top of page

Security 365 provides 

365 days of secure zero trust security

in the cloud environment

Security 365, as SOFTCAMPs security cloud service,

achieves zero trust security through Document Security Orchestration for documents distributed and used internally and externally, and Zero Trust Security for untrusted connections and external threats.

visual1Pic.png
앵커 1

Document Security Orchestration

In a boundary-less work environment, the life cycle of documents also undergoes changes.

 

Rather than next-generation DRM, orchestrating a suitable DRM that aligns with both internal and external environments is crucial.

 

SOFTCAMP achieves document security orchestration based on zero trust through conditional adaptive policies.

Document Security Orchestration.png

Document Life Cycle

아이콘01.png

Create

•User document creation

•Downloading documents from Intranet/Internet

•Web document (Wiki, Web, Office)

아이콘02.png

Editing

•Local and cloud usage

•Collaborative editing, teamwork

•Office work, remote work

아이콘03.png

Distribution

•Online-based secure sharing

•Sharing via URL links

아이콘04.png

Disposal

•Local stored document disposal

•Cloud stored document disposal

Security Response Strategy

Adaptation required in response to the life cycle changes

Simultaneous Identification and Classification upon Creation

Secure and Seamless Collaboration

Encryption &

Data Leakage  Prevention

Compliance

Adherence

User Authorization Control and Access Control

Ensuring Visibility

for Distribution

Document Security Orchestration
4 Solutions

bg.png

Cloud Environment Collaboration

DRM Document Usage / Co-editing in the Cloud

Compatible with Microsoft AIP

01
SHIELDRM

Cloud Document Security Orchestration

SHIELDRM is a solution that automatically applies existing DRM (Document Security) measures to the cloud environment, ensuring uninterrupted security even in cloud settings.

It enables document security orchestration to operate seamlessly in a boundaryless work environment tailored to the cloud.

02
SHIELDrive

Cloud Storage Security Broker

Ensuring information sovereignty in the cloud environment while adhering to various compliances to enhance business productivity through zero trust security

In a boundary-less work environment, when clients save files to the cloud storage they use, SHIELDrive realizes document security orchestration by encrypting and obfuscating file names.

bg.png

Web viewer/editing support for various file extensions

Integrated management of distributed multi-storage

Data security/management in the cloud environment

03
SHIELDInfo

classification management and distribution visibility.

It provides visibility into the distribution and usage of user documents through statistical graphs, allowing for distribution status management for specific classifications, users, business systems, and cloud services.

The solution distinguishes and manages general information and trade secrets within the company, confirming user consent for handling sensitive documents.

Providing controlled user permissions and segregated classification management

Specification of

information types and classifications

Notification of user

handling precautions

upon viewing

Original certification of classified documents and tracking of distribution paths

Specifying file usage permissions before external sharing

Sharing

documents links with

external users

External users accessing documents through

a web viewer

Provide approval

workflows and

auditing  

or shared file history

04
SHIELDShare

Secure Co-Work

A solution that enables secure information sharing and collaboration with external parties while maintaining security, and supports the management of company-specific external users without the need for external user registration.

The solution allows for unique approval processes and ensures visibility into externally shared files

bottom of page