2014년 4월 25일 금요일

Security Architecture for document centralization solution & information leak prevention.

English Blog :    http://mycloudoc.blogspot.kr/
Japanese Blog :  http://blogs.yahoo.co.jp/cloudoc_netid
email :  netid@net-id.co.kr   

ClouDoc, Protect CAD files, Protect documents from malicious codes
  



Recent information leak accidents are mainly caused by people rather than by malignant codes


Personal information leaks were largely reported in January 2014, and presidents of each relevant companies were resigned.


*  KB Kukmin Card : leaks of 53 million
*  Lotte Card : leaks of 26 million
*  NH Nonghyeop Card : leaks of 25 million


In the meantime, personal information leak accident of Shinhan Card was reported additionally in April.


Besides, many information leak accidents were reported. Among them the information leak accident only in the Agency for Defense Development was caused by a malignant code, while the rest by people. ClouDoc, equipped with information leak preventing measures by people as well as by malignant codes, is the Document Centralization Solution, 



ClouDoc - ClouDoc Security Architecture
<Figure> ClouDoc Security Architecture


Document Centralization Solution which uses PC disk locking



ClouDoc provides disk IO control(disk locking) functions for USB drive, CD/DVD drive, and network drive, as well as local disk for the designated applications. Especially, unlike other products, disk IO control is realized by using a characteristic value of application instead of application name or file name.

 ClouDoc - Comparison of disk IO control(disk locking) methods
<Table> Comparison of disk IO control(disk locking) methods



‘Information leak prevention by malignant code’ by separating Networks


ClouDoc’s NetworkLock module provides Network separation function without additional hardware nor network infrastructure change. For information leak prevention, users are controlled to the minimum in the intranet or internet modes.



ClouDoc - User environment control under ClouDoc NetworkLock environment

<Figure> User environment control under ClouDoc NetworkLock environment


Only approved documents can be provided to partners.


ClouDoc provides the safe approval system for document exchange with partners. Only the approved documents can be delivered to outside, and the documents from outside are automatically moved to the applicable user drive for use.


Offer embedded approval system to export document
Documents in the central location can be exported after approval. Approved documents can be attached to 'email, messenger, or bulletin boards'. And they can be stored in the security drive area in local disk for outside work.


ClouDoc - Two kinds of document exports
 <Table> Two kinds of document exports



Suggestion of the Knowledge management roadmap in the future safe security environment


ClouDoc is not just a solution to reinforce security environment only.
Customers adopting ClouDoc can gather documents in central server naturally as well as reinforce security system. Almost 100% task documents in staff’s PCs are gathered into the corporate owned storage.



ClouDoc strives to provide Knowledge management environment so that tremendous amount of documents accumulated in center can be used effectively for corporate work environment. And it will provide document management function suitable for the new internet era through continuous function update in the future.