2018년 6월 20일 수요일

[Document Centralization - Together with Mr. Yoo] Ep 5. mcloudoc – Support of various kinds of network environments



- We will connect you with service product inquiries and consultation related to mcloudoc.



#1. Company network structure - Stand Alone
Shall we look at the first structure? This is a structure that is usually used by customer companies with less than 100 users. There is only one server. Employees access and use the server directly from their PCs.

#2. Company network structure - Active-Passive
Next is a structure that is mainly used by customer companies with 100~500 users. ClouDoc servers are configured in pairs like 2, 4, and 6 servers. Each server has a high availability (HA) solution installed.
Among the servers with high availability solutions installed, the Active servers are used for service. If there is a problem with this Active Server, the Passive Server becomes an Active Server to support the service.

# 3. Company network structure - Active-Active
Next is Active-Active. It is mainly used by customers with over 300 users. At least two servers and even up to tens of servers can be used. In this case, load balancing can be done between servers through L4 switching or Load Balancing Service (LBS). A High Availability (HA) solution is only required for database redundancy. ClouDoc is designed to enable Active-Active services without a separate solution. Because all participating servers are always running, server utilization is much higher than Active-Passive.

 #4. External document exchange server structure
The ClouDoc server is usually only accessible from the Intranet to prevent attacks by external malignant code. You can build an external document exchange server in the DMZ to securely exchange files with the outside. Employees can exchange files with the outside easily with Windows Explorer.

# 5. External DRM server structure
The external DRM server structure is the same as the external document exchange server structure. The only difference is that the file is encrypted when exported. Employees will encrypt the files in Windows Explorer after acquiring an approval from a team leader to send the files to the outside. Those who receive this document will provide non-repudiation and information leakage protection through security functions including One Time Password.

# 6. Access via VPN during business trip or working at home
 If you have traveled outside or need to work at home urgently, you can connect to the ClouDoc server via VPN to work. In some cases, you may connect from outside by using router settings or a virtual desktop program, although we don’t recommend this.

# 7. Access via Proxy server during business trip or working at home
ClouDoc provides connection via Proxy server for both PC and mobile devices. This feature is especially useful for accessing ClouDoc servers on smartphones. Unlike the VPN server, it is very useful because it can access the ClouDoc server from the outside only by setting it up without the need to install a separate program.

#8. Access to external ClouDoc server via Proxy server
ClouDoc's proxy server support was developed for when ClouDoc is outside, not on the Intranet. This feature can be very useful if all corporate Internet connections are only allowed through a proxy server.

# 9. Application to network separation environment
In a network separation environment, ClouDoc performs well through the external document exchange server and data exchange system between networks that exist in a DMZ. A data exchange system between networks is a data movement method used to block the inflow of malicious code between Internet and Intranet.
If you install an external DRM server instead of an external document exchange server in the DMZ, ClouDoc can perform well through the data exchange system between networks.
   
# 10. Collaborative use information leakage prevention collaboration environment
Let’s look at a work environment where you need to work with the partners, but you do not want the partner's products to leak. Partner employees connect to the VPN server. Next, they go through the proxy server and access the ClouDoc server in the Intranet through the data exchange system between networks.
In this environment, all of the deliverables will be stored on the ClouDoc server when the partner employees work.
ClouDoc's security policy is flexible. Depending on the IP band you connect to, you can apply different security policies, even if they are the same user. If a partner employee turns off the PC and reboots, he/she can deactivate the security policy if not connected to ClouDoc. In this way, security policies can be strengthened while ensuring the convenience of partner companies.

Resources
- Download a ClouDoc document centralization solution brochure

- Download a mcloudoc document centralization cloud service brochure

- How ClouDoc responds to ransomware


2018년 6월 8일 금요일

[Document Centralization - Together with Mr. Yoo] Ep4. Simple and low cost network separation of mcloudoc against malicious codes!



More Information : www.mcloudoc.com

#1
Hello, I am here in Shenzhen, China next to Hong Kong. The China Information and Telecommunications Expo is being held today, and we are here to promote our products. Today's topic is the network separation function. The network separation function is necessary to prevent malicious code from destroying systems and leaking information from the military, government agencies, communication companies, power plants, etc. Today, I will introduce a function that can prevent the leakage of information by installing the software on your PC though mcloudoc functions. I will see you at the expo in a bit!

#2
The leakage of private information from various institutions has been continuing. As a result, the government does not allow business PCs, which are used for important tasks, to be connected to the Internet. But a work environment without Internet is hard to imagine. Thus, they provide two or more PCs to each person so one is connected to the Internet, and the other is disconnected from the Internet. There are three main types of existing network separation environments. The first is to provide two PCs to one employee. One is connected to the Internet, and the other is blocked. This is called physical network separation. The second one is server-based computing providing a VDI environment. Usually you use the Internet on a physical PC, and you do not use the Internet on a virtual machine PC in VDI. The third one is client-based computing providing a virtual machine environment within the physical PC. The first and second methods are not easy to introduce because of the high introductory cost and the ongoing maintenance costs. And the third method seems to not be well suited to the market due to stability problems.

#3
The reason for the high cost structure of the existing network separation solutions is that at least two PC environments should be provided to all employees, so the network must be designed in a dual structure, and a network data exchange system must be provided. The Incheon Metropolitan City Office of Education did not follow the generalized network separation practices and seriously considered the original purpose of preventing information leakage by malicious codes. The Incheon Metropolitan City Office of Education proposed to us how to block information leakage by malicious code simply by installing software on a PC while using the existing business environment. We quickly implemented that concept and applied it to the Incheon Metropolitan City Office of Education.

#4
First, the administrator divides the IP address into the Intranet and the Internet. Some sites such as banks, National Tax Service, and government agencies may be included as Intranet if necessary. The mcloudoc central drive is only connected to the Intranet mode and not visible in Internet mode. Internet connection is blocked in Intranet mode and Intranet connection is blocked in Internet mode. The exchange of data between the Intranet and the Internet uses a function called Document Export Secure Disk. In Intranet mode, the export of a central document requires approval. Documents saved on the exported disk in the Internet mode can be viewed in the Internet mode. In this way, it provides an excellent network separation environment without changing the network environment and without a network data exchange system. In this environment, even if your PC is infected with malicious code on the Internet in the Internet mode, this malicious code cannot leak information outside.
  
#5
And to show you, I included Google as an Intranet site, on the Internal mode. Let me connect. It is well connected. Now I will go to the Internet mode.
The Central Drive is gone. Let's connect to the Internet site, Facebook. It is well connected. Let's connect to the in-house calendar site. It doesn’t work. And the Document Export Secure Disk shown here can be used to exchange data between Internet and Intranet by using it in both modes.

There are some precautions when an administrator sets up the list of IP bands for Intranet mode and Internet mode. First, this is for Intranet mode. In the Intranet mode, it is necessary to confirm that all the required servers including the DNS server, groupware server, and remote support site are included in the allowed IP band. The list of allowed servers can be set up in comparison with the mcloudoc basic policy to reduce trial and error. And in Intranet mode, there are exceptions that allow multiple Internet sites for specific purposes. If you need to add more sites continuously because there are too many, it is better to affiliate. And if you have a single site but need to use more domains and IP addresses internally, we recommend that you also join it with the Intranet mode.

Then let’s look at the precautions in the Internet mode. In Internet mode, you need a DNS or Windows update server. You need to check if the connection is blocked.
And since you may need some Intranet services on Internet mode, you should also make a careful comparison with the mcloudoc basic policy to set it up and help reduce trial and error.

#6
There are precautions when setting the IP band for Intranet and Internet mode. If you need a DNS server, groupware server, and remote support site in the allowed IP band in Intranet mode in your work, you need to make sure these servers are included. You can reduce the trial and error by setting the list of servers to allow in line with the mcloudoc basic policy that we provide. And, in some cases, employees may request additional servers that are needed in Intranet mode. First, it is recommended not to include them if there will be more of these sites. Second, we recommend that you do not add to the Internet mode if you have one site but need to add a lot of IPs with it, or if you need to add another domain name other than the site name.

#7
These are the precautions for Internet mode, and it’s same for Internet mode. DNS servers and Windows update servers are also required. If it is blocked because it is an Intranet IP address, you will need to allow it. If you use the policy settings provided by mcloudoc even in Internet mode, you can easily set the policy without error.

#8
The Privacy Act stipulates that the Internet must be controlled when using a personal information processing system. NetworkLock can be operated under this condition. NetworkLock can control the use of the Internet in the Intranet mode for personal information processors even when the network is not completely separated between the Intranet and the Internet. And NetworkLock can set different network control policies according to each person's job. For each user, you can assign a server access permission or an internet site access permission differently. However, NetworkLock is not a condition for privacy authentication, it also requires additional security solutions such as firewalls, antivirus, network access control, and DB access control.

#9
The first effect is to prevent malicious code infection, and the second is to prevent information from being leaked by malicious code. Infection with malicious code causes problems such as inconvenience or data loss. However, the leakage of information by malicious code causes a bigger problem. Our precious information is leaked to the enemy, and it brings a terrible result that can be economically or militarily irreversible.

Therefore, information leakage by malicious code is a much bigger problem than malicious code infection. However, a number of local governments requiring network separation are not able to separate networks due to cost problems. NetworkLock provides the most effective way to prevent the leakage of information by this malicious code, and does so at a low cost.

#10

I have just explained NetworkLock, our network separation function. Now, I hope that our information communications network act reflects these latest technologies. If security is applied through differentiating by task, an effective information leak prevention environment can be established.

So here is my question today.
"What are the advantages and disadvantages of NetworkLock as a network separation function?". Please leave a comment below the video.
Please subscribe to mcloudoc today and I’d appreciate it if you click like.
Let me finish up here. See you in the next video.

Resources (블로그)
- Download a ClouDoc document centralization solution brochure

- Download a mcloudoc document centralization cloud service brochure

- How ClouDoc responds to ransomware
(Chn)http://www.net-id.co.kr/renewal/download/Cloudoc_against_ransomware_chn_20171215.pdf

2018년 5월 29일 화요일

[eGISEC 2018] mcloudoc Introduction


Hello. This is Sang Leol Yoo. Today, I am at eGISEC, the largest IT security solutions exhibition in Korea. Today, I have a session for my presentation. Ok, I'll see you in a moment.


Now, Sang Leol Yoo, CEO of Netid is going to talk about Cloud service, document centralization.


Hello. This is Sang Leol Yoo from Netid. Thank you for attending my session. This is the order of my presentation.


First, I am going to talk about the background of document centralization cloud service. As you all know, document centralization services are designed to prevent leakage of advanced technologies, prevent leakage of customer information, block Ransomware, and most importantly, improve the work environment through document management. It is used for this purpose.


Netid released a document centralization cloud service. To introduce normal document centralization, the initial cost is high and requires man power to maintain and manage the document centralization system. However, with cloud service, initial investment costs are reduced, services can be managed without the need for staff, and Netid serves a role as a call center. This is the social background in which document centralization cloud service is required.


And in terms of IT environment, telecom companies are concentrating on 5G service. When this 5G service is available, the communication speed of a mobile phone is 20G, not 5G. A speed of 20G is incredibly fast. I feel like “wireless is getting more and more advanced over wired”. In addition, the Korean government announced that they would commercialize the Internet as 10G in 2018. So, the network speed is getting really fast, and as you can see in this slide, there is a graph that shows how the network speed improved in each country, and the network speed is improving very dramatically. The difference in Internet speed between the India I visited five years ago and the India I visited in December was very big.


And another interesting thing is that now it doesn’t even cost 500,000 won to buy a 10TB hard disk on the internet. But in 2000, 1TB did not even exist as a hard disk, and it was in a storage box, which was 100 million won. You can now buy 10TB with 500,000 won.


And even more surprising is the SSD field. Now you can get 4TB SSD for 2 million won on the internet. In February, Samsung Electronics started to produce 30TB SSD. Network speed, storage speed, capacity, and price … all these things make it easier for anyone to access document centralization services.


So why is mcloudoc service better?
The mcloudoc service is based on a solution, ClouDoc. Currently, approximately 300 companies and 53,000 users use ClouDoc. And we have signed more than 50 new customers each year for the last four years. So, ClouDoc's annual revenue growth is close to 40%, and it's a solution that's proven to be effective from customers. It offers cloud service based on this.



We put this know-how into service. In addition to the functionality of ClouDoc, this service provides the ability to back up all documents uploaded to our service for 7 days. Other features include information leakage prevention, Ransomware protection, and document management.


If you look at the configuration of mcloudoc, first, you can use a server that Netid manages itself. In some cases, you can use virtual machines such as Amazon's AWS or Microsoft's Azure. And the backup of the documents is provided by the server we host for 7 days by date backup. We found safe and effective backup methods to provide this service for AWS and Azure as well.



When the documents are saved, we provide basic backup functions, but we plan to provide additional online backup service starting from the second half of 2018.
The online backup service is to keep the backed up document once more in a completely separate place.



Currently, if you purchase mcloudoc, we offer four features. The basic function is to manage the documents of the company such as personal documents, department documents, and shared documents. And we offer Disk Lock, a feature that prevents storing on a PC, additional document security features, and mobile features that you can use with iOS or Android.


For PC save prevention, you must set the policy for prohibiting storage on the PC for each application. In the past, document encryption solutions were developed for each program and provided various encryption functions. Without any further development, we already have policy settings for many of these programs, so we can apply them right away. If you need to set up a policy for a program that is not on this list, we can usually provide you with policy settings in a half day, one to two days at the latest.
This is an area where we can respond differently than with existing encryption solutions.


What effects can we expect by introducing mcloudoc? First, the initial investment is reduced because you do not need to have a separate computer room or a separate server. In addition, the cost for manpower to manage the server and computer room, and the staff to solve various problems when employees call with them, will be reduced.
It also provides an effective work environment through prevention of information leakage, blocking of Ransomware, and document management, which is the purpose of document centralization.


To summarize what I've said so far, the mcloudoc service is available for a minimum 5 users. In the past, a customer with 10 users requested the following via phone, "The introduction fee is too high. Can Netid provide their own web hosting?" But it was not available. Now it’s possible. 5 users can use the document centralization cloud service.
So in the first month, there is an engineer fee and monthly fee and starting the next month, there is only a monthly fee.
The environment became very easy for making decisions and using the service.


Once consulting with your company now or after going back, you don’t even need to worry much about things like "I like this cloud service. I need it but what should I do?”. You only need to know how many people will use it. You just need to think about "document centralization service provides 50GB per person, but do I need more capacity?”
In the second half of 2018, you have to think about one more thing. "Do I need an online backup service?" That’s all. It has eliminated all your worries.
If you have any questions, please contact us at the phone number and e-mail address here. We will be happy to help you.


In this exhibition, we are organizing an event for new customers who are signing up for mcloudoc. You can participate one of these two events: "1 free user for 5 users" and "1 month free for 6 months". We plan to complete the mcloudoc site reorganization in March and do the same event on the web.


We also created a YouTube channel. A few days ago, I saw the article, it said that Korean users have doubled their usage on YouTube over than Naver. That shows that our customers actually want to check things through video before purchase. ClouDoc has entered the document centralization market at comparatively early stage. It is the oldest existing document centralization solution.

I plan to upload a video every month to explain what document centralization is and how to approach it in an easy and systematic way. Document centralization solutions actually originated from Korea.

That's why we created this channel to promote the concept of document centralization to our international customers by providing subtitles in four languages.

I’ve posted two videos now. We are sending you Americano coupons during this exhibition, so please participate by searching for mcloudoc on YouTube, subscribe to our channel, select any video, click ‘I like this’! and leave a comment.


This iss an actual introduction case of 10 users. There are only 10 employees, but when the owner made this company, he was confident about his technology. So it should not be leaked by employees or partners. That was the reason they introduced this. It was an easy decision.
It took less than a month after they asked about the product. Because it does not cost a lot. Customers who have used this document centralization product often purchase for all of their employees after a year or two. Those who are ahead of us are interested in document centralization and security.


I think mcloudoc is a very good product for a private hospital as well. I was surprised when I visited a large hospital. Where do you think CT and X-ray images of patients are stored?
In the vault? They were just saved in a Windows file server. I said that SSD 4TB is 2 million won nowadays, if there is any employee with malicious intentions, that person can copy all of the patients' images and store them in there. I thought that if it’s like this in a large university, then how bad it would be in a small hospital? So I think it would be better to use a cloud service, mcloudoc, in hospitals, travel agencies, and academies where the size is small but there is a lot of customer information.


I talked about a small-scale manufacturer case as the first real customer case. And for large companies, purchasing a solution is extremely complex. They have to plan, write drafts, get cooperation from other departments, receive approval and such ... it's too difficult.

However, if you use the cloud service, decision making is easy, for example, the head of the department can decide the budget for the department without approval from the president.


More Information: [mcloudoc homepage]

Resources 
- Download a ClouDoc document centralization solution brochure

- Download a mcloudoc document centralization cloud service brochure

[Document Centralization - Together with Mr. Yoo] Ep3. Why mcloudoc information leak prevention?



#1.
Hi everyone, good to see you again. Today, I'll take a closer look at mcloudoc information leakage prevention. Nowadays, there are a variety of cloud services as well as computer peripheral equipment and the internet. So the paths for information leakage are increasing. mcloudoc is a very good solution to crack down on every channel of this information leakage without a separate security solution.
Then, mcloudoc’s prevention for information leakage! How is it different? Let’s take a look at it in a moment.

#2. Computer peripheral equipment information leakage prevention
First, let me copy the centralized document to the USB memory and smart phone that you use the most.
I tried to copy it to USB memory but it fails. I also try to copy it to my smartphone, but it fails. In addition to this, the document can’t be copied to the CD drives, network drives, or external hard disks. We also block information from being copied to various media such as infrared ports, Bluetooth, and so on.

#3. PC storage prohibition
For example, documents from programs such as MS Office or CAD, the programs you specify for your business, cannot be saved if you save the document to the C drive. So, you can save it in the central drive provided by mcloudoc such as the X, Y, or Z drive. This centralized document can only be read by programs that are allowed to be input/output from the center. When you try to save this read document back to the C drive, there is an error and you cannot save it. If you try to save this on a USB, network drive, or SD card as well as this (C:) drive, it will not be saved due to an error.
Here is another tip. Since ClouDoc controls this application, if you do not want the document to be leaked through the network, you can disable central input/output for a program that has a network transmission function. This is also a way to block information leakage through the network.

#4. Block clipboard copy, screen capture, print
Next, let's see clipboard copy, screen capture, and print block functions. MS Office input/output allowed I/O only centrally, while Notepad allowed only local disk I/O. So when I try to copy the contents of MS Word to the clipboard and paste it into Notepad, it fails. This time, let's take a look at screen capture.
I selected the screen capture tool to capture MS Word, and the MS Word document became black, which enabled capture. And when you look at the print section, I get an error when I try to select a printer to print it out. So in mcloudoc, you can specify a useable printer, or you can specify a printable program for each printer so that only those programs can print.

#5. Web mail/ Web bulletin information leakage prevention
You cannot copy a centralized document to a medium such as USB, and if you try to attach a document to the web, the error also occurs. If I try to attach a document to Google Mail without permission to export it, then I get an error. And when I try to attach the file to a Google blog site without permission, I also get an error.
Like this, information leakage through the Web is prevented.

#6. Messenger information leakage prevention
This time it’s messenger. Let's try to attach the centralized document to ‘Skype’. At the current setting, ‘Skype’ cannot read the centralized document because it is not on the WhiteList. So the attachment fails. Messengers such as ‘MSN Messenger’, ‘KakaoTalk’, ‘LINE’, ‘WeChat’, and ‘WhatsApp’ as well as ‘Skype’ are also not included in the WhiteList, so you can block information leaks.

#7. FTP information leakage prevention
Let's also look at FTP. Let me try to send a document through ‘filezilla’, which you know well. As you can see, you cannot send documents from a central drive to the outside via ‘filezilla’. This is also because ‘filezilla’ is not included on the WhiteList and cannot be read. Next, there is the FTP function provided by Microsoft Windows Explorer itself. This Windows Explorer is included in the WhiteList. So I try to use this to send a document. I used the FTP function here and it pops out to a web browser. This is because mcloudoc has blocked the FTP function in Windows Explorer.

#8. VM CDI information leakage prevention
Yes! ‘VMWare Workstation’ is installed on this computer. So there is a physical PC and there is one virtual machine in it. I will copy the document from the virtual machine and paste it into the physical PC. It does not copy. Conversely, even when there is a central drive in the physical PC, copying to the virtual machine is also blocked. When using the VDI environment, you can block the movement of files between the virtual machine and the physical PC in the same way to prevent information leakage.

#9. Remote desktop connection information leakage prevention
Your PC has a remote desktop feature. So anyone outside can log in via the remote desktop and use your PC. At that time, that person’s local disk (C :) can be displayed as a Windows Explorer drive in the remote desktop connection state. When I tried to copy the central drive document there, it’s blocks me. Also, if that person tries to copy the contents of the document in the remote desktop while connecting by copying the contents to the clipboard to his or her PC, it will also be blocked.

#10. Cloud information leakage prevention
Nowadays, there are a lot of problems in terms of cloud service information leakage prevention. Cloud services, of course, can create a low-cost, efficient work environment, but they can be vulnerable to information leakage. So information leakage is at your employee’s fingertips. Let me show you how we can block information leakage for a few cloud services.
If you see Google Drive, a program called ‘Backup and Sync’ will run. So even if you set the folder to backup, the Backup and Sync program is not on the WhiteList, so you cannot export the information.
Next, let's look at the ‘ONE drive’ from Microsoft. ‘ONE drive’ is also programmed. So if you try to upload to this ‘ONE drive’, you will not be able to leak information because ONE drive cannot read the centralized document.
Recently, many programs such as ‘dropbox’ have been plugged into Windows Explorer. It's on the WhiteList, but you can see that when you attempt to copy a centralized document to a plugged in ‘dropbox’, it will not be copied. This prevents information leakage on cloud services! mcloudoc also provides this functionality.

#11. Information leakage prevention by other programs
In addition to the programs I have explained so far, there are P2P programs such as ‘uTorrent’ and ‘Bittorent’, and remote support programs such as ‘TeamViewer’ or ‘rusupport’ for remote support of customers. Many other programs are free from information leakage because they are not part of mcloudoc's WhiteList.

#12. Application for document export
Here, the process of document export was not fully explained due to time constraints. Documents approved by the team leader can be exported as a web page, you can export them to USB or PC hard disk, transfer or take them to the outside.

#13. Ransomware blocking
You might be wondering about the Ransomware protection. Ransomware is one of the most dangerous malicious codes in that it does not leak information but it destroys it. There is a separate video for Ransomware on our homepage so please refer to that video.

#14. Separation of intranet and internet
This is one of the other features I did not demonstrate today as I'll have time to introduce it in a separate video later. There is a network separation function that completely separates the intranet and internet from the PC by software. This network separation function can be used as a personal information security function and can be used as a comprehensive function for preventing information leakage by malicious codes.
I will introduce this feature later.

#15.
I explained mcloudoc information leak prevention functions today and I hope it was helpful. Let me ask you today's question. ‘Can document centralization replace media control solutions and DRM solutions?’ Please leave a comment below the video. I hope that it will be a forum for quality discussions between you all and myself.

#16.
Thank you for watching. Please subscribe to the mcloudoc channel and please click the like button. I'll see you in the next video.

[Document Centralization - Together with Mr. Yoo] Ep 2. 10 reasons to centralize your documents with mcloudoc


#1. Hello, this is Osaka. I am in the Osaka exhibition hall where the largest IT exhibition in western Japan is held. I am here to promote mcloudoc cloud service. Document centralization has a long history but at the same time, it’s short, so there are many success cases, however, there are many cases of failure as well. How to avoid failure in document centralization! Today, I will tell you about 10 reasons to centralize your documents with mcloudoc. Ok! I'll see you in a moment.
#2. CAD drawing security
You can use mcloudoc effectively for CAD drawing security. Countries like Korea, China, Japan, USA, Taiwan, Germany, have very strong manufacturing industries and CAD programs are mainly used by those manufacturers. When employees save CAD drawings using this CAD program, they usually save them on their PC. With mcloudoc, you now have all the drawings on your company server. These saved drawings can be protected by mcloudoc. If you see that Samsung Semiconductor and Hyundai Motors related companies are managing CAD drawings with mcloudoc, you can see that mcloudoc is very effective in securing CAD drawings.  
  
#3. Customer personal information protection
You may use mcloudoc for personal information protection purposes. Personal information can be your name, resident registration number, credit card number, and photo. When you go to the hospital, you have more information. For example, there could be a medical record, a surgical record, X-ray, a CT scan, an MRI scan, an ultrasound scan, and so on. There has been a constant occurrence of leakage of personal information of customers in financial institutions and public hospitals. The probable cause of this is that a lot of personal information is scattered on the employees' personal PCs. So if you use mcloudoc to centralize all of the personal information of customers, mcloudoc can manage and protect your centralized documents. Lastly, as a tip, if you are considering a security solution because you do not have a personal information system yet, do not use a variety of solutions such as media control, document encryption, and document management solutions separately. We recommend using only mcloudoc, a document centralization solution, to create a complete personal information protection system.
#4. Ransomware blocking and post countermeasure
mcloudoc can handle Wannacry, Xperia, and BadRabbit Ransomware. Long ago warriors would gather people in a fortress to protect them from the enemy. Likewise, our document centralization solution can centralize documents and protect them from Ransomware. These centralized documents are protected by creating a white list of programs that can access these documents. In addition, it provides a function called DLLLock in case a white listed Windows Explorer item is infected. If the document is infected or an emergency occurs, we provide our own backup appliance function, which keeps the folder as it is by date. It is a backup function that also provides incremental backup. You can also restore documents from it.
#5. Declaring ownership of work data
Declare company ownership of your business data with mcloudoc. In many cases, when employees quit their company, their USB memory will still have data, but there is often no data left on the company's PC.
Many of them often misunderstand that their work is not owned by the company but think it is their own. Centralizing documents with mcloudoc has the effect of declaring the work output of these employees as company owned. Employees tend to be especially careful about the outflow of these centralized documents. And if one employee deliberately leaks the document, he or she will have to pay for the result.
#6. Prepare for security certification
There are certification systems from international certification bodies or government agencies such as ISO27001, ISMS, and PIMS. Even in general private companies, Hyundai Motors also implements a certification system called HISMS for partner companies. mcloudoc is serving as a backbone solution in this certification process. In fact, Tokyo Electron Korea received ISO27001 and CNCITY Energy received PIMS. We expect more customers to use mcloudoc in the future to receive certification such as ISMS or PIMS.
#7. Simplify management points
In a work environment where documents are not centralized, key business data or customer personal information is stored on the employee's PC or mobile device. Because there are so many management points, it cannot help thinking that managing these documents consistently, preventing information leakage, and backing up and restoring them is very difficult. However, in a document centralized environment, it is possible to manage centralized documents consistently, prevent information leakage, back-up, and restore. When documents are no longer being managed by individuals, it is possible for the company to operate more reliably.
#8. Paperless work environment
The role of mobile devices is becoming more important in our work environment in recent years. Some companies provide smartphones or tablets, or an individual employee may use their personal mobile device for work. In the mcloudoc document centralization environment, all documents are centralized, so you can view documents using these mobile devices. Now you do not need to take paper documents when you go outside or go to a meeting. Now you can view your documents anytime, anywhere using your mobile device. This allows employees to save paper costs and focus their work on their core competencies. And it enables everyone to carry out work based on the latest technology.



#9. Activate collaboration
Unlike general security solutions, which only restrict the use of individual computers, the document centralization solution also provides collaborative functions that are helpful to your business. You can organize folder categories in the departmental folder between internal employees and manage permissions by team. You can exchange documents with external partners using an external document exchange server or external DRM server, and secure document exchange methods are possible between affiliated companies. It also provides content search functions for general documents as well as scanned documents, and even when an employee leaves, the document is still stored at the center, simplifying the takeover.



#10. Increase sales with customer satisfaction
Since corporate documents are stored centrally rather than on a PC, systematic management is possible and content search for documentation is possible at once. If you systematically manage folders and use search functions, you will be able to respond quickly to customers, which will increase your customer satisfaction. In recent years, many companies have made customer satisfaction a top priority for sales growth.



#11. Cost reduction
mcloudoc is a complete replacement for media control, encryption, and document management. A single solution can replace all three solutions, saving you not only the cost of installation, but also troubleshooting and maintenance costs.



#12. I hope this video will help you understand mcloudoc. For more information, please see the instructions below. I will ask you today's question.
Which do you think will help your company: document encryption DRM or document centralization solutions? Please leave an answer or comment below. I'll be happy to answer your questions.
#13. Please subscribe to our mcloudoc channel. Click like for this video.

See you at the next video.  

[Document Centralization - Together with Mr. Yoo], Ep1. What is mcloudoc?



1.
Hello!

2. 
Today, I like to talk about mcloudoc, which is a document centralized cloud service, inviting product developers. 

3.
Document centralization is the first concept in the world that POSCO has tried in 2010.
It does not let the PC store any documents at all, and had all the documents stored only on the server. In Korea, which is an advanced IT country, there are a lot of world's first services such as 'Nation of Delivery(Baedalui Minjok)' and 'Web hard' service. mcloudoc.com aims to globalize the document centralization service.

4.
If you look at the document centralization product, it is based on Windows Explorer and does not leave any data on PC. It provides functions such as Clipboard copy control, Block screen capture, Print control, etc. necessary for the media control function and the document encryption function. So, if you install only one of our programs, you can get all of these functions, so you can lower the purchase cost, the management cost and the maintenance cost.

5. 
ClouDoc have dominated the market in advance from the early days of document centralization. So, we have led related technology concept establishment and development direction. It is now the number one product in the centralized document market, and as of 2017, it has become a solution used by approximately 300 client companies and 53,000 users. Since 2014, the average annual growth rate for the three years has been 38%. During four years to 2017, we have achieved a record that more than 50 new client had been recruited each year.

6.
Lets listen to customers who have introduced the document centralization.

7.
Q/ Hello! Could you please explain the background of our product introduction?

A/ Before the introduction of the ClouDoc, it was difficult to manage the scattered stored files, and it was considered that there was a high risk from a security point of view. While we were looking for solutions, we became aware of the document centralization solution that combines the functions of various security solutions such as file management, network drive, document encryption, and document export control. So it was introduced as judged to be efficient in terms of information leak prevention, compatibility with the solution, and user usability.

Q/ Ok, then how do you currently use the document centralization and what do you think about the effects of the introduction? 

A/ By managing the company's important information, we can manage the outflow of information by controlling the export after storing the company's assets and customer's personal information in the server. In addition, the loss of information has been minimized through document loss prevention and history management. In particular, data loss due to malicious code infection has been dramatically reduced. In addition, by utilizing the logical network separation function, we have implemented the access control for the customer's personal information by controlling the internal system and the external system that can be connected to each user, and this has helped us to receive the PIMS certification examination.

8.
Thank you for your answering. I would like to ask software developer Choi Ji-Woong to explain the PC security environment. 

9.
When you use solutions in your enterprise, the most important thing is security and efficiency. For this reasons, ClouDoc has been developed as a Windows standard file system, it provides powerful security features along with it.

10.
It can be accessed easily by anyone with direct access to the Central Drive through the Windows Explorer drive. For this centralized document, you can block copying and moving to multiple types of storage media, such as USB including local disks. In addition, it provides 'Clipboard copy control (function)' to prevent data leakage due to clipboard copying and pasting, 'Block screen capture (function)' to prevent screen capture, and unauthorized printer or program. It also provides a 'Print control (function)' to block printing for unauthorized printers or programs and 'Print watermark (function)' to manage the printed documents.

11.
I heard you say well. So, researcher/software developer Hong Sung-Hee, what are the document management features?

12. 
Yes, document management features provide essential functions for today's IT environment rather than traditional EDMS.

13.
Because it is automatically checked out and locked even when you open the document, others can only view the document. Document version management is provided that allows users to restore documents to any point in time by storing a previous version when only edited and stored them. In addition, it is possible to search for desired documents by entering keywords in order to retrieve document contents, and also provides 'Personal information security' for customer personal information management and protection.

14.
Thank you for your explanation. Then, lets listen to the explanation of the mobile function by researcher/software developer Song Nak-Gyu.

15.
Our mobile uses Use an app dedicated to ClouDoc to help users work outside the company.  

16.
Outside the company, there are many cases where direct access to ClouDoc is not possible. In this case, you can set up a proxy server to work outside, and you can receive push notifications at any time from outside so that it is possible to process the approval of the request for export in real time. In addition, it is possible to have a meeting with opening a document or making a note on the opened document, and you can copy the link of the file and send the text or mail to other users. You can also use 'Full text search (function)' for the contents as well as file names on your mobile. 

17.
Thank you for your explanation. Thank all of you for your time.

18.
Our products are used by many customers including major companies such as SK, Samsung, LG, GS, and Lotte. We would like to thank all of you who are using this product. We have opened 'mcloudoc.com', a document centralized cloud service, based on our experience of supporting existing clients. This service is expected to play a major role in expanding the range of customers that can be used to a place of business site for more than five employees. In addition, we plan to reach global customers through mcloudoc.com in the global age.

19.
Thank you for your listening. For further questions, please refer to the contact information on the next screen. Thank you.

2016년 8월 10일 수요일

[ClouDoc] Demonstration of ClouDoc ransomware preemptive blocking


There is a proliferation of ransomware that encrypts files saved on Windows PCs and extorts money from users in return for a decryption key.

Looking at the many types of ransomware you can become infected with and the many ways you can become infected, let’s take a closer look at the differentiated response plan to ransomware provided by ClouDoc.

ClouDoc provides preemptive blocking of ransomware and post-exposure reponse options.

Ransomware infection routes – running ordinary programs, based on web browsers, running DLL extensions. ClouDoc protects user documents safely from all types of ransomware infection.

Follow up response to ransomware.
Even safer when used together with the ClouDoc Backup Appliance.