- We will connect you with service product inquiries and
consultation related to mcloudoc.
#1. Company
network structure - Stand Alone
Shall
we look at the first structure? This is a structure that is usually used by
customer companies with less than 100 users. There is only one server.
Employees access and use the server directly from their PCs.
#2.
Company network structure - Active-Passive
Next is
a structure that is mainly used by customer companies with 100~500 users.
ClouDoc servers are configured in pairs like 2, 4, and 6 servers. Each server
has a high availability (HA) solution installed.
Among
the servers with high availability solutions installed, the Active servers are used
for service. If there is a problem with this Active Server, the Passive Server
becomes an Active Server to support the service.
# 3.
Company network structure - Active-Active
Next
is Active-Active. It is mainly used by customers with over 300 users. At least
two servers and even up to tens of servers can be used. In this case, load
balancing can be done between servers through L4 switching or Load Balancing
Service (LBS). A High Availability (HA) solution is only required for database
redundancy. ClouDoc is designed to enable Active-Active services without a
separate solution. Because all participating servers are always running, server
utilization is much higher than Active-Passive.
The
ClouDoc server is usually only accessible from the Intranet to prevent attacks
by external malignant code. You can build an external document exchange server
in the DMZ to securely exchange files with the outside. Employees can exchange
files with the outside easily with Windows Explorer.
# 5. External DRM server structure
The external DRM server structure is the
same as the external document exchange server structure. The only difference is
that the file is encrypted when exported. Employees will encrypt the files in
Windows Explorer after acquiring an approval from a team leader to send the
files to the outside. Those who receive this document will provide
non-repudiation and information leakage protection through security functions
including One Time Password.
# 6. Access via VPN during business trip
or working at home
# 7. Access via Proxy server during
business trip or working at home
ClouDoc provides connection via Proxy server
for both PC and mobile devices. This feature is especially useful for accessing
ClouDoc servers on smartphones. Unlike the VPN server, it is very useful
because it can access the ClouDoc server from the outside only by setting it up
without the need to install a separate program.
#8. Access to external ClouDoc server via
Proxy server
ClouDoc's proxy server support was
developed for when ClouDoc is outside, not on the Intranet. This feature can be
very useful if all corporate Internet connections are only allowed through a
proxy server.
# 9. Application to network separation
environment
In a network separation environment,
ClouDoc performs well through the external document exchange server and data
exchange system between networks that exist in a DMZ. A data exchange system between
networks is a data movement method used to block the inflow of malicious code
between Internet and Intranet.
If you install an external DRM server
instead of an external document exchange server in the DMZ, ClouDoc can perform
well through the data exchange system between networks.
# 10. Collaborative use information
leakage prevention collaboration environment
Let’s look at a work environment where you
need to work with the partners, but you do not want the partner's products to
leak. Partner employees connect to the VPN server. Next, they go through the
proxy server and access the ClouDoc server in the Intranet through the data
exchange system between networks.
In this environment, all of the
deliverables will be stored on the ClouDoc server when the partner employees
work.
ClouDoc's security policy is flexible.
Depending on the IP band you connect to, you can apply different security
policies, even if they are the same user. If a partner employee turns off the PC
and reboots, he/she can deactivate the security policy if not connected to ClouDoc.
In this way, security policies can be strengthened while ensuring the
convenience of partner companies.
※ Resources
-
Download a ClouDoc document centralization solution brochure
-
Download a mcloudoc document centralization cloud service brochure
-
How ClouDoc responds to ransomware