Dec 10, 2014
> 02
Contents
Com
panyHistory
Company NET-ID Company Limited
CEO Sang-Yeol Yoo
Business Software related businesses, Internet ASP
Address 9092 Life Living, Garden Five, 516 MunJeong-Dong,
Songpa-gu, Seoul
Contact TEL: 02-588-070 / FAX: 02-588-1012
Establishment 6 March 2002
Year in business March 2002 - present
Products PlusDisk, Central ECM
Capital: 155,000,000 won
The LG Dacom Web hard Exclusive Browser Development Project, Server Core Engine -
Efficiency Project ,Nate Filetank: a Club type web hard service implementation to nate.com
Korea.com MDisc: a joint project with Korea.com for a club type web-disc
SK Networks UBHard: Implementation of UBHard, the enterprise web hard service of SK Networks
Alliance Agreement for Japan/China: with MMS Japan to develop Japanese and Chinese markets
Central ECM Launch: Launched ECM and Central ECM
KT SafeDisk: a joint project with KT to develop an enterprise online storage service
KT MegaPC: to provide a storage solution to KT for its Cloud PC Online Service
2002
2003
2004
2008
2009
> 02 Company
History
Business
> 04 ECM
Cooperative Environment
Document Security
Work Environment
System Organization Charts
Key Improvements
> 07 PC Security
Block for Document Storage onto -
Individual PC
Block for External Device
> 08 Document Management
Convenience and Security of -
Windows Explorer
Document Management based on
-Organization
> 10 Security
> 11 Major Clients
Enterprise Content ManagementCentralization of Documents
>
·CentralECM
·Supply to companies the file servers to be used in ECM
·Linkability with data protection related solutions
·Central ECM, PlusDisk
·Joint development of KtSafedisk with KT
·Vast experience in big project developments including
LG Dacom Web hard, SK Networks UBHard, Nate Filetank,
Korea.com MDisc
·Strategic alliance for Japanese and Chinese
markets
·Strategic alliance under progress for USA
market
·PCBackup
·Joint PC Backup project with Hostway
·Utilization of backup and complete deletion of
authentic disc during PC repair or replacement
Ente
rpris
e Co
nt
ent M
anagement Overseas Business
PC Backup O
nline S
torag
e Se
rvice
Server virtual machine
PC virtual machine
Company RegulationVoluntary restraints
by employees
PC Security Storage into
local HDD banned
Network Booting
Terminal server
Connection to remote storage by in-house file system via Windows Explorer
Enterprise Content Mamagement(ECM)
: Shared folder
: Team Use
: Personal Use
: waste bin
·Works as the Organization Structure
·Linkage with the existing Organization Structure
·Creation of team file servers
·Appointment of Administrator by folder·Each Team Administrator to manage
folders and files
Quota Setting by folder
·Quota Setting by team and by folder
· Prevention of data monopolization
by a particular team
·CL setting to folders by person/team/position
·Automatic refection of transfer to other teams
or changes in position
Liinkage with Organization Structure
Access Control List Quota Setting by folder
Folder Structure as same as the Organization Structure
·Automatic display in Windows Explorer of the Folders
in the same format as the Organization Structure
·Automatic refection of changes in the Organization
Structure
Administrator by team
· The Lock function when a shared
document is to be used by multiple users at
the same time
> 02> 06
Work Environment Before ImplementationWhile documents are managed individually, only few documents are registered with the system and utilized by others. All unregistered documents are buried when the user leaves the company, and sometimes they are copied off by the user when he leaves.
Work Environment After ImplementationIntroduction of file server causes most documents stored in individual PCs to become the corporate asset. Documents stored centrally are protected with the security function, and change-over at the time of leave of an employee becomes easy.
Portal Knowledge Management Approval System EDMS
Attached Attached Attached
Retire
Attached
PC local disk
Data extinction or leak
10%
90%
Working Environment
Working Environment
Portal Knowledge Management Approval System EDMS
UNC(universal naming convention) e.g)file://X:\Shared folder\a.doc
: Local Disc
Attached
90%10%
Remote Disc(X:)
Document Storage into individual PC is blocked Permanent document deletion (irrecoverable) Encryption of disc in permitted space Control of execution programs
Prevention of data leak during PC repair, PC theft or A/S External device blocked Printer Blocked Attachment (email, Messenger) blocked
·Policy setting and delivery
·Log of file/printer usage
CONSOLE
Safety Measure at Disc Leak
When shown in C: drive When hidden in C: drive
Recycler Deleted documents are stored in the Recycler, and can be recovered.
Encrypted transmission section 128-bit SSL encrypted transmission during file upload/download
Security Log User authentication and read/write/delete/edit/move/copy/rename of files are recorded.
Encrypted File System A document uploaded is automatically encrypted and saved.
File Lock during usie Document protection during upload, download, edit.
Saving files in multi-languages the UTF-8 encoding enables saving of file names in any language .
Own protocol, own engine Connection to Virtual Drive
For simplified system management and scalability for future
functional need, one needs to have the 100% proprietary
technology that enables Windows Explorer UI provision.
This solution provides scalability to accommodate future
functional need by determination of its own protocol. The server
engine and the client engine also have been implemented by the
Company’s own technologies to ensure independence on
external resources.
This solution offers environment where Personal and Tem
Documents Drives are used in the Windows Explorer as if they are
used in a local disc. Personal Documents Drive, Team
Documents Drive and Shared Folders Drive can be named as
and mapped to Z: and Y: like in a PC.
Various security functions such as transmission section encryp-
tion, encrypted file system and security log are embedded in
these virtual drives.
: Shared folder
: Team share
: Personal use
: waste bin
> 02> 10
SecuritySecurity function is an essential part of a solution that is used to store corporate documents. The solution encrypts and stores user’s passwords in the SHA1 method, and locks the account when a series of login failure occurs.
By applying the authentication certificate to the Server, SSL transmission from PC to the server sections can be bug-free. The ARIA encryption for storage can protect document confidentiality even in case of accidental data leak.
Account Management Account Lock An account with a series of login failure with wrong password above the set number of tries is automatically disabled until it is released by the Administrator.
Password Complexity Various levels of password complexity are available for users to set their password.
Password Expiration Users are requested to change their password regularly at the set interval.
Authentication Security Logi Security are enhanced by 128-bit SSL encrypted transmission of user’s ID and password entered remotely.
IP Authentication The IP section authorized by Administrator, the IP address registered by the user and authorized by Administrator, and login from such section is only authorized.
PKI Authentication Authentication of the users who use API supplied by PKI Solution are enabled, and linkage with GPKI is also enabled.
Network Security IP Filtering Authorization by IP section for detailed functions such as document upload/download and View List can be set to procure security.
File Security Encrypted Transmission Section Bugging is prevented by 128-bit SSL encrypted transmission from PC to server.
Security Log Read/Write/Delete/Rename/Copy/Move of all documents within the server as well as user authentication data are recorded.
Encrypted File System The safe and quick encryption method is applied to all documents saved in the Server.
Personal Security Dual Administrators Enterprise Administrator for solutions can be dualized into ‘Data Protection Administrator’
and ‘Service Administrator’ to procure data asset security.
Permission Setting Log The Data Protection Administrator can be given the authority to view permission settings
for Service Administrator and Folder Manager to monitor potential data theft.
Other Security Security for client’s document drives is ensured using various preventive and diagnosis measures such as SQL Injection, Cross Site Script and file integrity checks.