated as national encryption product for document/area DRM, keyboard security for NIS IT security certification center Stable Overseas Business Formed strategic partnership with Japan’s local ALSI company, which has been maintained for over 10 years Settled in the Japanese market for document security, disarm solution with verified technological prowess Researched and expanded to Chinese, South East, American markets based on the stable overseas business in Japan Technology-oriented management Verified Technological prowess Stable overseas business
  • 14. 14 Contents Security Market Status Change in the information security paradigm Status and response of cyber attacks Information leakage prevention market status Laws on information leakage prevention
  • 15. © SOFTCAMP Co., LTD. All rights reserved. 15 Change in Information Security Paradigm02 As the loss on cyber attacks grows, the environment of IT usage is changing and the information security paradigm for countermeasures are being developed 3rd Generation 1st Generation 2nd Generation 4th Generation Environment Year 2017201220032000 Network Security (External access control) Response to external attack (APT, Ransomware) Physical Security Data/System Security (Prevention of internal information leakage)
  • 16. © SOFTCAMP Co., LTD. All rights reserved. 16 Change in Information Security Paradigm02 As the loss on cyber attacks grows, the environment of IT usage is changing and the information security paradigm for countermeasures are being developed Policy Growing need for collaborative policies on global security threat response Discussions on information security by major international organizations Economy Increasing damages on leakage of industrial secret Increasing damages due to growing number of cyber crimes Creating new market by combining industry/secret Environment Increasing vulnerabilities in information security environment Spreading of Eco-friendly U-City and smart work Technology Developing various response techniques for security threats Emergence of converged security technology Society Growing number of Cyber infestation incidents Emergence of new types of cyber crime
  • 17. © SOFTCAMP Co., LTD. All rights reserved. 17 Status and Response of Cyber Attacks02 Global cyber attacks are growing and evolving at a phenomenal pace, and new security technologies are gaining attention as countermeasures Number of personal information leakages and APT attacks increasing! Growing need for information leakage prevention Domestic and Overseas Major Cyber Attacks and Information Leakage Cases Operation Aurora Leaked source codes and industrial secrets of 30 companies including Google and Dow Chemical APPSILON Email Infringement Extorted 50 client email accounts including Citi Bank and Disney KHNP APT Attack Infected 8 internal PCs, destroyed 5 PCs Leaked 94 employee addresses and power plant blue prints SONY PSNHacking SONY PlayStation Network Leaked 77 million users’ personal information Suspended service for 2 months 2010 1 2 2011 3 2011 4 2014 Seoul Metro Hacking Hacked computer management server Infected 53 PCs with malicious code Gained unauthorized access to 213 PCs 5 2015 6 2016 Hanjin, SK Hacking Infected internal PCs with malicious code Leaked 42,608 documents related to domestic defense industry 2000 2002 2004 2006 2008 2010 2013 2017 Increase in cyber threats in domestic and overseas Danger level DDoS attack Personal information leakage APT attack
  • 18. © SOFTCAMP Co., LTD. All rights reserved. 18 Status and Response of Cyber Attacks02 Global cyber attacks are growing and evolving at a phenomenal pace, and new security technologies are gaining attention as countermeasures Japanese Government Policy and Gartner ProposalGrowth and Evolution of Global Cyber Attacks Gartner’s original APT countermeasure is in dilemma. Instead of relying on behavior analysis method using Sandbox, we proposed a new technology of Contents Disarm and Reconstruction (CDR) Japan’s Adoption of Regulation on Contents Disarm and Reconstruction (CDR) by Ministry of Internal Affairs and Communications Gartner Technology Proposal‘2017 Iran Hack attempted to explode a Saudi Petro-chemical company ‘2016 Russia Hack attempted to penetrate US energy nuclear/capital/airport infrastructures ‘2015 China Hacked US personnel management department, leaked 21.5 million federal officials’ personal information ‘2014 China Hacked 24 blueprints of high-tech weapon system including F-35 ‘2013 North Korea Carried out cyber terrorism on South Korean Broadcasts/Finance facilities ‘2012 Iran Carried out cyber attacks on US finance facilities and Israeli government ‘2011 North Korea Paralyzed NH bank network, disrupted South Koreans communication devices Cases of Global Cyber Attacks APT Attack Advanced Persistent Threat Intellectual target attack Ransomware A hack that holds the data hostage and demands ransom
  • 19. © SOFTCAMP Co., LTD. All rights reserved. 19 Information Leakage Prevention Market Status02 The information leakage prevention market is on the rise, as the loss on technology leakage caused by industrial spies continue to increase 6 26 29 31 32 42 43 41 46 30 49 63 0 10 20 30 40 50 60 70 2003 2004 2005 2006 2007 2008 2009 2010 2011 2012 2013 2014 Number of detection of industrial spies according to year The higher the technology, the more industrial spies there are! “Industrial spies are one of the biggest business in the 21st century, and they will never disappear!” – Futurist Alvin Toffler – Industrial spies in scale  field 16% 64% Large corporate s SMEs Large Corporate<SME The damage is greater 2010~2014 / 5 years base *Other 20% University Public research center Precision instrument Electric Communication Bioengineering Other Chemical 34% 26% 16% 14% 7% 3% Precision instrument was the highest at 34% Moved from electric to precision instrument 2010~2014 / 5 years base Expected loss on technology leakage Average annual loss of technology leaked companies 50 trillion KRW estimate KAITS source 3% of GDP in 2014 SMEs X 4,700 Equivalent to an SME’s annual revenue SME’s annual revenue 10.7 billion(2013) [Source : NIS industrial secret protection center]
  • 20. © SOFTCAMP Co., LTD. All rights reserved. 20 Laws on Information Leakage Prevention02 SoftCamp reinforces information security laws related to information leakage prevention, and develops and provides legitimate security solutions Laws on Prevention and Protection of Industrial Technology Leakage Clause 14 (Protection of Core National Technology)  The institution retaining and managing core national technology must abide by the following protection measures  Protection of core national technology related data process and the data related to the result  Establishing response system for core national technology leakages Management and Protection of Personal Information  Managing unique identification number such as social security number, license number, military number, passport number, etc. Mandatory security measures such as encryption when managing prohibited and unique identification information Privacy Act Information and Communication Network Act Personal Information Technical Management Protection Standards The following are specific technical and managerial standards taken to ensure prevention of loss, theft, leakage, falsification, and damage when information communication service provider is dealing with its clients’ personal information  Controlling access to personal information management system and detecting signs of leakage  Configuring settings to prevent personal information leakage via P2P and internet bulletin boards  Encryption of personal information(algorithm encryption on social security number, credit card and account number, store the information encrypted in a PC)  Regulations on storing personal information management system logs and falsification prevention  Regulations on printing out and copying personal information
  • 21. 21 Contents Major Product Introduction Document DRM ㅣ Document Security Area DRM ㅣ S-Work FX Document Centralizationㅣ MAXEON FX CDR/File Disarm ㅣ SHIELDEX
  • 22. © SOFTCAMP Co., LTD. All rights reserved. 22 Document DRM ㅣ Document Security03 The most fundamental information leakage prevention solution for corporate information security Provides comprehensive security on LIFE CYCLE of electronic documents Create electronic document Use electronic document Dispose electronic document Electronic document distribution through network Printed material Electronic document distribution by portable devices Integrated policy management over organization, user authority, and the lifecycle of electronic document from creation to disposal. Document Security Internal Information Leakage Prevention Solution  Preventing corporate/organizational confidential information leakage by document encryption and user authentication  Blocking unauthorized document usage by user authentication and policy settings of crucial documents, and prevention and surveillance for information leakage through log information  Possible to safely create, distribute, store, and extract the crucial corporate document with systematic management based on company-wide security policy
  • 23. © SOFTCAMP Co., LTD. All rights reserved. 23 AreA DRM ㅣ S-Work FX03 Virtualization solution for internal information leakage prevention Responds to special requirements of internal information through virtual area security PC Virtualization Solution for information leakage prevention  Creating an isolated work environment with PC virtualization technology  Implementing Virtual Secured Workspace environment  Separating and isolation a single PC into a general and secured environment to store and control all work related data in a secured drive after encryption  Preventing DB/personal information leakage of majority of clients and confidential information in the form of unstructured data type Normal Disk Encrypted Disk
  • 24. © SOFTCAMP Co., LTD. All rights reserved. 24 Document Centralization ㅣ MAXEON FX03 Document centralization solution based on distributed file system Centralizes all work data to a central repositoryDocument Centralization Document collaboration system implementation solution  Using distributed file system which handles big data instead of configuring the DBMS for high speed processing  Performing integrated management and control by centralizing the work data into a central repository  Improving UX for better user experience, utilizing Windows explorer which enables custom usage, and Providing user-centered major functions such as Check-IN/OUT User’s local PC Mandatory save Central Storage Save Disabled
  • 25. © SOFTCAMP Co., LTD. All rights reserved. 25 CDR/File Disarm & Reconstruction ㅣ SHIELDEX03 Response solutions for APT, Ransomware, and document type malicious codes Disarms and Reconstructs Incoming Documents through CDR TechnologyCDR/File Disarm Ransomware, Mail Security Solution  Disarming incoming files using CDR technology, and reconstructing the safe files before allowing access  Blocking any malicious code and responding to ransomware by disarming and reconstructing every document/file coming from emails, USB, and networked internet through document structure analysis  Japan’s Ministry of Internal Affairs and Communications complies with ‘Network separation and disarmament’, and introduced the product as municipal government’s CDR solution External document with malicious code Internet Network connection E-mail Inflow of files from the Internet/network connection, e-mail, USB, etc. Inflow of malicious codes hidden in texts, images, tables, etc. Use document structure analysis method of CDR technology to filter and reconstruct contents of the file Only transfer the reconstructed document that contains safe contents CDR technology Reconstructed document
  • 26. ⓒ SOFTCAMP Co., LTD. All rights reserved. Thank you The power to do safely