Академический Документы
Профессиональный Документы
Культура Документы
Johnston Yoon
1.
2.
3. 4. 5. 6.
REGULATIONS INCREASING
Increased data exposure has resulted in increased regulations and reporting requirements globally
$7.2 Million3
Average org. cost of data breach over 4 years
1Source:
IDC The Diverse and Exploding Universe March 2008 Identity Theft Resource Center 2010 Data Breach Stats January 3, 2011 3Source: Ponemon Institute Fourth Annual U.S. Cost of Data Breach Study January 2009
2Source:
MarkAny Confidential
25%
20% 15% 10% 5% 0%
44 %
33 %
19 % 4%
Process Improvement Transparency & Audit Traceability
Cost
Security
This is not just due to Resulting in higher risk of generally higher salaries, robbery, theft, and fraud. but also more efficient Internal theft also poses a management of handling bigger problem involving cash through technology more manual processing and supply chain with more touch points of management, bringing staff and cash thus creating down other non labor opportunities for theft. related cost.
4
MarkAny Confidential
Theft Assurance Labor(Maintenance) Downtime of Machine Currency Fitness(Change) Assurance Downtime of Machine
Theft Labor(Refilling)
Emerging Banks China, India, Indonesia, Malaysia, Sri Lanka and Thailand
Transport Labor(Maintenance)
MarkAny Confidential
Assurance
Downtime of Machine (Opportunity Cost) Holding of Excess Cash (Opportunity Cost) Labor Cost
Bank Thailand
Bank Malaysia
Bank Indonesia
MarkAny Confidential
Bank Korea
|
Bank Taiwan
50%
25%
22%
E-discovery requests
Supply chain breakdown Terrorism activity Bank Phishing Identity Theft
13%
11% 6% Privacy
Source: 2010 IBM Global IT Risk Study
Information leakage
Voice Phishing
Spyware
Card Fraud
MarkAny Confidential
2.
3.
4.
5.
6.
MarkAny Confidential
Quantitative Benefit
Security & Regulatory Cost Theft Currency Fitness (Change) Assurance IT & Operation Cost Downtime of Machine (Opportunity Cost) Holding of Excess Cash (Opportunity Cost) Labor Cost Transport Labor (Maintenance)
Helping to avoid contractual, industry and regulatory penalties as in nearly 5% of total cost. Maximum as much as 20 % to 30% cost saving by delivering considerable savings over traditional information security management efforts. Helping to create 2nd new revenue streams by reducing bank security cost and invest to labor management cost.
Qualitative Benefit
Creating and maintaining one set of processes, leading to reduced redundancies compared to traditional data security management efforts. Allowing for faster market rollout of new initiatives, products and services.
Labor (Maintenance)
Labor (BackOffice: Sorting, Counting) Labor (Refilling)
Bank Korea
MarkAny Confidential
Increase compliance and regulatory adherence & Enhance business intelligence capabilities
10
Collect data on threats, impacts and effectiveness of current document management process and provide hardcopy protection for eDiscovery
Provide extensive industry knowledge and guideline that cover important data risk areas such as PCI compliance and remote data protection.
MarkAny Confidential | 2012 MarkAny Inc.
11
UCM / BPM
SharedPoint
WinXP
WinVista Win 7
Documentum
CD / USB Distribution
Hardcopy Protection
RMS Component Packages Components Interface Document Encryption Access Control Centralized Security Policy User Applications Control Audit Monitoring
The Rights Management System is a total security solution to protect internal information and prevent illegal usage or forwarding the sensitive information to unauthorized user. It enables the organization to consolidate its security policy and make all intelligence secured in the Bank organization.
MarkAny Confidential | 2012 MarkAny Inc.
FileNet
Save Control
Monitoring and Tracking
Edit Control
Print Control
Expiry Date Control Blocking Illegal Uses (CD, Thumb-drive, Email, Business Application System, etc)
Internal Owner
The organization can assure to embrace security polices enforced by means of document encryption, access control, and audit trails. It enables the Bank to enforce internal control using security policy and system.
MarkAny Confidential | 2012 MarkAny Inc.
13
Unauthorized User
If the user can not have rights of Edit Save Print, user applications disables functions of save, edit, and print. In addition, the unauthorized person cannot be accessed to an encrypted document and read it.
MarkAny Confidential | 2012 MarkAny Inc.
14
Validity of document
The user cannot access to documents after pre-defined period of use is expired. Before opening a document, the expiration date is always checked, and if document expired to use, sent is an alarming message to the user. The document will disappear from the memory, and even HD.
MarkAny Confidential | 2012 MarkAny Inc.
15
Readonly
User 1
Group A Readonly Group B
Job Position 1
Company 1
Open 10 Times
User 2
Header
Meta-Data Properties Document Encryption & Access Control
USER1
Read-only Extension Data ACL
USER2
Open 10 Times Extension Data ACL
GROUP A
Save / Edit Extension Data ACL
GROUP B
Read-only Extension Data ACL
POSITION1
Open/Print 10 Times Extension Data ACL
POSITION2
Read-only Extension Data ACL
Policy
COMPANY1
Read-only Extension Data ACL
Document Data
The access control information is configured by a security manager based on position, division, and job of the user. Access rights are differently applied to users.
MarkAny Confidential | 2012 MarkAny Inc.
16
Block-copy is disabled
MS POWERPOINT MS VISIO
MS PROJECT
User PC Group
IMAGE FORMAT (BMP, JPEG, PNG, GIF, TIFF)
MULTIMEDIA
Windows applications to edit documents is controlled by Document SAFER Client program. Document SAFER supports all kind of version of application software, including MS Office, Adobe PDF reader, Photoshop, Notepad, Wordpad, MS Paint, CAD drawing tools, and etc.
MarkAny Confidential | 2012 MarkAny Inc.
17
A document downloaded from Document SAFER server without edit, save rights
Edit , save rights enabled in real time without download again according to users authority
All security policy is defined by a security manager with real-time configuration of access rights in Document SAFER server.
MarkAny Confidential | 2012 MarkAny Inc.
18
User activities of open, save, print , and download/upload are reported to Document SAFER server. With this audit trail, a security manager is able to monitor user activities and audit misuse of document handling in user platform.
MarkAny Confidential | 2012 MarkAny Inc.
19
Control of the screen capture for encrypted documents can block activation of commercial capture program or shareware viewer programs . Blocking screen capture function at PC is also activated for a user who is not allowed to use edit function. An unauthorized user for screen capture function will find that there is no ways to capture the information displayed on the screen. MarkAny Confidential | 2012 MarkAny Inc.
20
Document SAFER supports all kinds of Window operating system including WinXP, Vista, Win 7 and 64bitsapplications. It supports multi-languages based on Unicode including English, Arabic, Chinese, Japanese, and Korean.
MarkAny Confidential | 2012 MarkAny Inc.
21
Save Control
E-Mail Server
Capture Control
SecuReady
Edit Control
Outflowing Control
User PC
Smartphone support is becoming more important than ever. Document SAFER extends its security features to mobile devices such as I-phone, Android phone, Windows Mobile, and Blackberry. Access of documents is controlled exactly as in PC or Laptop computer.
MarkAny Confidential | 2012 MarkAny Inc.
22
SharedPoint
SAP ERP
Document SAFER
Other EDMS
Documentum System
FileNet ECM
Document SAFER integrates seamlessly with existing business platform (ECM/EDMS/BPM/GW/PDM/ERP/ETC.). MarkAny has a long experience in integration with many business systems, such as Oracle UCM/BPM, Microsoft Share Point, IBM FileNet, EMC Documentum, even local EDMS, and e-mail systems.
MarkAny Confidential | 2012 MarkAny Inc.
23
Conclusion
40 20 0
60 80 100 20
40
60 80 0 100 20
40
60 80 0 100 20
40
60 80 0 100 20
30%
100%
80%
MarkAny Confidential | 2012 MarkAny Inc.
100%
50%
24
Successful References
Document Security in Finances
IBK Bank
Hyundai Securities
Woori Futures
BC Credit Card
File Storage
Document File Access
IBM FileNet
System Administration
ECM Custom Layer
Internal Network(10/100Mb)
User Authentication (SSO) RMS Client Download Document Upload / Download
Softcopy Documents
Hardcopy Documents
Users
MarkAny Confidential | 2012 MarkAny Inc.
26
Initial Project Woori Bank & Woori Fi nance Group Additional Development (2010~ 2011) Maintenance Daegu District Bak (2010~ 2011) Korean EXIM Bank (2010~ 2011) KDB Finance Group (2010~ 2011) Initial Project Maintenance Initial Project Maintenance Initial Project Maintenance
MarkAny Confidential
27
MarkAny Confidential
28
Single Sign On Document Creation Document Upload EDMS Lotus Domino ADS BOD Secretary Document Print Out or Email Distribution BOD Members
Document Download
Security Administrator
BOD Board
MarkAny Confidential
29