of x

Document

Published on July 2016 | Categories: Topics, Books - Fiction | Downloads: 7 | Comments: 0
115 views

Doc

Comments

Content

1. Initiatives 2. Solution Overview 3. Proposed Solution 4. Conclusion
Secured Document Management SystemTM

New Trend of Computing Cycle
IBM IBM/HP MS Google Who?

Main Frame Computing

Mini Computing

Personal Computing

Desktop Internet Computing

Mobile Internet Computing
More than Smartphone, Tab, Car Audio, Electronics, PMP, MP3P, PG, ABS, A/V, etc.

Computing Growth Drivers Over Time 1960 ~ 2010E
1,000,000 Device / Users MM in Log Scale 100,000 10,000 1,000 100 10 1 Mainframe

Mobile Internet Desktop Internet 1B+ Units / Users PC Minicomputer 10 MM+ Units
Note: PC installed base reached 100MM in 1993, cellphone / Internet users reached 1B in 2002 / 2005 respectively; Source: ITU, Mark Lipacis, Morgan Stanley Research.

100 MM+ Units

1 MM+ Units 1960 1970 1980 MarkAny

Confidential

|

1990 MarkAny Inc. © 2010

2000

2010

3

2020

However, we are now working in this office …

MarkAny Confidential

|

© 2010 MarkAny Inc.

4

Data is moved to Smartphone Increasingly, Mobile Phone Usage is About Data, Not Voice in smartphone era. Average Cell Phone = 70% Voice vs. Smartphone = 45% Voice
Daily Usage Breakdown, % of Time Spent on Each Activity
Internet Others Music 3% 3% 2% Game 3% Email 4% SMS 15% Voice Call 70% Other 3% Game 8%

Vs.

Internet 9% Music 10% Email 12% SMS 14% Smartphone User 60 Minutes Per Day Voice Call 44%

Average Cell Phone User 40 Minutes Per Day

Note: CTIA estimates average voice call time per day is 27 minutes, assuming 70% of total time spent is on voice call, per iSuppli, total average time spent on cell phone is approx. 40 minutes per day. Smartphone time spent per day is our estimates. Source: iSuppli ConsumerTrak survey, 10/08, Morgan Stanley Research.
MarkAny Confidential | © 2010 MarkAny Inc.

5

The world is also moving to ‘Digital & Smart World’

Mobile Office

Digital School

Smart Home

MarkAny Confidential

|

© 2010 MarkAny Inc.

6

But, the reality is …

1

2

3
MarkAny Confidential |

4
© 2010 MarkAny Inc.

7

What is the Best Solution for Smart Work Environment? Easy, Flexible, Effective, Comprehensive, and Centralized solution is required for document management with enhanced Security and Reliability

Combining Security on Whole Document Lifecycle

Costs • Increase Efficiency • Increase Profit with better Performance • More CostEffective Content Lifecycle Management

Customers • Improve Customer Service Level • Increase the Corporation Competition

Risks

• Compliance
• Management of Document History & Retention • Mitigate Risk and Management • Business Continuity

• Provide Faster Responses to Customer Request

The SDMS is prevalently used in bank and financial sectors, government sectors and private sectors in order to manage internal digital assets in organization. The best solution of DMS mostly provides easy, flexible, and intuitive scheme for document management and risk management. MarkAny Confidential | © 2010 MarkAny Inc. 8

Why Is The Bank Security Needed?
DATA GROWTH
The growth of digital information has rapidly surpassed expectations.by 2011 digital universe will be 10 times size of 2006

INCREASED DATA MOBILITY
The importance of data has increased its access and mobility requirements making it more difficult to secure and protect

INCREASED DATA BREACHES
As data and its mobility grow, the amount of data breaches and data exposure has also grown

U.S. 2010 > 662 Breaches2
412 (62%) Exposed Social Security Numbers 170 (26%) Exposed Credit or Debit Cards

REGULATIONS INCREASING
Increased data exposure has resulted in increased regulations and reporting requirements globally

COST OF DATA BREACHES GROWS
Increased reporting requirements and increased data breaches results in increased breach costs

U.S. 2010 $214 per record3

$7.2 Million3
Average org. cost of data breach over 4 years
1Source:

IDC – The Diverse and Exploding Universe – March 2008 Identity Theft Resource Center – 2010 Data Breach Stats January 3, 2011 3Source: Ponemon Institute – Fourth Annual U.S. Cost of Data Breach Study January 2009
2Source:

MarkAny Confidential

|

© 2010 MarkAny Inc.

9

Why Does Bank Need To Improve Information Security?
Today’s banks face a wide range of risk issues, almost all of which have an impact on that organization’s data
50% IT security Hardware and system malfunction Power failure Physical security Theft Product quality issues Federal compliance issues Natural disaster E-discovery requests Supply chain breakdown Terrorism activity Bank Phishing Identity Theft 17% 13% 11% 6% Privacy
Source: 2010 IBM Global IT Risk Study

100%

78% 63% 50% 40% 28% 25% 22%

Information leakage

Voice Phishing

Spyware

Card Fraud

MarkAny Confidential

|

© 2010 MarkAny Inc.

10

What Are Required to Enhance on IT Security?
PCI & DSS Compliance: 6 Control Objectives, 12 Requirements Spanning
1.
 

Build and Maintain a Secure Network
Install and maintain a firewall configuration to protect cardholder data Do not use vendor-supplied defaults for system passwords and other security parameters

2.

 

Protect Cardholder Data
Protect stored cardholder data Encrypt transmission of cardholder data across open, public networks

3.

    

Maintain a Vulnerability Management Program
Use and regularly update anti-virus software Develop and maintain secure systems and applications

4.

Implement Strong Access Control Measures
Restrict access to cardholder data by business need-to-know Assign a unique ID to each person with computer access Restrict physical access to cardholder data

5.




Regularly Monitor and Test Networks
Track and monitor all access to network resources and cardholder data Regularly test security systems and processes

6.



Maintain an Information Security Policy
Maintain a policy that addresses information security

MarkAny Confidential

|

© 2010 MarkAny Inc.

11

1. Initiatives 2. Solution Overview 3. Proposed Solution 4. Conclusion
Secured Document Management SystemTM

Introduction to MarkAny SDMSTM
Flexible User Interface
WinXP WinVista Win 7 x64 OS
     Collaboration Communication Work Efficiency Biz. Agility Biz. Continuity

Enterprise Portal as a Single Window
User Community Retention & Workflow & Retrieval Job Report / eManagement Approval Imaging & Capture Process Knowledge Management &

Groupware & Collaboration

E-Form Management

Additional Component Packages Components Interface
Document Lifecycle Management Document Version Control Enhanced Search Information Rights Management Categorization & Classification

Secured Document Management Core Components

MarkAny SDMS is compromise flexible document management with core components of document lifecycle management with enterprise rights management. Additionally, The SDMS is able to include add-on packages for comprehensive business process management, simple groupware for group communication, retention management and knowledge management, and etc.
MarkAny Confidential | © 2010 MarkAny Inc.

Service Oriented Security Architecture
13

Basic Features of MarkAny SDMSTM
Groupware & Business Process
• Business Process & Work Flow • BPM Design Tool • Communication & Collaboration

Document Management Core
• Document Lifecycle Management • Document Version Control • Enhanced Search Engine • Categorization & Classification

• Job Report & e-Approval
• Schedule Sharing

Rights Management
• Document Encryption
• Access Control • Centralized Security Policy • Audit Trail & Monitoring • User Applications Control

Digital Assets

PDF & E-Form Management
• E-Form Template Management • E-Form Generation Tool • Online PDF Converting Gateway • Civil Online Certificate Issuing Service • E-Form & Groupware Integration

Basically, the fundamental features of MarkAny SDMS is mainly document lifecycle management with enterprise rights management. This system includes simple group communication and business process management for work efficiencies and collaboration, and optionally knowledge management system is added on the system.
MarkAny Confidential | © 2010 MarkAny Inc.

14

Strong Points of MarkAny SDMSTM
Cost Effective Work Efficiency High Productivity Security

The Lowest Cost to Implement

Improve Work Efficiency, Collaboration & Accuracy

Based on Web 2.0, Increase Communication, Productivity & Agility

Enforce Organization Security & Safeguard Digital Assets

40

60

40

60

40

60

40

60

20 0 100

80

20 0 100

80

20 0 100

80

20 0 100

80

MarkAny SDMS will be the best practice and highly benefit to customer with the lowest cost compared with other global vendor’s ECM solutions (IBM FileNet, Oracle UCM, EMC Documentum, and etc.). Additionally, it enables the customer to keep their digital assets in secured environment with integrated digital security solution.
MarkAny Confidential | © 2010 MarkAny Inc.

15

1. Initiatives 2. Solution Overview 3. Proposed Solution 4. Conclusion
Secured Document Management SystemTM

Total System Architecture of MarkAny SDMSTM
EXTERNAL ORGANIZATION THIRD-PARTY GROUP User PC Group

Secure Documents INTERNAL NETWORK

Legacy Server System

User PC Group

WAN External Web External G/W Firewall Secure Documents

INTERNAL ORGANIZATIONS RMS System DMS System Database Legacy Server System LDAP Secure Documents Centralized Data Access

User PC Group Business Application System

DATA CENTER

Data Warehuse File Storage DB Storage

User PC Group

Centralized The SDMS system will be located in internal organization but it can be flexibly interacted with external organization of government office and other third-party groups.

MarkAny Confidential

|

© 2010 MarkAny Inc.

17

Document Management Core - Classification
MarkAny DMS

RMS

DMS

DB

Setting Access Level

Classifying Document Folders

BoD Member
Document Storage

Administrator
Document Classification & Monitoring

Classified Document Folders

Check Access Rights

Monitoring Document Transaction

Staff User

MarkAny SDMS supports simple operation and administration for system administrator and end-users in order to manage document lifecycle with document classification and categorization. It enables the end-users to access internal documents with intuitive ways by taking advantage of classified document categories based on work proprieties.
MarkAny Confidential | © 2010 MarkAny Inc.

18

Document Management Core - Version Control

MarkAny DMS

RMS

DMS

DB Document Check-in & Download Document Document Modification

BoD Member

Document Upload & Set Access Level

Document Management

Document Folder

Document Storage

Document Folder Document Upload & Document Check-out

Staff User A

Version Upgrade Real-time Notice

Real-time Notice & Document Download

Staff User B

MarkAny SDMS provides the customer with flexible version control of internal documents by utilizing check-in / out process with government group-wide security

MarkAny Confidential

|

© 2010 MarkAny Inc.

19

Document Management Core - Enhanced Document Search
Digital Office Platform
Document Keyword Searching RMS GW DMS

Simple Searching
Indexing Accessor
Search Engine DB Document Folder

Searching

Locale Query Parser

Get Method

Users

Modifier Locale

Index DB

Document Storage

Result Ranking Summarizer

Direct Document Search Document Search Engine
Folder Document Full Text Searching

Enhanced Document Searching

MarkAny SDMS Includes the index search and tag clouds based on Web 2.0, it provides the end-users not only with simple index search but also enhanced document searching in repositories.

MarkAny Confidential

|

© 2010 MarkAny Inc.

20

GW & Business Process - Work Flow
MarkAny DMS
RMS DMS DB Business Process & Work Flow Rule Manager of Dept #1

Administrator

Business Process Design

Job Verifying & Process Approval
Manager of Dept #2

Document Folder

Document Storage

Document Folder

Document Management
Document Check-in/out
Document Check-in/out Manager of Dept #3 Document Check-in/out

Dept. #1

Work Collaboration

Dept. #2

Work Collaboration

Dept. #3

MarkAny SDMS provides various ways of business process management and work collaboration based on pre-defined rule of work flow such as job report, electronic approval process and schedule sharing.

MarkAny Confidential

|

© 2010 MarkAny Inc.

21

GW & Business Process - Job Report & e-Approval
MarkAny DMS
E-Approval Path Design

RMS

DMS

DB VP of Company Final Confirm Escalating to VP

E-Approval Sequence Definition

Administrator
2nd Confirm Document Folder Document Storage Document Folder

Document Management
Document Check-in/out Job Report & Submit 1st Job Verifying & Process Approval with Feedback

Senior Manager of Dept #1

Escalating to Senior Manager

Manager of Dept #1

MarkAny SDMS provide the job report and electronic approval process in each document storage and in each step. It controls step-by-step verification of documents and give the end-users convenient procedures during stages in work flows.
MarkAny Confidential | © 2010 MarkAny Inc.

22

GW & Business Process - Schedule Sharing
MarkAny DMS
RMS DMS DB

Internal Email

Real-time Notice
Manager of Dept #1

Schedule Management
Create & Configure Schedule Share Schedule

Monitoring User Activities

Manager of Dept #2

Manager of Dept #3

Dept. #1
Create & Configure Schedule

Dept. #2

Create & Configure Schedule

Dept. #3

MarkAny SDMS provides end-users with flexible schedule management in personal or calender sharing mechanism integrated with Internal Messenger, SMS, and synchronizing with MS Outlook program.

MarkAny Confidential

|

© 2010 MarkAny Inc.

23

GW & Business Process –Communication & Collaboration
MarkAny DMS

RMS

DMS

DB After Noticed, Download Document

BoD Member

Document Upload

Document Folder

Document Storage

Document Folder

Document Management
Notifying Public Information
Automatic Notice Real-time Notice

Staff User

Administrator

Real-time Notice Board
Register New Article

Sharing Internal Information

Bulletin Board
Staff User Staff User For group communication, MarkAny SDMS supports simple groupware system with use of notice board and bulletin board in SDMS. Administrator is able to create any kind of bulletin board for the purpose of specific use of communication in groups and control access level in groups and individual users.
MarkAny Confidential | © 2010 MarkAny Inc.

24

Rights Management – Basic Service Flow
Administrator

Save Control
Monitoring and Tracking

Edit Control

Screen Capture Control
User Platform Control
Internal Users

Document Download Centralized Management

Print Control

Internal User Outflow Limited Access based on Access Control List

Prevent illegal Access

Expiry Date Control Blocking Illegal Uses (CD, Thumb-drive, Email, Business Application System, etc)

Internal Owner

The organization can assure to embrace the security environment in the whole organization by means of document encryption, access control and audit trails. It enables the government to enforce internal control of security policy.

MarkAny Confidential

|

© 2010 MarkAny Inc.

25

Rights Management – Encryption & Document Control
When unauthorized user OPENs file When authorized user with READ-ONLY without printing

Unauthorized User

Authorized User with Different Access Control

If the user can not have rights to be able to edit and save, the user applications disables functions of ‘save’, ‘edit’, and ‘print’. In addition, the unauthorized person cannot be accessed to an encrypted document and read it.

MarkAny Confidential

|

© 2010 MarkAny Inc.

26

Rights Management – Document Expiry Date Control
Controls valid period of document access

Validity of document

The user cannot access to documents after pre-defined expiration date any more. Before opening a document, the expiry date defined in access control list (ACL) is always checked and gives user an alerting message when it expires to use.
MarkAny Confidential | © 2010 MarkAny Inc.

27

Rights Management – Access Control
Save/Edit Enabled

Document SAFER Server Open 10
/ Print 10 User 1 Job Position 1 Readonly

Readonly

Group A

Company 1 Open 10 Times Readonly Job Position 2

Group B

User 2

Header
Meta-Data Properties Document Encryption & Access Control

Access Control Information List

USER1
Read-only Extension Data ACL

USER2
Open 10 Times Extension Data ACL

GROUP A
Save / Edit Extension Data ACL

GROUP B
Read-only Extension Data ACL

POSITION1
Open/Print 10 Times Extension Data ACL

POSITION2
Read-only Extension Data ACL

Policy

COMPANY1
Read-only Extension Data ACL

Document Data

Encrypted Document Data

The access control information is configured by a security manager based on group of organization, job positions and even individual users. The access rights is differently applied to users in group by group, job position level, and access unit of individual user.
MarkAny Confidential | © 2010 MarkAny Inc.

28

Rights Management – User Applications Control
Document SAFER Server

Block-copy is disabled

Document SAFER Client
MS EXCEL MS WORD

Save function is inactive

MS POWERPOINT MS VISIO

CAD DRAWING PHOTOSHOP

Print function is inactive

MS PROJECT

Edit function is inactive
ADBO PDF

User PC Group
IMAGE FORMAT (BMP, JPEG, PNG, GIF, TIFF)

MULTIMEDIA

Window’s applications to edit documents is controlled by Document SAFER Client program for users to edit, save, print and copy blocks of document contents. Document SAFER supports all kind of version of applications including MS Office, Adobe PDF reader, Photoshop, Notepad, Wordpad, MS Paint, CAD drawing tools and etc.
MarkAny Confidential | © 2010 MarkAny Inc.

29

Rights Management – Centralized Security Policy

A document downloaded from Document SAFER server without edit, save rights

Edit , save rights enabled in real time without download again according to user’s authority

All security policy is defined by a security manager with real-time configuration of access rights in Document SAFER server.

MarkAny Confidential

|

© 2010 MarkAny Inc.

30

Rights Management - Auditing Trail & Monitoring

Log History Report

Log History for File Transactions

Log Export to Excel

Log History for Date Time Condition Log History for User Activities
User actions on document transaction such as document open, save, print and download/upload is reported to Document SAFER server. With this audit trail, a security manager is able to monitor user activities and audit misuse of document handling in user platform.
MarkAny Confidential | © 2010 MarkAny Inc.

31

Integration with Existing Biz. System

Content Management System

WIND CHIL ® PLM/PDM

SharedPoint

SAP® ERP
Document SAFER

Other EDMS

Documentum System

Other Groupwares (Lotus Notes, etc.)

FileNet ECM

Document SAFER integrates seamlessly with existing business platform (ECM/EDMS/BPM/GW/PDM/ERP/ETC.). MarkAny has a long experience in integration with many business systems, such as Oracle UCM/BPM, Microsoft Share Point, IBM FileNet, EMC Documentum, even local EDMS, and e-mail systems.
MarkAny Confidential | © 2010 MarkAny Inc.

32

User Platform Support – Full Support of Windows OS

Document SAFER Client Windows XP SP2/3 Vista ~ Windows 7 (x86, x64)

Document SAFER Server Windows 2003 ~ Windows 2008 R2 (x86, x64)

Support Unicode for Multi-language

Microsoft .NET framework 3.0 or Higher

Document SAFER supports all kinds of Window operating system including WinXP, Vista, Win 7 and 64bitsapplications. It supports multi-languages based on Unicode including English, Arabic, Chinese, Japanese, and Korean.
MarkAny Confidential | © 2010 MarkAny Inc.

33

Mobile Support of Digital Office
Digital office Platform

Document SAFER RMS

Mobile Support
GW / EDM / SE / PDF

Save Control

Email Attached File

Capture Control

MOBILE

Edit Control

Smartphone & Tab Devices
E-Mail Team Workspaces
File Download from Media

E-Mail Server

Messenger

Expiry Date Control

Outflowing Control

Document Security on Mobile Device
Job Report

User PC

Mobile Office
Documents & Files Communication
MarkAny Confidential

e-Approval

Schedule
| © 2010 MarkAny Inc.

34

Integration
End User-Clients PC
• Windows 2000/2003/XP/Vista(32) • MS Office 2003/2007, MS Outlook 2003/2007, Acrobat Reader, etc • Internet Explorer 6.0/7.0/8.0 • RMS Client Application

Administrator PC
• Windows 2000/2003/XP/Vista(32) • MS Office 2003/2007, MS Outlook 2003/2007, Acrobat Reader, etc • Internet Explorer 6.0/7.0/8.0 • RMS Client Application 300 dpi Scanner 300 X 300 dpi Laser Printer

Internal Network(10/100Mb)
L4 SWITCH

LDAP (User Profile System)

Internal Network(10/100Mb)
ECM System

RMS System

DB System

RMS Integrator Daemon

EDMS – HA Structure Available
Hardware: HP DL360 G5 3.0G Hz 2CPU / 4GB RAM / 73GB HDD Unix / Unixware OS Software: Web Application Server J2EE / WAS / Tomcat / DMS Server / RMS Daemon

RMS – HA Structure Available
Hardware: HP DL360 G5 3.0G Hz 2CPU / 4GB RAM / 73GB HDD Windows 2008 Server Enterprise Edition Software: MS Internet Information Server DotNet Platform 2.0 RMS Server MarkAny Confidential |

EDMS & RMS Database System (HA Structure Available)
Hardware: IBM x3650 Series 3.5G Hz 2CPU / 8GB RAM / 146 GB HDD Windows 2008 Server Enterprise Edition Software: Oracle, IBM DB2, or MSSQL Database

File Storage (Document File Storage)

© 2010 MarkAny Inc.

35

Options - E-From Management System
E-Form Template Generation
Run e-From Designer Mark e-Form Template Use e-From Components E-Form Registration

XML Data

Dynamic Template

Admin e-From Components

E-Form Issuing Service Flow
Check Box 4 Distribution Channels 2 Legacy DB Administrator Register e-Form by e1 Form Designer Web Distribution 2 Program Data E-Document Storage Radio Button Button Combo Box Text Input Field Table Digital Signature

2
XML Data

Email Distribution

Fax Distribution

Output Gateway
3 Data Mapping with e-Form Template 2 Online Printing Smartphone Distribution

HTML Data (Parameter)
MarkAny Confidential | © 2010 MarkAny Inc.

E-From Certificate

36

Options - PDF Converting & E-Form Gateway Service
PDF Converting Process
Document Converting Request 2 1 3

Users

Document Upload to Digital Office Platform

Digital Office Platform
(EDM, GW, BPM, etc.)

PDF Converting

PDF Gateway 5

E-Form Gateway Service Flow

Output Document

Output Document

Form Manager

E-Form

Admin

Digital Office Platform

System Connector

Data Manager

XML Data

Form Gateway

DB

MarkAny Confidential

|

© 2010 MarkAny Inc.

37

1. Initiatives 2. Solution Overview 3. Proposed Solution 4. Conclusion
Secured Document Management SystemTM

Conclusion

Learn

Improve

Enforce

Compromise Biz. Solution
• Assess business challenges and vulnerability • Adapt business solution to improve productivity, work efficiency, accuracy, agility and work collaboration • Educate user experience and measure business performance periodically • Maintain user control and transaction in secure

Increase Biz. Performance
• Activate user attendance for higher business performance • Decrease cost to maintain systems • Remove unnecessary business flow & work process • Create value-added activities on user communities • Enforce user control and security

Reduce Security Risk
• Monitor communication channels and security holes • Reporting of matches against policies and information leakage • Adjust Internal Security Policies • Enable enforcement policy • Quarantine suspicious messages • Create audit trail of all communications to substantiate compliance • Reduce violations to required levels

MarkAny Confidential

|

© 2010 MarkAny Inc.

39

Successful References

Ministry of Finance Ministry of Defense

Korean Navy

Korean Air force

Korean Army Korea Immigration Service The Supreme Court of Korea Presidential Security Service Gangnam-gu Office

Korean Policy Agency

Ministry of Government Administration and Home Affairs

Presidential Office
Ministry of Foreign Affairs National Tax Agency Employment Insurance Mongolia Diplomat NFRDI (National Fisheries Research & Development Institute) Korean Railway Service

Korean Institute for Advancement of Technology

Oman Gov. Secretary of State PT. Telkom
MarkAny Confidential |

Dubai Courts, UAE PT. MelOn

© 2010 MarkAny Inc.

40

References
Document Security in Finances

Woori Bank Shinhan Bank

IBK Bank

Daegu District Bank

Korea Development Bank

Korea ExportImport Bank

Korea Investment & Securities

Hyundai Securities

Woori Futures

Korea Financial Supervisory Service

Kyobo Life Insurance

Kumho Life Insurance

Allianze Life Insurance

BC Credit Card

Document Security in Global Sites

PT. Telkom Indonesia

Bank BTN Indonesia
MarkAny Confidential | © 2010 MarkAny Inc.

Saudi Riyad Bank
41

Why MarkAny? – Bank BTN
Rights Management System (RMS)
 Purpose: Protect online documents managed in existing system (Banking Information Management System, ERP, MIS, Accounting System, etc.) and provide data protection and strong access control to digital assets  Project Implementation Information
No Banks Type Document SAFER Components PC-DRM(Included 11 Branches) Added OLAP,DM Message System Second Year Maintenance Server DRM(#4) & PC-DRM Second Year Maintenace Server DRM(#6) & PC-DRM Second Year Maintenace Server DRM(#6) & Integration with 6 Branches Second Year Maintenance
Daegu District Bank

1

Initial Project Woori Bank & Woori Fi nance Group Additional Development (2010~ 2011) Maintenance Daegu District Bak (2010~ 2011) Korean EXIM Bank (2010~ 2011) KDB Finance Group (2010~ 2011) Initial Project Maintenance Initial Project Maintenance Initial Project Maintenance

2

3

4

MarkAny Confidential

|

© 2010 MarkAny Inc.

42

Why MarkAny? – Bank BTN
Rights Management System (RMS)
 Purpose: Satisfying IT Compliance & Regulation like PCI & DSS with use of IBM FileNet ECM and provide data protection and strong access control to digital assets  Implementation Period: Jun.. 2011 ~ Sep. 2011 (2 Weeks)

MarkAny Confidential

|

© 2010 MarkAny Inc.

43

Why MarkAny? – Bank BTN
Rights Management System (RMS)
 Purpose: Protect online documents managed in IBM FileNet ECM and provide data protection and strong access control to digital assets  Implementation Period: April. 2011 ~ April. 2011 (2 Weeks)
Database
HR Integration

File Storage
Document File Access

User Profile System (ADS/LDAP)
User & Group Profile Synchronization

IBM FileNet
System Administration
ECM Custom Layer

Triggering Logon Process & Document Encryption / Decryption

RMS (Document SAFER)
HTTP APIs

Internal Network(10/100Mb)
User Authentication (SSO) RMS Client Download
Document Upload / Download

Softcopy Documents

Hardcopy Documents

Users
MarkAny Confidential | © 2010 MarkAny Inc.

44

Why MarkAny? – PT. Telkom Indonesia
Hardcopy Document Security (HDS)
 Purpose: Protect Hardcopies at BoD Conference & Trace with Forensic Watermarking & 2D-Barcode on Printed Papers  Implementation Period: Feb. 2010 ~ Feb. 2010 (1 Weeks)
1 Document Upload Database

Single Sign On Document Creation Document Upload EDMS Lotus Domino ADS BOD Secretary Document Print Out or Email Distribution BOD Members

3 Watermarked Image 6 Document Tracking

Document Download

4

5 Tracking Hardcopies

Photocopy & Illegal Distribution

Security Administrator

Unauthorized User

BOD Board

MarkAny Confidential

|

© 2010 MarkAny Inc.

45

© 2010 MarkAny Inc.

Sponsor Documents

Or use your account on DocShare.tips

Hide

Forgot your password?

Or register your new account on DocShare.tips

Hide

Lost your password? Please enter your email address. You will receive a link to create a new password.

Back to log-in

Close