News Room
Leakage incidents caused by internal employees continue to occur. In addition, Company A was indicted for tricking a competitor's employee into stealing customer information; There have been internal leaks reported through various news and newspapers, such as employees selling drawings of semiconductor-related equipment to overseas companies to make unfair profits or employees trying to steal design drawings. “Internal company information leak? But aren’t leaks usually caused by hacker attacks or outsiders?” Many people think that the leak of work-related information is due to an external attack. However, 80% of those who leak confidential company information are current and former executives and employees! Since they are personnel who directly perform the work, they are aware of what is going on and what related data is available. A leak caused by internal personnel is bound to be an even bigger blow to the company...!
“Is there a solution that complements the shortcomings of security solutions, is convenient to use, and prevents document leakage by insiders?” Solve your document security concerns at once with Cyberdigm’s document centralization!
【What is a document centralization solution】 : This is a solution that collects and stores work output in one central server to solve everything from document security to management at once. This is because you can delicately set document access rights for centrally collected documents. You can set access rights not only by department, but also within the department. You can set it so that only people of a certain rank or higher have permission to the document. And you can configure access for individual employees or by device. The scope of access is also specific! You can only view the list of files in the folder, read only to view the contents, edit to change the contents, The scope of permissions is divided in detail, such as delete, which allows you to delete documents, and full permissions.
Set a print control security policy to prevent unauthorized printing of documents! In the document centralization solution, you can set a security policy so that documents can only be printed with administrator approval! Additionally, you can leave traces of who printed the document by displaying a watermark to determine who printed the document and when! Print-related settings as well as capture control, whether local PC downloads are possible, which of the output generated by the application should be centralized, etc. Detailed elements can also be set with security policies.
What should I do if it leaks to my email? Document attachment control function for each website! In the document centralization solution, you can set whether or not files can be attached to emails from different web browsers. For example, Naver Mail, which is often used by employees for personal purposes, is set to disable attachment of files. Gmail, which is often used when communicating with external partners, is set up so that the original file or URL can be attached to an email. 'In addition, because administrators can change it at any time to suit the company's circumstances, security features can be used more conveniently and reliably.
Can I find out who modified a file? Check with document history search! The history search function in the document centralization solution records and displays not only the date and time of all document-related activities, but also who performed what actions. Not only who viewed and modified this document, but also which folder it was saved in, whether a distribution URL was created, and whether locked files were unlocked. Since you can check in detail, such as whether a new version has been created or whether the properties have been viewed, you can manage the security of important documents more thoroughly, right?