top of page

Document Security Orchestration

In a boundary-less work environment, the life cycle of documents also undergoes changes.

 

Rather than next-generation DRM, orchestrating a suitable DRM that aligns with both internal and external environments is crucial.

 

SOFTCAMP achieves document security orchestration based on zero trust through conditional adaptive policies.

Document Security Orchestration.png

Document Life Cycle

아이콘01.png

Create

•User document creation

•Downloading documents from Intranet/Internet

•Web document (Wiki, Web, Office)

아이콘02.png

Editing

•Local and cloud usage

•Collaborative editing, teamwork

•Office work, remote work

아이콘03.png

Distribution

•Online-based secure sharing

•Sharing via URL links

아이콘04.png

Disposal

•Local stored document disposal

•Cloud stored document disposal

Security Response Strategy

Adaptation required in response to the life cycle changes

생성과 동시에 식별 및 등급화

안전하고 원활한 협업

암호화&유출방지

컴플라이언스 준수

사용자 권한 제어 및 접근 제어

유통에 대한 가시성 확보

Document Security Orchestration
4 Solutions

02
SHIELDrive

Cloud Storage Security Broker

Ensuring information sovereignty in the cloud environment while adhering to various compliances to enhance business productivity through zero trust security

In a boundary-less work environment, when clients save files to the cloud storage they use, SHIELDrive realizes document security orchestration by encrypting and obfuscating file names.

bg.png

Web viewer/editing support for various file extensions

Integrated management of distributed multi-storage

Data security/management in the cloud environment

bg.png

Cloud Environment Collaboration

DRM Document Usage / Co-editing in the Cloud

Compatible with Microsoft AIP

02
SHIELDRM

Cloud Document Security Orchestration

SHIELDRM is a solution that automatically applies existing DRM (Document Security) measures to the cloud environment, ensuring uninterrupted security even in cloud settings.

It enables document security orchestration to operate seamlessly in a boundaryless work environment tailored to the cloud.

02
SHIELDrive

Cloud Storage Security Broker

클라우드 환경에서 정보 주권은 확보하고, 동시에 각종 컴플라이언스는
준수하여 업무의 생산성을 높이는 제로 트러스트 보안 실현

In a boundary-less work environment, when clients save files to the cloud storage they use, SHIELDrive realizes document security orchestration by encrypting and obfuscating file names.

bg.png

Web viewer/editing support for various file extensions

Integrated management of distributed multi-storage

Data security/management in the cloud environment

bg.png

Cloud Environment Collaboration

DRM Document Usage / Co-editing in the Cloud

Compatible with Microsoft AIP

04
Document Security 5

Cloud Document Security Orchestration

SHIELDRM is a solution that automatically applies existing DRM (Document Security) measures to the cloud environment, ensuring uninterrupted security even in cloud settings.

It enables document security orchestration to operate seamlessly in a boundaryless work environment tailored to the cloud.

05
SHIELDInfo

classification management and distribution visibility.

It provides visibility into the distribution and usage of user documents through statistical graphs, allowing for distribution status management for specific classifications, users, business systems, and cloud services.

The solution distinguishes and manages general information and trade secrets within the company, confirming user consent for handling sensitive documents.

Providing controlled user permissions and segregated classification management

Specification of

information types and classifications

Notification of user

handling precautions

upon viewing

Original certification of classified documents and tracking of distribution paths

Specifying file usage permissions before external sharing

Sharing

documents links with

external users

External users accessing documents through

a web viewer

Provide approval

workflows and

auditing  

or shared file history

06
SHIELDShare

Secure Co-Work

A solution that enables secure information sharing and collaboration with external parties while maintaining security, and supports the management of company-specific external users without the need for external user registration.

The solution allows for unique approval processes and ensures visibility into externally shared files

bottom of page