레이블이 Protect CAD files인 게시물을 표시합니다. 모든 게시물 표시
레이블이 Protect CAD files인 게시물을 표시합니다. 모든 게시물 표시

2014년 10월 5일 일요일

How to find the best ‘document centralization solution’ for your company?

How to find the best ‘document centralization solution’ for your company?
 
 

Why Document centralization?
  
 
 Recently customers are looking at document centralization solution rather amicably.
Some customers are still in a nightmare of inconvenient and expensive initial document centralization solution, while some ClouDoc users add the number of users from the first, the second, the third, up to the fourth.
 
 In terms of a solution, document centralization solution tends to largely replace the following two solutions. 
 
  • Replacement of the existing document management (EDMS) : For effective document centralization and utilization, Document centralization is better than existing EDMS.
  • Replacement of the existing drawing security and document security (DRM) : From the point of compatibility and management of CAD drawing application, document centralization is good for efficiency improvement.

 
 
In terms of utilization, there are many customers for the following purposes.
  •  Drawing security
  • Source code security
  • Malicious code prevention
  • Information leakage prevention from Cloud service or P2P
 
 
 
How to select a proper Document centralization solution
 
Functional development of the document centralization solution is awesome. In case of ClouDoc, vendors sometimes visit customers in person and bring good ideas to market in the shortest time.
Currently, document centralization solutions can be largely divided into three schedules.
  •  Schedule 1, Security only : Only a storage prohibition function is loaded. Central document drive uses the network storage like NAS.  
  • Schedule 2, Hooking & Exclusive explorer : Hooking the standard work environment allows the solution to provide separate environment.
  •  Schedule 3, Standard (window file system)type : Offer of a window file system drive allows all work available in standardized methods.
 As Schedule 1 provides a security function only, strictly speaking with no document management function, it will be excluded from this description.
 
What problems in Hooking, Schedule 2?
  •  Applications without Hooking not yet cannot be stored in the center. 
  • Applications with Hooking impossible (graphic tools like 3D CAD applications and Indesign) cannot be stored in the center.
    •  Despite the promotion to support CAD, actually they are stored in C: drive and backed up in the center! Latest version always exists in PC only.
    • - Hooking is impossible for applications, where input/output in file is not done like Outlook but input/output of some blocks are done frequently.
  •  When interlocking with period system and file attachment like groupware, ERP, and so on in the future is necessary, separate development cost is required: high cost structure.
 
 
Finally, how about Schedule 3? Window file system, the standard type of Schedule 3, is the best type in compatibility for customers. However, Schedule 3 also requires harsh verification before product selection.
 
  • Aren’t a lot of troubles happening in the existing customers?
    • Blue screen: No response/ Document disappears/ Input/output errors often occur in some applications/ …
  • How many persons can be accommodated in a server?
  • Is there any temporary file left in the local disk of PC?
  • Doesn’t it cause a lot of load on the network of the company?
  •  In case of the customer with many users, does it support an extendable architecture using L4 device or the like?
  •  Does it directly support input/output of CAD drawings to and from the center?
    •  In case of some products, CAD application can be stored only in the local disk at all times.
  •  What are the names of customers with over 1,000 users using Window explorer file system among existing references?
 <Picture> How to select a proper Document centralization solution
 
Interlocking with the other system

 
Let’s see again the interlocking with the other system mentioned in the above for a while.
In case of ClouDoc, document can be attached to the other system without separate development. To the contrary, attached document of the other system can be stored in the ClouDoc.
However, in case of document centralization system of a hooking type, separate development is necessary to attach a document to the other system. Will it be no wonder to spend additional cost for the development?
<Picture> Interlocking with the other system
 
 
 


 
  

2014년 9월 2일 화요일

ClouDoc frees your network from copy & move of large amount of data!

ClouDoc frees your network from copy & move of large amount of data!


  

Document Copy and Move at Microsoft Windows FileServer


In general users of Windows FileServer utilizes one of the following methods for connection to Window Explorer. 
  
 The above methods are commonly used for Windows FileServer. In this case, if a file or folder is copied or moved, all applicable files come down to PC and up again to the server, requiring network much.

 

Document Copy and Move at ClouDoc
 

To limit such use of network, ClouDoc offers Copy or Move methods in the server. User or administrator may need to copy or move files in at least some MBs or as many as some TBs, In this case this function will not allow the company network to be loaded at all.
 

  
<Picture> Network traffic state during document copy and move in the server

 

 

What kind of method do you want?

  
  
Except for the above functions, ClouDoc includes the following diverse functions, which is not provided by the existing file server.
 
  
  • Folders in the private document box or team document box in the server are shared by other persons or teams 
  • Files in the private document box or team document box in the server are shared by link mail or link itself, and the usage is limited by code, period, or time.
  • Search function on documents in the server is provided in connection with a special search engine.
  •  Automatic version management function is provided for documents stored in the server.
 
Besides, ClouDoc will provide intelligent document management function additionally instead of providing a simple file server.











 

2014년 9월 1일 월요일

Only ClouDoc can centralize CAD drawings!


Only ClouDoc can centralize CAD drawings!

 

1. Change of drawing security market


In the meantime, CAD drawing security market has mainly consisted of encryption solution. However, meaningful change is recently sensed with manufacturing customers as the center. You may understand from the following table why drawing security is pursued through document centralization.
 
  

 
<Table> Comparison of drawing encryption method and drawing centralization method
 
 
 

2.What solution can really centralize drawings?
 
  

Document centralization solution providers are struggling for document centralization. However, document centralization requires strong fundamental technology. Almost all solutions with no fundamental technology are promoted to store drawings at the center, while actually storing at PC.

 
ClouDoc as a centralization solution is uniquely equipped with the technology enabling drawings to be stored at the center, not at PC. If you look at the following picture, you can see that solutions other than ClouDoc allow PC to store drawings actually, and the server to hold backup files only.
 
 

<Picture> Only ClouDoc can centralize CAD drawings.

  
 
3. Prospect of drawing centralization in the future
 


The most important environment elements prerequisite for document centralization are network and storage. If these two elements offer fast and sufficient performances and capacities, file input/output speed in document centralized environment would be second only to input/output speed from PC to local disk.

The following changes are sensed in storage environment.
  •  Advent of high performance storage based on the flash disk
  •  Advent of high performance storage based on RAM.

 

The following changes are sensed in network environment.
 
 
   
Accordingly it is expected that document centralization environment at each company will be further accelerated!
 
 
 

2014년 8월 26일 화요일

ClouDoc protects documents of your company using its own security architecture.

ClouDoc protects documents of your company using its own security architecture.

 

Personal information leaks were largely reported in January 2014, and presidents of each relevant companies were resigned.

*  KB Kukmin Card : leaks of 53 million
*  Lotte Card : leaks of 26 million
*  NH Nonghyeop Card : leaks of 25 million
 
In the meantime, personal information leak accident of Shinhan Card was reported additionally in April.
 
Besides, many information leak accidents were reported. Among them the information leak accident only in the Agency for Defense Development was caused by a malignant code, while the rest by people. ClouDoc, equipped with information leak preventing measures by people as well as by malignant codes, is the Document Centralization Solution, 
 


<Figure> ClouDoc Security Architecture
 
 
Document Centralization Solution which uses PC disk locking
 
ClouDoc provides disk IO control(disk locking) functions for USB drive, CD/DVD drive, and network drive, as well as local disk for the designated applications. Especially, unlike other products, disk IO control is realized by using a characteristic value of application instead of application name or file name.
ClouDoc - Comparison of disk IO control(disk locking) methods
 
<Table> Comparison of disk IO control(disk locking) methods
 
‘Information leak prevention by malignant code’ by separating Networks
 
ClouDoc’s NetworkLock module provides Network separation function without additional hardware nor network infrastructure change. For information leak prevention, users are controlled to the minimum in the intranet or internet modes.
 
ClouDoc - User environment control under ClouDoc NetworkLock environment
 
<Figure> User environment control under ClouDoc NetworkLock environment
 
 
Only approved documents can be provided to partners.
 
ClouDoc provides the safe approval system for document exchange with partners. Only the approved documents can be delivered to outside, and the documents from outside are automatically moved to the applicable user drive for use.
 
Offer embedded approval system to export document
Documents in the central location can be exported after approval. Approved documents can be attached to 'email, messenger, or bulletin boards'. And they can be stored in the security drive area in local disk for outside work.
 
 ClouDoc - Two kinds of document exports
 <Table> Two kinds of document exports
 
Suggestion of the Knowledge management roadmap in the future safe security environment
 
ClouDoc is not just a solution to reinforce security environment only.
Customers adopting ClouDoc can gather documents in central server naturally as well as reinforce security system. Almost 100% task documents in staff’s PCs are gathered into the corporate owned storage.
 
ClouDoc strives to provide Knowledge management environment so that tremendous amount of documents accumulated in center can be used effectively for corporate work environment. And it will provide document management function suitable for the new internet era through continuous function update in the future. 

 









2014년 3월 30일 일요일

Let's try a new point of view - Network Separation based on Document Centralization Solution!

English Blog :    http://mycloudoc.blogspot.kr/
Japanese Blog :  http://blogs.yahoo.co.jp/cloudoc_netid
email :  netid@net-id.co.kr   

이미지 4
  




Many people are disconcerted at recent, diverse information leaks from insurance companies, public offices, and education sources. Besides, it is much surprising that personal information on many Koreans can be read in Chinese websites. We are worried about this series of facts, if it may suggest overall reexamination on personal information system having been managed by the resident register number

By the way, why do information leakage incidents continue to happen even in the organization adopting Network Separation solution? How far is the effective range of information leak control by Network Separation? Let’s look into the Network Separation based on Document Centralization Solution if it can be a new alternative of the existing Network Separation.

Existing Network Separation Solution?

In the meantime, Korean government has positively recommended Network Separation to public offices, financial institutions, and personal information treatment companies to prevent leaks of national secrets and important data. At first, only physical Network Separation was permitted, and later a server based computing (SBC) was additionally permitted, and now a virtual environment-providing type in PC-so called a CBC type- has been permitted.

However, it seems that many public agencies and companies are reluctant to adopt Network Separation. The reasons can be summarized as issues of cost and stability. Then, what is the creative, innovative Network Separation method which reduces cost and secures stability?

Suggestion of a new Network Separation Solution

Network Separation function included in ClouDoc premises document centralization environment. Task document does not exist in document centralized environment. One PC stays in an intranet mode or internet mode in a certain moment. As this type does not need to use a non-standard type under the window operating system to maintain intranet and internet environment, it provide stable work environment for a user.


<Picture_1> Configuration of ClouDoc Network Separation System

You don’t have to change Network configuration, to prevent information leakage.

The current Network Separation type adopted by most organizations require physical change of network configuration. The reason would be to prevent information leakage from PCs with no basic installation to internet. On the other hand, ClouDoc NetworkLock function allows construct safe Network Separation environment only by minimum HW or SW additions, leaving the physical network configuration as it is.

<Picture_2> Induction of ClouDoc NetworkLock installation 

Safe data exchange even without additional data exchange solution between networks

Network Separation environment being currently adopted includes data exchange system between networks as well. Intranet and internet are physically separated, and data exchange system between networks using an expensive device is provided. ClouDoc resolves this matter in Software. With an export disk based on the internal approval procedure, safe data exchange environment between intranet and internet is provided.

<Picture_3> Data exchange between networks by ClouDoc NetworkLock

Complete interruption of information leakage by hacking

The most critical purpose of NetworkLock is to interrupt internal information leakage by a malignant code. As ClouDoc permits access to internal data only in the intranet mode and at the same time completely interrupts internet connection, perfect information leak prevention environment is provided. Besides, in the internet mode the access to the internal system by an external malignant code is completely controlled.

<Picture_4> Information leak interruption in an intranet using ClouDoc NetworkLock

<Picture_5> Access interruption to intranet from the internet using ClouDoc NetworkLock


Information leak prevention by human

The most important feature of Network Separation environment provided by ClouDoc is to prevent information leakage by a malignant code as well as by human. It is a well-known fact that recent various information leak incidents were caused not by malignant codes but by inside staff or vender staff. Besides, ClouDoc is designed to interrupt random deletion of a document by an external malignant code.

<Picture_6> Effects of ClouDoc NetworkLock installation

Document centralization solution based Network Separation will help construct security environment for a company or public office!

Cloudoc NetworkLock function is based on document centralization solution. Even if connected with the internet, as an important document does not exist in the hard disk of PC under this environment, information leakage is prevented.

l  As user work environment is almost same as the existing one, operational confusion can be minimized.
l  As there is not any physical change in the existing network from the viewpoint of a manager, the system can be introduced without big difficulties.
l  The advantage from the viewpoint of CEO is that it is not necessary to purchase licenses of various software in double.

Until recently, many organizations are required to adopt Network Separation but total Network Separation is not a simple issue if we perform it in the existing way. Besides, despite the above-mentioned complicated much work, it is difficult to obtain additional effect except but prevention of information leakage by a malignant code. However, as ClouDoc has a Network Separation function based on document centralization solution, it helps achieve a productive objective (Management based on knowledge) additionally as well as a security objective. It may be recommendable for an organization to consider the adoption of NetworkLock based on document centralization solution, so as to achieve both security and work innovation.