The California Department of Corrections and Rehabilitation (CDCR) needed a solution to securely share files within the agency and with external entities like attorneys. CDCR chose WatchDox for its enterprise file sync and share capabilities. WatchDox allows users to securely share files via the cloud with dynamic access controls and activity tracking. It also provides mobility features and integrates with existing file repositories. CDCR is seeing rapid adoption of WatchDox which provides a secure solution for their file sharing needs.
Information Systems and Knowledge ManagementMeenakshi Paul
Information Systems and Knowledge
Management, Information, data and Intelligence, The Characteristics of Valuable Information, Relevance, Quality, Timeliness, Completeness, Knowledge Management, Global Information Systems, Decision Support Systems, Databases and Data Warehousing, Input Management, Computerized Data Archives Networks and Electronic Data Interchange, The Internet and Research
Integrating user needs into ECM projects is key to success. Whether it is a initial implementation or a reboot or just expanding use, user needs and UX testing should be integrated into every project
As mobile devices & remote working practices become more prevalent in today's organizations, an increasing number of workers are using consumer file sharing tools to ensure they have access to the latest version of documents.
However enterprise requirements are very different to individual preferences when establishing which tools to use.
Information Systems and Knowledge ManagementMeenakshi Paul
Information Systems and Knowledge
Management, Information, data and Intelligence, The Characteristics of Valuable Information, Relevance, Quality, Timeliness, Completeness, Knowledge Management, Global Information Systems, Decision Support Systems, Databases and Data Warehousing, Input Management, Computerized Data Archives Networks and Electronic Data Interchange, The Internet and Research
Integrating user needs into ECM projects is key to success. Whether it is a initial implementation or a reboot or just expanding use, user needs and UX testing should be integrated into every project
As mobile devices & remote working practices become more prevalent in today's organizations, an increasing number of workers are using consumer file sharing tools to ensure they have access to the latest version of documents.
However enterprise requirements are very different to individual preferences when establishing which tools to use.
A Novel Information Accountability Framework for Cloud ComputingIJMER
International Journal of Modern Engineering Research (IJMER) is Peer reviewed, online Journal. It serves as an international archival forum of scholarly research related to engineering and science education.
‘Personal data literacies’: A critical literacies approach to enhancing under...eraser Juan José Calderón
‘Personal data literacies’: A critical literacies approach to enhancing understandings of personal digital data. Luci Pangrazio
Deakin University, Australia
Neil Selwyn
Monash University, Australia
Abstract
The capacity to understand and control one’s personal data is now a crucial part of living in contemporary society. In this sense, traditional concerns over supporting the development of ‘digital literacy’ are now being usurped by concerns over citizens’ ‘data literacies’. In contrast to recent data safety and data science approaches, this article argues for a more critical form of ‘personal data literacies’ where digital data are understood as socially situated and context dependent. Drawing on the critical literacies tradition, the article outlines a range of salient socio-technical understandings of personal data generation and processing. Specifically, the article proposes a framework of ‘Personal Data Literacies’ that distinguishes five significant domains: (1) Data Identification, (2)
Data Understandings, (3) Data Reflexivity, (4) Data Uses, and (5) Data Tactics. The
article concludes by outlining the implications of this framework for future education and research around the area of individuals’ understandings of personal data.
AMCTO presentation on moving from records managment to information managementChristopher Wynder
This presentation was given to AMCTO zones 1 and 4/5. It presents how to use the records classification as the core for a faceted classification schema that can be used to enable workflow and processes across the organization.
BlackBerry Workspaces: Integration with Data Loss Prevention (DLP)BlackBerry
Introducing BlackBerry Workspaces to an enterprise workforce kick-starts secure collaboration and true mobile productivity. With powerful security controls centered on files, content that includes intellectual property or Personal Identifiable Information (PII) can now be accessed on BYOD mobile devices, or shared with external business partners without fear. The ability to control, revoke and track corporate files provides unprecedented Data Loss Prevention.
In addition to the protected distribution of sensitive files, Workspaces provides two additional pillars in the world of Data Loss Prevention. Learn about them in this data sheet.
Investigation of Blockchain Based Identity System for Privacy Preserving Univ...ijtsrd
Existing blockchain based identity systems are analyzed under the context of the university identity management requirements. The private or consortium blockchain is more suitable for identity system which will be used for university. The transparency of public blockchains raises some concerns for privacy and confidentiality. The most important issue is that the volume of the data generated can be very large exceeding the practical storage capabilities of the current blockchain usages. The existing identity systems are not well fixed with the university identity management system really needs, especially they remain needing the relevant issue of effective consent revocation. The append only storage of blockchain can be a barrier for implementing the revocability of consent. Some private blockchain based system has the potential vendor lock in effects. Thus, hybrid identity system is suggested for university identity management. Kyaw Soe Moe | Mya Mya Thwe "Investigation of Blockchain Based Identity System for Privacy Preserving University Identity Management System" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-6 , October 2019, URL: https://www.ijtsrd.com/papers/ijtsrd28095.pdf Paper URL: https://www.ijtsrd.com/computer-science/computer-security/28095/investigation-of-blockchain-based-identity-system-for-privacy-preserving-university-identity-management-system/kyaw-soe-moe
Interplay of Digital Forensics in eDiscoveryCSCJournals
Digital forensics is often confused with eDiscovery (electronic discovery). However, both the fields are highly independent of the other but slightly overlap to assist each other in a symbiotic relationship. With decreasing costs of cloud storage, growing Internet speeds, and growing capacity of portable storage media, their chances of being used in a crime have grown. Sifting through large volumes of evidential data during eDiscovery or forensically investigating them requires teams from both these fields to work together on a case. In this paper, the authors discuss the relationship between these disciplines and highlight the digital forensic skills required, sub-disciplines of digital forensics, the possible electronic artifacts that can be encountered in a case, and the forensic opportunities relative to the eDiscovery industry. Lastly, the authors touch upon the best practices in digital evidence management during the eDiscovery process.
Extending Information Security to Non-Production EnvironmentsLindaWatson19
This paper discusses the threats that non-production environments pose to database security and provides practical advice and multiple options for ensuring data assets remain secure against unauthorized access.
Many companies have started to experience the consequences of non-existent, insufficient or poorly implemented data security plans. The absence of ‘proper IT’ to serve the diversity of information management, analysis and human-centric workflow requirements that exist in the office has created a paucity of unsecured business-critical information held in spreadsheets and micro-databases beyond the governance of IT teams. For most organizations, up to 60% of business critical information is found in these unsecured office environments.
Cloud computing is an advanced computing technology used by different organization or individuals for
transferring, overseeing and storing over the internet. Security is an important issue that needs to be studied deeply and
accurately when designing the digital library. Security shortcomings in libraries, combined with assaults or different sorts
of disappointments, can prompt private data being improperly gotten to, or loss of honesty and integrity of the
information put away. This paper will be introduced the concept and characteristics of cloud computing, the relationship
between cloud computing and digital library will be analysis, the cloud computing security management problems under
the environment of digital libraries will be studied , the availability level will be taken into research consideration while
studying security management problems in digital library cloud computing. The main goal will be trying to present a
possible solution for the preventing security threats and hackers on a digital library management system based on cloud
computing.
A Novel Information Accountability Framework for Cloud ComputingIJMER
International Journal of Modern Engineering Research (IJMER) is Peer reviewed, online Journal. It serves as an international archival forum of scholarly research related to engineering and science education.
‘Personal data literacies’: A critical literacies approach to enhancing under...eraser Juan José Calderón
‘Personal data literacies’: A critical literacies approach to enhancing understandings of personal digital data. Luci Pangrazio
Deakin University, Australia
Neil Selwyn
Monash University, Australia
Abstract
The capacity to understand and control one’s personal data is now a crucial part of living in contemporary society. In this sense, traditional concerns over supporting the development of ‘digital literacy’ are now being usurped by concerns over citizens’ ‘data literacies’. In contrast to recent data safety and data science approaches, this article argues for a more critical form of ‘personal data literacies’ where digital data are understood as socially situated and context dependent. Drawing on the critical literacies tradition, the article outlines a range of salient socio-technical understandings of personal data generation and processing. Specifically, the article proposes a framework of ‘Personal Data Literacies’ that distinguishes five significant domains: (1) Data Identification, (2)
Data Understandings, (3) Data Reflexivity, (4) Data Uses, and (5) Data Tactics. The
article concludes by outlining the implications of this framework for future education and research around the area of individuals’ understandings of personal data.
AMCTO presentation on moving from records managment to information managementChristopher Wynder
This presentation was given to AMCTO zones 1 and 4/5. It presents how to use the records classification as the core for a faceted classification schema that can be used to enable workflow and processes across the organization.
BlackBerry Workspaces: Integration with Data Loss Prevention (DLP)BlackBerry
Introducing BlackBerry Workspaces to an enterprise workforce kick-starts secure collaboration and true mobile productivity. With powerful security controls centered on files, content that includes intellectual property or Personal Identifiable Information (PII) can now be accessed on BYOD mobile devices, or shared with external business partners without fear. The ability to control, revoke and track corporate files provides unprecedented Data Loss Prevention.
In addition to the protected distribution of sensitive files, Workspaces provides two additional pillars in the world of Data Loss Prevention. Learn about them in this data sheet.
Investigation of Blockchain Based Identity System for Privacy Preserving Univ...ijtsrd
Existing blockchain based identity systems are analyzed under the context of the university identity management requirements. The private or consortium blockchain is more suitable for identity system which will be used for university. The transparency of public blockchains raises some concerns for privacy and confidentiality. The most important issue is that the volume of the data generated can be very large exceeding the practical storage capabilities of the current blockchain usages. The existing identity systems are not well fixed with the university identity management system really needs, especially they remain needing the relevant issue of effective consent revocation. The append only storage of blockchain can be a barrier for implementing the revocability of consent. Some private blockchain based system has the potential vendor lock in effects. Thus, hybrid identity system is suggested for university identity management. Kyaw Soe Moe | Mya Mya Thwe "Investigation of Blockchain Based Identity System for Privacy Preserving University Identity Management System" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-6 , October 2019, URL: https://www.ijtsrd.com/papers/ijtsrd28095.pdf Paper URL: https://www.ijtsrd.com/computer-science/computer-security/28095/investigation-of-blockchain-based-identity-system-for-privacy-preserving-university-identity-management-system/kyaw-soe-moe
Interplay of Digital Forensics in eDiscoveryCSCJournals
Digital forensics is often confused with eDiscovery (electronic discovery). However, both the fields are highly independent of the other but slightly overlap to assist each other in a symbiotic relationship. With decreasing costs of cloud storage, growing Internet speeds, and growing capacity of portable storage media, their chances of being used in a crime have grown. Sifting through large volumes of evidential data during eDiscovery or forensically investigating them requires teams from both these fields to work together on a case. In this paper, the authors discuss the relationship between these disciplines and highlight the digital forensic skills required, sub-disciplines of digital forensics, the possible electronic artifacts that can be encountered in a case, and the forensic opportunities relative to the eDiscovery industry. Lastly, the authors touch upon the best practices in digital evidence management during the eDiscovery process.
Extending Information Security to Non-Production EnvironmentsLindaWatson19
This paper discusses the threats that non-production environments pose to database security and provides practical advice and multiple options for ensuring data assets remain secure against unauthorized access.
Many companies have started to experience the consequences of non-existent, insufficient or poorly implemented data security plans. The absence of ‘proper IT’ to serve the diversity of information management, analysis and human-centric workflow requirements that exist in the office has created a paucity of unsecured business-critical information held in spreadsheets and micro-databases beyond the governance of IT teams. For most organizations, up to 60% of business critical information is found in these unsecured office environments.
Cloud computing is an advanced computing technology used by different organization or individuals for
transferring, overseeing and storing over the internet. Security is an important issue that needs to be studied deeply and
accurately when designing the digital library. Security shortcomings in libraries, combined with assaults or different sorts
of disappointments, can prompt private data being improperly gotten to, or loss of honesty and integrity of the
information put away. This paper will be introduced the concept and characteristics of cloud computing, the relationship
between cloud computing and digital library will be analysis, the cloud computing security management problems under
the environment of digital libraries will be studied , the availability level will be taken into research consideration while
studying security management problems in digital library cloud computing. The main goal will be trying to present a
possible solution for the preventing security threats and hackers on a digital library management system based on cloud
computing.
ISSC340_Presentation_Ronald_Averion.pptxNAME Ronald Averi.docxchristiandean12115
ISSC340_Presentation_Ronald_Averion.pptx
NAME: Ronald Averion
TITLE: SHARED iDRIVE
INTRODUCTION
Efficiency in data storage and data retrieval is a key factor in the productivity of an organization.
iDRIVE enables data to be securely stored, retrieved and shared in an efficient manner.
Background information
Shared drive enhances sharing of data in a networked environment.
Users are divided into user groups so that privileges can be effected and managed easily
For security purposes, users can access specific data depending on their user group.
Conventional storage mechanisms don’t offer this flexibility.
This is an Information Technology Supported, which has been authorized and one that is managed to give space for storage space electronically for the users that has been authorized for some given network. In some cases the drive is given the name as the J: Drive (Phillips & Skagerberg, 2003). The use of the share drive is necessary because it enables information to be store in one place and the users from same department can share it increasing efficiency in an organisation.
2
OBJECTIVES
To carry out research on how old methods of sharing data was done.
To investigate the drawbacks of the old methods of storing data.
To carry out research on how shared drive is implemented.
To show the advantages of using shared drive technology in an organization.
To carry out research on how old method of sharing files was done.
To investigate the drawbacks of the old method of storing files.
To carry out research on how shared drive is implemented.
To recommend use of shared drive in an organization.
3
REQUIREMENTS
The shared drive should conform to Professional and Ethical standards.
Enough funds to facilitate the whole project.
Hardware requirements(computers, servers , internetworking tools)
Software requirements(Windows server2012 R2)
Contribute to society and human well-being.
Does your application infringe on any fundamental human rights?
Avoid harm to others.
Be honest and trustworthy.
4
ADVANTAGES OF IDRIVE
It enables various users in an organization to share information and data
Facilitates easier retrieval of data. This enhances performance and productivity.
Enhances data security by implementing user groups and privileges
Eliminates unnecessary duplication of data(Besanko, 2010). This makes it easier when it comes to sorting out of the files and hence makes it easier to retrieve it.
It enables the various members of a given staff who are working in some work areas to have knowledge of the exact place from which they have the ability of accessing enjoy form of information that they want.
It enables folders to be kept in a hierarchy that can be controlled hence enabling the electronic folders and the tittles of the documents which have been stored hence easing the situation in which some given form of information is required to be retrieved from the system.
The third advantage is that the electronic information which rel.
BlackBerry Workspaces: Solutions for HealthcareBlackBerry
In healthcare, the efficient delivery of accurate information can save lives. Thus, the current technology trends of mobility and collaboration hold tremendous potential in improving administrative and patient care processes. Yet many hospitals still rely on paper-centric solutions, such as faxes and printers, that are expensive, labor intensive, and prone to data loss. Outdated technology drives up the cost of care and puts organizations at risk of violating industry regulations such as HIPAA and HITECH — potentially incurring exorbitant fines or jeopardizing reputation.
Learn how BlackBerry Workspaces enables Healthcare organizations to stay in control of all synced and shared files wherever they go, on any device, online and offline — even after they’re downloaded from the system.
Simplifying Data Governance and Security with a Logical Data Fabric (ASEAN)Denodo
Watch full webinar here: https://bit.ly/38UlhbN
In an increasingly distributed and complex data landscape, it is becoming increasingly difficult to govern and secure data effectively throughout the enterprise. Whether it be securing data across different repositories or monitoring access across different business units, the proliferation of data technologies and repositories across both on-premises and in the cloud is making the task unattainable. The challenge is only made greater by the ongoing pressure to offer self-service data access to business users.
Data Virtualization allows the creation of a logical data fabric layer that not only increases the agility of data provisioning but offers a simple, fast and cost-effective way to secure and governance all your data.
Tune in and learn:
- How to use a logical data fabric to build an enterprise-wide data access role model
- Centralize security when data is spread across multiple systems residing both on-premises and in the cloud
- Control and audit data access across different regions
The objective of this workshop is to show existing Oracle Database (Enterprise
Edition, Exadata, Autonomous Database, EXACS, DBCS) customers how to
attach your Database to Data safe and gain valuable understanding of
potential risks. Using user Assessment, understand rights and entitlement of
users and review activity auditing which provides powerful insight to database
interaction. The workshop will finish with a full sensitive data discovery and
then how to anonymize date with sensitive data masking.
The workshop is delivered in an interactive way with Presentations and Hands on
Labs to ensure complete understanding.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Document Management System or Digital Folder.pptxBIS Safety
You can easily upload a plethora of policies, procedures, digital forms, documents, and files to a secure online storage location for your team using BIS Safety Software's Digital Folders.
You can also restrict who has access to the materials and who needs to sign off on them.
For more information about this software, visit our website.
Secure Enterprise File Sharing and Mobile Content ManagementBlackBerry
Organizations need to share files. In fact, over 50% of business processes, including some of the most critical, are document- based. However, most file sharing solutions have consumer-grade roots, and were not built with the security that enterprises need, balanced with the collaboration and mobility features their end users want. BlackBerry Workspaces™ makes enterprises more mobile and collaborative, while reducing the risk, complexity and cost of sharing information across and beyond your organization. Workspaces embeds digital rights management (DRM) protection in your files, so your content remains secure everywhere it goes. With Workspaces, you stay in control – even after files are shared outside your firewall.
BlackBerry Workspaces: Solutions for Energy & UtilitiesBlackBerry
Energy and utilities companies derive significant competitive advantage and operational effectiveness from their resources and processes. Using outdated technologies, such as paper forms and faxes, makes them prone to accidental sharing and data leakage. Also, if the integrity of critical information, such as operational safety procedures, is tampered with, the safety and well-being of employees and reputation of the company are at stake. Careful coordination and consistent communication of such information with select business partners or mobile workers are essential to sustaining productivity.
Learn how BlackBerry Workspaces enables Energy and Utilities companies to stay in control of all synced and shared files wherever they go, on any device, online and offline — even after they’re downloaded from the system.
Fascinated by the idea of a paperless offce?
With LogicalDOC document management it's possible to
replace paper documents with their electronic counterpart,
gaining a competitive advantage derived from a more
efficient management of your business, more effective
protection of data, enhanced collaboration and
rationalization of operations.
Document management system, also known as content
management system, commonly provide storage,
versioning, metadata, security, as well as indexing and
retrieval capabilities.
1. “Given today’s business environment,
the ability to share and exchange critical
information in a secure and timely manner
is crucial to sustaining operations.”
- Joe Panora,
Director of CDCR’s
Enterprise Information
Services (EIS)
As one of the largest state departments in the United States, the
California Department of Corrections and Rehabilitation (CDCR) is
responsible for administering justice by upholding the integrity and
operation of the California state prison and parole system. Inevitably,
they retain an array of highly sensitive files, such as inmate and
parolee personal details, audio transcription and criminal case
information – which they are required by law to provide for casework
and trials. CDCR needed a way to securely and easily share such
data between the agency and external entities involved in the cases
of inmates that need to be processed.
Goals
CDCR traditionally processed inmate and parolee case files by paper.
Even when most of the information was available electronically, much
of it was still printed out and sent for processing. In select cases,
the information would be encrypted, burned onto a CD and mailed.
However, transporting this volume of data to the Board of Parole
Hearings stakeholders in time for the scheduled hearing became
an issue. To comply with court mandates, CDCR needed a way to
accelerate the availability of data for inmates and parolees waiting
to be processed. “Given today’s business environment, the ability to
share and exchange critical information in a secure and timely manner
is crucial to sustaining operations,” explains Joe Panora, Director of
CDCR’s Enterprise Information Services (EIS).
.
.
.
Customer
California Department of Corrections and
Rehabilitation (CDCR) operates the state
prison and parole system
One of the largest state departments
in the United States with approximately
57,000 employees
Oversees 34 state adult prisons, 3
juvenile facilities, a variety of community
correctional facilities, and parole systems
Goals
Securely share files within the agency
and with external entities, such as public
defender and private attorneys
Implement an easy-to-use solution,
evaluated on usability, security and
scalability
Dynamically control, revoke and track
all files shared, even after they are
downloaded from the system
Deliver various file types including
Microsoft Office, PDF and media files in a
timely manner
Solution
Deployed as a cloud service, with
24/7 access to data and the option of
transitioning on premise in the future
Unparalleled security: Robust DRM,
mobile container, optimized rendering and
customizable watermarks to ensure that
only authorized users can access shared
files
Users are able to track the document
activity of the information they shared
without the involvement of IT
Benefits
Rapidly adopted in the initial pilot by the
department of 260 users and foresee
strong growth in the future
High quality of customized training and
guidance from WatchDox in rolling out the
solution at scale
Option to utilize existing SharePoint and
Windows File Share repositories using
WatchDox Content Connectors
.
.
.
.
.
.
.
.
.
.
California Department of Corrections and
Rehabilitation (CDCR) Adopts WatchDox
for Secure External Collaboration
Case Study
Government
2. Case Study | Government
Page 2
CDCR is using WatchDox as a cloud service for
fast deployment and easy scalability with the
assured security of the WatchDox solution. With
WatchDox, CDCR retains full ownership over its
data and can choose to migrate to an on-premise
virtual appliance solution, if required in the future.
Most importantly, EIS considered the unparalleled
security that distinguishes WatchDox in the market.
WatchDox has the unique ability to provide true
digital rights management (DRM) control of files on
all devices, yet the security it provides extends even
further. Data is fully encrypted and containerized
within WatchDox Mobile Applications on Android and
iOS devices, as well as optimized for accurate
rendering in the web and mobile viewers. Files marked
with “Advanced Rights Management” can be protected
even after they are downloaded from the system
directly on the desktop as they are used in native
Microsoft Office and Adobe Reader applications and
can be dynamically revoked regardless of where they
reside.
Additionally, WatchDox allows file owners and
workspace administrators to manage documents and
user permissions, including being able to view and
download document activity logs for reference in their
day-to-day interactions. While IT unsurprisingly wants
to track everything, agency users expressed the
desire to be able to audit their own data to understand
what is being shared by their collaborators for what
purpose. Other EFSS solutions only allow system
administrators to access tracking information, which
would require an IT ticket to be submitted in order to
Solution
EIS chose WatchDox for enterprise file sync and
share (EFSS) after consulting with an analyst from an
independent research firm and conducting a proof-of-
concept evaluation. They decided that WatchDox best
matched the usability and security requirements that
CDCR set forth to provide the features that both users
wanted and IT needed.
CDCR needed a solution to:
1. Securely share files within the agency and with
external entities, such as public defenders and
private attorneys.
2. Implement an easy-to-use solution, evaluated
on usability, security and scalability that could be
established as an agency standard.
3. Dynamically control, revoke and track all files
shared, even after they are downloaded from the
system.
4. Deliver various file types including Microsoft
Office, PDF and media files in a timely manner.
Internally there are many ways for employees to share
data, but when it came to external parties it became
extremely difficult while ensuring adequate security
was in place. Previous methods of user-provisioning
were extremely cumbersome and deterred widespread
adoption.
“None of the tools that were in place offered the
combination of security and customer experience that
people have come to expect from modern consumer
file sharing applications,” says Scott MacDonald,
CDCR’s Information Security Officer.
3. Case Study | Government
relay the information.“By putting the power to provision
users in the hands of authorized agency employees
(i.e. only internal agency super users identified by
department are given workspace administrator
rights), customers can efficiently and effectively share
information while minimizing IT overhead,” explains
Dan Marshall an IT security analyst for EIS.
In today’s technology environment, mobility must be
considered. CDCR knew that they could not overlook
the need for mobility in its user base. With integrated
access, creation, edit and annotation features built in,
WatchDox has that covered.
At this time, CDCR does not allow employees to
“bring your own device” (BYOD), yet still has a need to
support people who are not a part of the department
and cannot control how outside users consume data.
WatchDox provides a solution where CDCR can
adhere to best practices when sharing data across
multiple platforms.
Benefits
Since launching WatchDox, CDCR is seeing rapid
adoption in the various lines of business where it is
introduced.
An added benefit that CDCR found in working with
WatchDox is the high quality of customizable training
that is offered by WatchDox.When deploying a solution
to hundreds and potentially thousands of users, IT
departments can easily be overwhelmed dealing with
the technical implementation as well as training end
users. Rather than assuming the entire burden, CDCR
chose to engage WatchDox in administering training
to internal agency employees as well as outside
entities (public defenders and private attorneys). By
leveraging the experience that WatchDox brings to
rolling out solutions at scale, CDCR can provide the
comprehensive education, resources and support
necessary for their complete user base.
Page 3
“With integrated
access, creation, edit
and annotation features
built in, WatchDox has
[mobility] covered.”
Looking towards the future, EIS is evaluating the
possibility of extending the security, mobility and
collaboration benefits of WatchDox to existing
SharePoint and Windows File Share repositories
using WatchDox Content Connectors. CDCR currently
operates two SharePoint instances, one internal and
oneexternal,usedacrosstheorganization.Theexternal
instance was originally established with external
sharing in mind, but now with WatchDox CDCR can
reevaluate its necessity and potentially consolidate
systems. CIFS file shares are also presently used to
store automatically generated content that needs to
be provided to different external departments. Rather
than having to pull the data manually from the existing
systems to be shared in WatchDox, CDCR is planning
to leverage WatchDox Content Connectors to do so
dynamically and without duplicating the data.
CDCR can now rest assured that regardless of whom
their employees are collaborating with and where the
data resides, it can always be protected, secured,
tracked and revoked with WatchDox.
4. Enterprises share with WatchDox.
Learn more at watchdox.com.
299 S. California Ave. #300
Palo Alto, CA 94306
1.800.209.1688 | watchdox.com
WatchDox enables organizations to access, protect and
control their critical documents wherever they go: on
any tablet, smartphone or PC, even those beyond the
IT department’s control. With WatchDox technology,
organizations can collaborate securely with partners, safely
adoptbring-your-own-device(BYOD)initiatives,anddestroy
their documents remotely if a device goes missing. More
than 100 of the Fortune 1000 including many of the world’s
leading financial institutions, manufacturers and government
agencies depend on WatchDox secure file-sharing solutions.