12

Central Ecm Brochure 20110630

Embed Size (px)

DESCRIPTION

This product enables us to use personal and team storage in the central server as if they are local drives. You can edit documents and play video as you do in the C: drive and you may distribute install programs also. Also, you can use the storage in iPhone and Android phones also.

Citation preview

Page 1: Central Ecm Brochure 20110630
Page 2: Central Ecm Brochure 20110630

> 02

Contents

Com

panyHistory

Company NET-ID Company Limited

CEO Sang-Yeol Yoo

Business Software related businesses, Internet ASP

Address 9092 Life Living, Garden Five, 516 MunJeong-Dong,

Songpa-gu, Seoul

Contact TEL: 02-588-070 / FAX: 02-588-1012

Establishment 6 March 2002

Year in business March 2002 - present

Products PlusDisk, Central ECM

Capital: 155,000,000 won

The LG Dacom Web hard Exclusive Browser Development Project, Server Core Engine -

Efficiency Project ,Nate Filetank: a Club type web hard service implementation to nate.com

Korea.com MDisc: a joint project with Korea.com for a club type web-disc

SK Networks UBHard: Implementation of UBHard, the enterprise web hard service of SK Networks

Alliance Agreement for Japan/China: with MMS Japan to develop Japanese and Chinese markets

Central ECM Launch: Launched ECM and Central ECM

KT SafeDisk: a joint project with KT to develop an enterprise online storage service

KT MegaPC: to provide a storage solution to KT for its Cloud PC Online Service

2002

2003

2004

2008

2009

> 02 Company

History

Business

> 04 ECM

Cooperative Environment

Document Security

Work Environment

System Organization Charts

Key Improvements

> 07 PC Security

Block for Document Storage onto -

Individual PC

Block for External Device

> 08 Document Management

Convenience and Security of -

Windows Explorer

Document Management based on

-Organization

> 10 Security

> 11 Major Clients

Enterprise Content ManagementCentralization of Documents

>

Page 3: Central Ecm Brochure 20110630

·CentralECM

·Supply to companies the file servers to be used in ECM

·Linkability with data protection related solutions

·Central ECM, PlusDisk

·Joint development of KtSafedisk with KT

·Vast experience in big project developments including

LG Dacom Web hard, SK Networks UBHard, Nate Filetank,

Korea.com MDisc

·Strategic alliance for Japanese and Chinese

markets

·Strategic alliance under progress for USA

market

·PCBackup

·Joint PC Backup project with Hostway

·Utilization of backup and complete deletion of

authentic disc during PC repair or replacement

Ente

rpris

e Co

nt

ent M

anagement Overseas Business

PC Backup O

nline S

torag

e Se

rvice

Page 4: Central Ecm Brochure 20110630

Server virtual machine

PC virtual machine

Company RegulationVoluntary restraints

by employees

PC Security Storage into

local HDD banned

Network Booting

Terminal server

Connection to remote storage by in-house file system via Windows Explorer

Enterprise Content Mamagement(ECM)

: Shared folder

: Team Use

: Personal Use

: waste bin

Page 5: Central Ecm Brochure 20110630

·Works as the Organization Structure

·Linkage with the existing Organization Structure

·Creation of team file servers

·Appointment of Administrator by folder·Each Team Administrator to manage

folders and files

Quota Setting by folder

·Quota Setting by team and by folder

· Prevention of data monopolization

by a particular team

·CL setting to folders by person/team/position

·Automatic refection of transfer to other teams

or changes in position

Liinkage with Organization Structure

Access Control List Quota Setting by folder

Folder Structure as same as the Organization Structure

·Automatic display in Windows Explorer of the Folders

in the same format as the Organization Structure

·Automatic refection of changes in the Organization

Structure

Administrator by team

· The Lock function when a shared

document is to be used by multiple users at

the same time

Page 6: Central Ecm Brochure 20110630

> 02> 06

Work Environment Before ImplementationWhile documents are managed individually, only few documents are registered with the system and utilized by others. All unregistered documents are buried when the user leaves the company, and sometimes they are copied off by the user when he leaves.

Work Environment After ImplementationIntroduction of file server causes most documents stored in individual PCs to become the corporate asset. Documents stored centrally are protected with the security function, and change-over at the time of leave of an employee becomes easy.

Portal Knowledge Management Approval System EDMS

Attached Attached Attached

Retire

Attached

PC local disk

Data extinction or leak

10%

90%

Working Environment

Working Environment

Portal Knowledge Management Approval System EDMS

UNC(universal naming convention) e.g)file://X:\Shared folder\a.doc

: Local Disc

Attached

90%10%

Remote Disc(X:)

Page 7: Central Ecm Brochure 20110630
Page 8: Central Ecm Brochure 20110630

Document Storage into individual PC is blocked Permanent document deletion (irrecoverable) Encryption of disc in permitted space Control of execution programs

Prevention of data leak during PC repair, PC theft or A/S External device blocked Printer Blocked Attachment (email, Messenger) blocked

·Policy setting and delivery

·Log of file/printer usage

CONSOLE

Safety Measure at Disc Leak

When shown in C: drive When hidden in C: drive

Page 9: Central Ecm Brochure 20110630

Recycler Deleted documents are stored in the Recycler, and can be recovered.

Encrypted transmission section 128-bit SSL encrypted transmission during file upload/download

Security Log User authentication and read/write/delete/edit/move/copy/rename of files are recorded.

Encrypted File System A document uploaded is automatically encrypted and saved.

File Lock during usie Document protection during upload, download, edit.

Saving files in multi-languages the UTF-8 encoding enables saving of file names in any language .

Own protocol, own engine Connection to Virtual Drive

For simplified system management and scalability for future

functional need, one needs to have the 100% proprietary

technology that enables Windows Explorer UI provision.

This solution provides scalability to accommodate future

functional need by determination of its own protocol. The server

engine and the client engine also have been implemented by the

Company’s own technologies to ensure independence on

external resources.

This solution offers environment where Personal and Tem

Documents Drives are used in the Windows Explorer as if they are

used in a local disc. Personal Documents Drive, Team

Documents Drive and Shared Folders Drive can be named as

and mapped to Z: and Y: like in a PC.

Various security functions such as transmission section encryp-

tion, encrypted file system and security log are embedded in

these virtual drives.

: Shared folder

: Team share

: Personal use

: waste bin

Page 10: Central Ecm Brochure 20110630

> 02> 10

SecuritySecurity function is an essential part of a solution that is used to store corporate documents. The solution encrypts and stores user’s passwords in the SHA1 method, and locks the account when a series of login failure occurs.

By applying the authentication certificate to the Server, SSL transmission from PC to the server sections can be bug-free. The ARIA encryption for storage can protect document confidentiality even in case of accidental data leak.

Account Management Account Lock An account with a series of login failure with wrong password above the set number of tries is automatically disabled until it is released by the Administrator.

Password Complexity Various levels of password complexity are available for users to set their password.

Password Expiration Users are requested to change their password regularly at the set interval.

Authentication Security Logi Security are enhanced by 128-bit SSL encrypted transmission of user’s ID and password entered remotely.

IP Authentication The IP section authorized by Administrator, the IP address registered by the user and authorized by Administrator, and login from such section is only authorized.

PKI Authentication Authentication of the users who use API supplied by PKI Solution are enabled, and linkage with GPKI is also enabled.

Network Security IP Filtering Authorization by IP section for detailed functions such as document upload/download and View List can be set to procure security.

File Security Encrypted Transmission Section Bugging is prevented by 128-bit SSL encrypted transmission from PC to server.

Security Log Read/Write/Delete/Rename/Copy/Move of all documents within the server as well as user authentication data are recorded.

Encrypted File System The safe and quick encryption method is applied to all documents saved in the Server.

Personal Security Dual Administrators Enterprise Administrator for solutions can be dualized into ‘Data Protection Administrator’

and ‘Service Administrator’ to procure data asset security.

Permission Setting Log The Data Protection Administrator can be given the authority to view permission settings

for Service Administrator and Folder Manager to monitor potential data theft.

Other Security Security for client’s document drives is ensured using various preventive and diagnosis measures such as SQL Injection, Cross Site Script and file integrity checks.

Page 11: Central Ecm Brochure 20110630
Page 12: Central Ecm Brochure 20110630