New Trend of Computing Cycle
IBM IBM/HP MS Google Who?
Main Frame Computing
Mini Computing
Personal Computing
Desktop Internet Computing
Mobile Internet Computing
More than Smartphone, Tab, Car Audio, Electronics, PMP, MP3P, PG, ABS, A/V, etc.
Computing Growth Drivers Over Time 1960 ~ 2010E
1,000,000 Device / Users MM in Log Scale 100,000 10,000 1,000 100 10 1 Mainframe
Mobile Internet Desktop Internet 1B+ Units / Users PC Minicomputer 10 MM+ Units
Note: PC installed base reached 100MM in 1993, cellphone / Internet users reached 1B in 2002 / 2005 respectively; Source: ITU, Mark Lipacis, Morgan Stanley Research.
Data is moved to Smartphone Increasingly, Mobile Phone Usage is About Data, Not Voice in smartphone era. Average Cell Phone = 70% Voice vs. Smartphone = 45% Voice
Daily Usage Breakdown, % of Time Spent on Each Activity
Internet Others Music 3% 3% 2% Game 3% Email 4% SMS 15% Voice Call 70% Other 3% Game 8%
Vs.
Internet 9% Music 10% Email 12% SMS 14% Smartphone User 60 Minutes Per Day Voice Call 44%
What is the Best Solution for Smart Work Environment? Easy, Flexible, Effective, Comprehensive, and Centralized solution is required for document management with enhanced Security and Reliability
Combining Security on Whole Document Lifecycle
Costs • Increase Efficiency • Increase Profit with better Performance • More CostEffective Content Lifecycle Management
Customers • Improve Customer Service Level • Increase the Corporation Competition
Risks
• Compliance
• Management of Document History & Retention • Mitigate Risk and Management • Business Continuity
Why Is The Bank Security Needed?
DATA GROWTH
The growth of digital information has rapidly surpassed expectations.by 2011 digital universe will be 10 times size of 2006
INCREASED DATA MOBILITY
The importance of data has increased its access and mobility requirements making it more difficult to secure and protect
INCREASED DATA BREACHES
As data and its mobility grow, the amount of data breaches and data exposure has also grown
U.S. 2010 > 662 Breaches2
412 (62%) Exposed Social Security Numbers 170 (26%) Exposed Credit or Debit Cards
REGULATIONS INCREASING
Increased data exposure has resulted in increased regulations and reporting requirements globally
COST OF DATA BREACHES GROWS
Increased reporting requirements and increased data breaches results in increased breach costs
U.S. 2010 $214 per record3
$7.2 Million3
Average org. cost of data breach over 4 years
1Source:
IDC – The Diverse and Exploding Universe – March 2008 Identity Theft Resource Center – 2010 Data Breach Stats January 3, 2011 3Source: Ponemon Institute – Fourth Annual U.S. Cost of Data Breach Study January 2009
2Source:
Why Does Bank Need To Improve Information Security?
Today’s banks face a wide range of risk issues, almost all of which have an impact on that organization’s data
50% IT security Hardware and system malfunction Power failure Physical security Theft Product quality issues Federal compliance issues Natural disaster E-discovery requests Supply chain breakdown Terrorism activity Bank Phishing Identity Theft 17% 13% 11% 6% Privacy
Source: 2010 IBM Global IT Risk Study
What Are Required to Enhance on IT Security?
PCI & DSS Compliance: 6 Control Objectives, 12 Requirements Spanning
1.
Build and Maintain a Secure Network
Install and maintain a firewall configuration to protect cardholder data Do not use vendor-supplied defaults for system passwords and other security parameters
2.
Protect Cardholder Data
Protect stored cardholder data Encrypt transmission of cardholder data across open, public networks
3.
Maintain a Vulnerability Management Program
Use and regularly update anti-virus software Develop and maintain secure systems and applications
4.
Implement Strong Access Control Measures
Restrict access to cardholder data by business need-to-know Assign a unique ID to each person with computer access Restrict physical access to cardholder data
5.
Regularly Monitor and Test Networks
Track and monitor all access to network resources and cardholder data Regularly test security systems and processes
6.
Maintain an Information Security Policy
Maintain a policy that addresses information security
Introduction to MarkAny SDMSTM
Flexible User Interface
WinXP WinVista Win 7 x64 OS
Collaboration Communication Work Efficiency Biz. Agility Biz. Continuity
Enterprise Portal as a Single Window
User Community Retention & Workflow & Retrieval Job Report / eManagement Approval Imaging & Capture Process Knowledge Management &
Groupware & Collaboration
E-Form Management
Additional Component Packages Components Interface
Document Lifecycle Management Document Version Control Enhanced Search Information Rights Management Categorization & Classification
Total System Architecture of MarkAny SDMSTM
EXTERNAL ORGANIZATION THIRD-PARTY GROUP User PC Group
Secure Documents INTERNAL NETWORK
Legacy Server System
User PC Group
WAN External Web External G/W Firewall Secure Documents
INTERNAL ORGANIZATIONS RMS System DMS System Database Legacy Server System LDAP Secure Documents Centralized Data Access
User PC Group Business Application System
DATA CENTER
Data Warehuse File Storage DB Storage
User PC Group
Centralized The SDMS system will be located in internal organization but it can be flexibly interacted with external organization of government office and other third-party groups.
MarkAny SDMS provides the customer with flexible version control of internal documents by utilizing check-in / out process with government group-wide security
Simple Searching
Indexing Accessor
Search Engine DB Document Folder
Searching
Locale Query Parser
Get Method
Users
Modifier Locale
Index DB
Document Storage
Result Ranking Summarizer
Direct Document Search Document Search Engine
Folder Document Full Text Searching
Enhanced Document Searching
MarkAny SDMS Includes the index search and tag clouds based on Web 2.0, it provides the end-users not only with simple index search but also enhanced document searching in repositories.
MarkAny SDMS provides various ways of business process management and work collaboration based on pre-defined rule of work flow such as job report, electronic approval process and schedule sharing.
MarkAny SDMS provides end-users with flexible schedule management in personal or calender sharing mechanism integrated with Internal Messenger, SMS, and synchronizing with MS Outlook program.
Rights Management – Basic Service Flow
Administrator
Save Control
Monitoring and Tracking
Edit Control
Screen Capture Control
User Platform Control
Internal Users
Document Download Centralized Management
Print Control
Internal User Outflow Limited Access based on Access Control List
Prevent illegal Access
Expiry Date Control Blocking Illegal Uses (CD, Thumb-drive, Email, Business Application System, etc)
Internal Owner
The organization can assure to embrace the security environment in the whole organization by means of document encryption, access control and audit trails. It enables the government to enforce internal control of security policy.
Rights Management – Encryption & Document Control
When unauthorized user OPENs file When authorized user with READ-ONLY without printing
Unauthorized User
Authorized User with Different Access Control
If the user can not have rights to be able to edit and save, the user applications disables functions of ‘save’, ‘edit’, and ‘print’. In addition, the unauthorized person cannot be accessed to an encrypted document and read it.
Integration
End User-Clients PC
• Windows 2000/2003/XP/Vista(32) • MS Office 2003/2007, MS Outlook 2003/2007, Acrobat Reader, etc • Internet Explorer 6.0/7.0/8.0 • RMS Client Application
Administrator PC
• Windows 2000/2003/XP/Vista(32) • MS Office 2003/2007, MS Outlook 2003/2007, Acrobat Reader, etc • Internet Explorer 6.0/7.0/8.0 • RMS Client Application 300 dpi Scanner 300 X 300 dpi Laser Printer
Internal Network(10/100Mb)
L4 SWITCH
LDAP (User Profile System)
Internal Network(10/100Mb)
ECM System
RMS System
DB System
RMS Integrator Daemon
EDMS – HA Structure Available
Hardware: HP DL360 G5 3.0G Hz 2CPU / 4GB RAM / 73GB HDD Unix / Unixware OS Software: Web Application Server J2EE / WAS / Tomcat / DMS Server / RMS Daemon
RMS – HA Structure Available
Hardware: HP DL360 G5 3.0G Hz 2CPU / 4GB RAM / 73GB HDD Windows 2008 Server Enterprise Edition Software: MS Internet Information Server DotNet Platform 2.0 RMS Server MarkAny Confidential |
EDMS & RMS Database System (HA Structure Available)
Hardware: IBM x3650 Series 3.5G Hz 2CPU / 8GB RAM / 146 GB HDD Windows 2008 Server Enterprise Edition Software: Oracle, IBM DB2, or MSSQL Database
Options - E-From Management System
E-Form Template Generation
Run e-From Designer Mark e-Form Template Use e-From Components E-Form Registration
XML Data
Dynamic Template
Admin e-From Components
E-Form Issuing Service Flow
Check Box 4 Distribution Channels 2 Legacy DB Administrator Register e-Form by e1 Form Designer Web Distribution 2 Program Data E-Document Storage Radio Button Button Combo Box Text Input Field Table Digital Signature
2
XML Data
Email Distribution
Fax Distribution
Output Gateway
3 Data Mapping with e-Form Template 2 Online Printing Smartphone Distribution
Compromise Biz. Solution
• Assess business challenges and vulnerability • Adapt business solution to improve productivity, work efficiency, accuracy, agility and work collaboration • Educate user experience and measure business performance periodically • Maintain user control and transaction in secure
Increase Biz. Performance
• Activate user attendance for higher business performance • Decrease cost to maintain systems • Remove unnecessary business flow & work process • Create value-added activities on user communities • Enforce user control and security
Reduce Security Risk
• Monitor communication channels and security holes • Reporting of matches against policies and information leakage • Adjust Internal Security Policies • Enable enforcement policy • Quarantine suspicious messages • Create audit trail of all communications to substantiate compliance • Reduce violations to required levels
Korean Army Korea Immigration Service The Supreme Court of Korea Presidential Security Service Gangnam-gu Office
Korean Policy Agency
Ministry of Government Administration and Home Affairs
Presidential Office
Ministry of Foreign Affairs National Tax Agency Employment Insurance Mongolia Diplomat NFRDI (National Fisheries Research & Development Institute) Korean Railway Service
Korean Institute for Advancement of Technology
Oman Gov. Secretary of State PT. Telkom
MarkAny Confidential |
Why MarkAny? – Bank BTN
Rights Management System (RMS)
Purpose: Protect online documents managed in existing system (Banking Information Management System, ERP, MIS, Accounting System, etc.) and provide data protection and strong access control to digital assets Project Implementation Information
No Banks Type Document SAFER Components PC-DRM(Included 11 Branches) Added OLAP,DM Message System Second Year Maintenance Server DRM(#4) & PC-DRM Second Year Maintenace Server DRM(#6) & PC-DRM Second Year Maintenace Server DRM(#6) & Integration with 6 Branches Second Year Maintenance
Daegu District Bank
1
Initial Project Woori Bank & Woori Fi nance Group Additional Development (2010~ 2011) Maintenance Daegu District Bak (2010~ 2011) Korean EXIM Bank (2010~ 2011) KDB Finance Group (2010~ 2011) Initial Project Maintenance Initial Project Maintenance Initial Project Maintenance
Why MarkAny? – Bank BTN
Rights Management System (RMS)
Purpose: Satisfying IT Compliance & Regulation like PCI & DSS with use of IBM FileNet ECM and provide data protection and strong access control to digital assets Implementation Period: Jun.. 2011 ~ Sep. 2011 (2 Weeks)
Why MarkAny? – Bank BTN
Rights Management System (RMS)
Purpose: Protect online documents managed in IBM FileNet ECM and provide data protection and strong access control to digital assets Implementation Period: April. 2011 ~ April. 2011 (2 Weeks)
Database
HR Integration
File Storage
Document File Access
User Profile System (ADS/LDAP)
User & Group Profile Synchronization
IBM FileNet
System Administration
ECM Custom Layer
Triggering Logon Process & Document Encryption / Decryption