M-FileNet RMS

M-FileNet RMS


Negotiable Min Order Quantity Unit

Required Quantity
Place of Origin
Payment Terms
Negotiable
Production method
Negotiable
Shipping / Lead Time
Negotiable / Negotiable
Keyword
Category
Security Services
tK Meet
tK Meet

Apply a video call to the Supplier

SEND TO SUPPLIER INQUIRY

MarkAny INC.

Country / Year Established
South Korea South Korea /
Business type
Others
Verified Certificate

11

DUNS

Product name M-FileNet RMS Certification -
Category Security Services Ingredients -
Keyword - Unit Size -
Brand name - Unit Weigh -
origin Stock -
Supply type - HS code -

Product Information

Introduction

Conventional ECM products only manage sensitive data while they remain stored within the ECM repositories. M-FileNet RMSTM uses DRM (Digital Right Management) and watermarking technology to extend the secure management of information far beyond the repository. By integrating with RMS, ECM, and business systems, M-FileNet RMSTM ensures that sensitive data does not fall into wrong hands wherever the data resides.

With the development of the internet, email, portable storage devices, and mobile devices, treatment of digital assets has become a critical concern of CEOs and CIOs of many organizations.

M-FileNet RMSTM provides a perfect solution for FileNet users to protect digital assets from unauthorized access of any form. The RMS enforces corporate security policy
without sacrificing the productivity of the user. It ensures that digital assets are always under control. RMS is being deployed in various organizations such as government
agencies, financial institutions, and manufacturing companies.

M-FileNet RMSTM provides a means of obtaining knowledge of current security risks and of constructing a cost-effective internal security system. The system is constructed
in a fast and effective way delivering the following benefits to the customers . Reduces the risk of management information leakage through tight control over classified information.

  • Raises overall awareness of the potential impacts to the enterprise associated with security risks, and provides a means of enforcing company-wide security policies..
  • Instantly recognizes any attempts of illegal use of digital assets, and provides traceability.
  • Guarantees consistency of security management by ensuring centralized control and monitoring.
  • Aids in the compliance of information security regulations.

Key Features

Centralized Security Monitoring & Control

Provides powerful tools to protect classified documents from any attempts of unauthorized access or distribution using USB memory devices, emails, messenger
programs, CDs, or any other means. With easy-to-use configuration tools, the user can enforce the company’s security policies

  • Usability Control
  • Multi-company access control

Flexible Access Control

By group, department, job position and person based on security policies with easy to use multi-lingual support.

Auditing & Log Management (Traceability)

Classified documents are supervised by the RMS. If the user attempts to use a document illegally, the RMS monitors the action and alarms the supervisor

Offsite & Offline Security


In case of employees working at home or business trips overseas, the RMS provides a document and PC takeout process. The classified documents are protected on
the road based on offline policies.

The RMS also allows the offsite users to have access to the internal business system with authentication and to carry out the business activities securely.

Intuitive User Platform Control


Security Policy is enforced using the intuitive menu control on client PCs.

  • Edit, Save / Save As, Print, Open , and Print Count
  • File Retention and Expiry Date
  • Block-copy
  • Screen Capture Prevention
  • Watermarking

Extend Security to Mobile Devices

Today’s professional should stay current on the latest development of mobile devices to enhance productivity. RMS supports security on devices of Windows Mobiles
and it continues to extend to Blackberry, i-phone, g-phone and embedded Linux platform.

Flexible Key Management

To ensure total security of the client, the RMS comes with user changeable double key structure (Symmetric key and Master key).

Hardcopy (Printed Document) Security

With leading-edge watermarking technology, the security manager can trace the usage of hard copy documents to identify the user responsible in case of an information
breach. Watermarking enables the user to embed hidden information into the printed material in order to protect classified information.

  • Embed/Extract Forensic Watermarking

Tight Integration with IBM FileNet

FileNet users do not need to change the way they used to work. The RMS will secure documents while running in the background

  • Single Sign-On
  • Privilege Mapping (whether reside in repository of file space)
  • Authentication (Active directory, LDAP support)

Flexibility & Scalability

M-FileNet RMSTM supports integration with almost all enterprise business systems because there must be means to protect information used in business systems such as ECM, EDMS, BPMS, PMS, GW, ERP, CRM, KMS, EP, and EKP.

  • Integration Adapter for business systems

Wide-Range of User Applications and File Type Support

Virtually supports almost all data types and client applications. It provides the user room for future IT expansion without hassle.

Open System Support (Open Office...)

Why pay more? With M-FileNet RMSTM, you can use free wares like Open Office without sacrificing document security. The RMS gives the client freedom to choose their own office tools.

Internal Control for Regulatory Compliance

Provides tools to apply regulatory enforcement on digital security for specialized areas such as identity theft and privacy information protection

  • SOX, and local security acts…

Base Specifications

M-FileNet RMSTM is a client / server application and it may be deployed as a standalone RMS server or in conjunction with IBM FileNet p8 Application Server.

 
SPECIRICATIONS
REMARKS
Server Platform
OS Support Windows NT, Windows 2000 Professional,
Windows 2000 Server, Windows 2003 Server,
Windows 2008 Server, Unix-ware Operating
System, Linux-ware Operating System
Windows 2003 Server is recommended
The latest Windows Service Pack
H/W Specification Pentium 4-2GHz or more, Memory 1G,
HDD 40G
N / A
Database System MSSQL 2005 Server, MSSQL 2005 Express,
Oracle 9i or Higher, IBM DB2
MSSQL 2005 Server or MSSQL 2005 Express
is recommended
Software Requirement Microsoft DotNet Framework v2.0, v3.0,
Microsoft IIS(Internet Information Service
MS DotNet Framework v2.0, or v3.0 should be
previlously installed on Windows 2003 Server
     
Client Platform
OS Support Windows NT, Windows 2000 Professional,
Windows 2000 Server,
Windows XP Professional(32bits/64bits),
Windows Vista(32bits/64bits), Windows 7
VISTA may have some restriction due to UAC
H/W Specification Pentium III 500MHz or more,
Memory 128M(256M or more recommended),
HDD 10M
N / A
     
Integration Services(Standard Adapter)
Archiving System ECM, EDMS, File Server EMC Documentum, Oracle UCM, MS
Sharedpoints, etc
Business System BPMS, KMS, PDM, ERP, CRM, GW, EKP Lotus Notes, Winchill PDM, SAP ERP, etc
     
Client Application & File Type Support
Office File Format DOC, DOCX, XLS, XLSX, PPT, PPTX, PPS,
PPSX, ODS, ODT, ODP, TXT
MS OFFICE 97/2000/XP/2003/2007,
Open Office 3.1, Word PAD, NotePAD
Potable Document Format PDF Acrobat Reader 6.0/7.0/8.0/9.0
Image File Format JPG, BMP, JPEG, GIF, TIF, CDR, PAT, CDT, CMX,
AI, PS, PM, EPS, WPG, WMF, CGM, PDF, HTM,
DCT, DXF, DWG, PLT, VSD, CPX, CDX, AI, AIT,
JPG(JPEG), BMP, GIF, TIF(TIFF), PDF, EPS, SVG,
SVGZ, TXT, PNG, TGA, PCX
98,2000 : Kodak, XP : MS-Paint, Paint Shop
Pro 7.0, Photo Shop 7.0, Corel Draw 9, 11,
Adobe Illustrator 8.0 / 9.0 / 10 / 11 / 12
CAD drawing Format DWG, DXF, DWS, DWT, DWF, DWFX, FLIC,
FLI, FLC, BMP, CAL, CALS, CG4, MIL, RST, GIF,
IG4, JPG(JPEG), PCX, PCT, PICT, PNG, RLC,
TGA, TIF, TIFF2
Auto-CAD(R13, R14, 2000/2002/2005/2006/
2008-Org/LT/Mech/Elec), DWg TrueView 2007/
2009, Design Review 2009, Volo Viewer 2002,
VisView 5.1

B2B Trade

Price (FOB) Negotiable transportation -
MOQ Negotiable Leadtime Negotiable
Payment Options Negotiable Shipping time Negotiable

MarkAny INC.

Country / Year Established
South Korea South Korea /
Business type
Others

11

DUNS

President
Jong Wook, Choi
Address
10F, Ssanglim Bldg., 151-11, Ssanglim-dong,, Jung-gu,Seoul,
Product Category
Computer Software,Other Security & Protection Products
Company introduction
Since 1999, MarkAny has led DRM and Watermarking Technology and has been providing solutions for internal security, media content security and forgery prevention for online e-certificates. MarkAny has in-depth knowledge and technical expertise, and provides the most experienced and highly qualified consultants. MarkAny is highly reputable and possesses profound technical references in the proposed security area. It has established around 800 reference sites across every industrial sector, covering the public, financial, manufacturing, communications, and online services in Korea and overseas over the past decade. MarkAny boasts the world's leading DRM and watermarking technology and has applied for 250 patents in domestic and international and has 110 registered patents. The Watermarking Technology, in particular, was designated as Korea's core technology. MarkAny is ready to transform itself from Korea's top-notch security solution provider into a global security solution provider. This has been enabled due to the support and interest of our customers. MarkAny will do its utmost to contribute into customers' value creation and protect their internal information and digital asset through ongoing R&D efforts.
Main Product

Related Products

Other buyers also search

Membership Grade

BUYER

Biz Pro VIP

SELLER

Biz Pro VIP
팝업닫기
Live Chat A new message arrives
from a business partner.

No Data

  • There is no data to load
  • Check out the My tK > My Inquiries list.
  • After agreeing to the use of the Live Chat service, the list is printed only when there is at least one history of receiving or sending a Live Chat request.

If you have not yet agreed to use the Live Chat service,

You can use the Live Chat freely after agreeing to the use of the Live Chat service.

View more
View more