SlideShare une entreprise Scribd logo
1  sur  4
Télécharger pour lire hors ligne
“Given today’s business environment,
the ability to share and exchange critical
information in a secure and timely manner
is crucial to sustaining operations.”
					- Joe Panora,
					Director of CDCR’s 	
					Enterprise Information
					Services (EIS)
As one of the largest state departments in the United States, the
California Department of Corrections and Rehabilitation (CDCR) is
responsible for administering justice by upholding the integrity and
operation of the California state prison and parole system. Inevitably,
they retain an array of highly sensitive files, such as inmate and
parolee personal details, audio transcription and criminal case
information – which they are required by law to provide for casework
and trials. CDCR needed a way to securely and easily share such
data between the agency and external entities involved in the cases
of inmates that need to be processed.
Goals
CDCR traditionally processed inmate and parolee case files by paper.
Even when most of the information was available electronically, much
of it was still printed out and sent for processing. In select cases,
the information would be encrypted, burned onto a CD and mailed.
However, transporting this volume of data to the Board of Parole
Hearings stakeholders in time for the scheduled hearing became
an issue. To comply with court mandates, CDCR needed a way to
accelerate the availability of data for inmates and parolees waiting
to be processed. “Given today’s business environment, the ability to
share and exchange critical information in a secure and timely manner
is crucial to sustaining operations,” explains Joe Panora, Director of
CDCR’s Enterprise Information Services (EIS).
.
.
.
Customer
California Department of Corrections and
Rehabilitation (CDCR) operates the state
prison and parole system
One of the largest state departments
in the United States with approximately
57,000 employees
Oversees 34 state adult prisons, 3
juvenile facilities, a variety of community
correctional facilities, and parole systems
Goals
Securely share files within the agency
and with external entities, such as public
defender and private attorneys
Implement an easy-to-use solution,
evaluated on usability, security and
scalability
Dynamically control, revoke and track
all files shared, even after they are
downloaded from the system
Deliver various file types including
Microsoft Office, PDF and media files in a
timely manner
Solution
Deployed as a cloud service, with
24/7 access to data and the option of
transitioning on premise in the future
Unparalleled security: Robust DRM,
mobile container, optimized rendering and
customizable watermarks to ensure that
only authorized users can access shared
files
Users are able to track the document
activity of the information they shared
without the involvement of IT
Benefits
Rapidly adopted in the initial pilot by the
department of 260 users and foresee
strong growth in the future
High quality of customized training and
guidance from WatchDox in rolling out the
solution at scale
Option to utilize existing SharePoint and
Windows File Share repositories using
WatchDox Content Connectors
.
.
.
.
.
.
.
.
.
.
California Department of Corrections and
Rehabilitation (CDCR) Adopts WatchDox
for Secure External Collaboration
Case Study
Government
Case Study | Government
Page 2
CDCR is using WatchDox as a cloud service for
fast deployment and easy scalability with the
assured security of the WatchDox solution. With
WatchDox, CDCR retains full ownership over its
data and can choose to migrate to an on-premise
virtual appliance solution, if required in the future.
Most importantly, EIS considered the unparalleled
security that distinguishes WatchDox in the market.
WatchDox has the unique ability to provide true
digital rights management (DRM) control of files on
all devices, yet the security it provides extends even
further. Data is fully encrypted and containerized
within WatchDox Mobile Applications on Android and
iOS devices, as well as optimized for accurate
rendering in the web and mobile viewers. Files marked
with “Advanced Rights Management” can be protected
even after they are downloaded from the system
directly on the desktop as they are used in native
Microsoft Office and Adobe Reader applications and
can be dynamically revoked regardless of where they
reside.
Additionally, WatchDox allows file owners and
workspace administrators to manage documents and
user permissions, including being able to view and
download document activity logs for reference in their
day-to-day interactions. While IT unsurprisingly wants
to track everything, agency users expressed the
desire to be able to audit their own data to understand
what is being shared by their collaborators for what
purpose. Other EFSS solutions only allow system
administrators to access tracking information, which
would require an IT ticket to be submitted in order to
Solution
EIS chose WatchDox for enterprise file sync and
share (EFSS) after consulting with an analyst from an
independent research firm and conducting a proof-of-
concept evaluation. They decided that WatchDox best
matched the usability and security requirements that
CDCR set forth to provide the features that both users
wanted and IT needed.
CDCR needed a solution to:
1. Securely share files within the agency and with
external entities, such as public defenders and
private attorneys.
2. Implement an easy-to-use solution, evaluated
on usability, security and scalability that could be
established as an agency standard.
3. Dynamically control, revoke and track all files
shared, even after they are downloaded from the
system.
4. Deliver various file types including Microsoft
Office, PDF and media files in a timely manner.
Internally there are many ways for employees to share
data, but when it came to external parties it became
extremely difficult while ensuring adequate security
was in place. Previous methods of user-provisioning
were extremely cumbersome and deterred widespread
adoption.
“None of the tools that were in place offered the
combination of security and customer experience that
people have come to expect from modern consumer
file sharing applications,” says Scott MacDonald,
CDCR’s Information Security Officer.
Case Study | Government
relay the information.“By putting the power to provision
users in the hands of authorized agency employees
(i.e. only internal agency super users identified by
department are given workspace administrator
rights), customers can efficiently and effectively share
information while minimizing IT overhead,” explains
Dan Marshall an IT security analyst for EIS.
In today’s technology environment, mobility must be
considered. CDCR knew that they could not overlook
the need for mobility in its user base. With integrated
access, creation, edit and annotation features built in,
WatchDox has that covered.
At this time, CDCR does not allow employees to
“bring your own device” (BYOD), yet still has a need to
support people who are not a part of the department
and cannot control how outside users consume data.
WatchDox provides a solution where CDCR can
adhere to best practices when sharing data across
multiple platforms.
Benefits
Since launching WatchDox, CDCR is seeing rapid
adoption in the various lines of business where it is
introduced.
An added benefit that CDCR found in working with
WatchDox is the high quality of customizable training
that is offered by WatchDox.When deploying a solution
to hundreds and potentially thousands of users, IT
departments can easily be overwhelmed dealing with
the technical implementation as well as training end
users. Rather than assuming the entire burden, CDCR
chose to engage WatchDox in administering training
to internal agency employees as well as outside
entities (public defenders and private attorneys). By
leveraging the experience that WatchDox brings to
rolling out solutions at scale, CDCR can provide the
comprehensive education, resources and support
necessary for their complete user base.
Page 3
“With integrated
access, creation, edit
and annotation features
built in, WatchDox has
[mobility] covered.”
Looking towards the future, EIS is evaluating the
possibility of extending the security, mobility and
collaboration benefits of WatchDox to existing
SharePoint and Windows File Share repositories
using WatchDox Content Connectors. CDCR currently
operates two SharePoint instances, one internal and
oneexternal,usedacrosstheorganization.Theexternal
instance was originally established with external
sharing in mind, but now with WatchDox CDCR can
reevaluate its necessity and potentially consolidate
systems. CIFS file shares are also presently used to
store automatically generated content that needs to
be provided to different external departments. Rather
than having to pull the data manually from the existing
systems to be shared in WatchDox, CDCR is planning
to leverage WatchDox Content Connectors to do so
dynamically and without duplicating the data.
CDCR can now rest assured that regardless of whom
their employees are collaborating with and where the
data resides, it can always be protected, secured,
tracked and revoked with WatchDox.
Enterprises share with WatchDox.
Learn more at watchdox.com.
299 S. California Ave. #300
Palo Alto, CA 94306
1.800.209.1688 | watchdox.com
WatchDox enables organizations to access, protect and
control their critical documents wherever they go: on
any tablet, smartphone or PC, even those beyond the
IT department’s control. With WatchDox technology,
organizations can collaborate securely with partners, safely
adoptbring-your-own-device(BYOD)initiatives,anddestroy
their documents remotely if a device goes missing. More
than 100 of the Fortune 1000 including many of the world’s
leading financial institutions, manufacturers and government
agencies depend on WatchDox secure file-sharing solutions.

Contenu connexe

Tendances

A Novel Information Accountability Framework for Cloud Computing
A Novel Information Accountability Framework for Cloud ComputingA Novel Information Accountability Framework for Cloud Computing
A Novel Information Accountability Framework for Cloud ComputingIJMER
 
‘Personal data literacies’: A critical literacies approach to enhancing under...
‘Personal data literacies’: A critical literacies approach to enhancing under...‘Personal data literacies’: A critical literacies approach to enhancing under...
‘Personal data literacies’: A critical literacies approach to enhancing under...eraser Juan José Calderón
 
AMCTO presentation on moving from records managment to information management
AMCTO presentation on moving from records managment to information managementAMCTO presentation on moving from records managment to information management
AMCTO presentation on moving from records managment to information managementChristopher Wynder
 
ThinkDox implementation whitepaper for ECM
ThinkDox implementation whitepaper for ECMThinkDox implementation whitepaper for ECM
ThinkDox implementation whitepaper for ECMChristopher Wynder
 
WHAT ARE DIGITAL RESOURCES? DISCUSS WHAT ARE DIFFERENT TYPES AND HOW LIBRARI...
WHAT ARE DIGITAL RESOURCES? DISCUSS WHAT ARE DIFFERENT  TYPES AND HOW LIBRARI...WHAT ARE DIGITAL RESOURCES? DISCUSS WHAT ARE DIFFERENT  TYPES AND HOW LIBRARI...
WHAT ARE DIGITAL RESOURCES? DISCUSS WHAT ARE DIFFERENT TYPES AND HOW LIBRARI...`Shweta Bhavsar
 
IRJET- A Survey on File Storage and Retrieval using Blockchain Technology
IRJET- A Survey on File Storage and Retrieval using Blockchain TechnologyIRJET- A Survey on File Storage and Retrieval using Blockchain Technology
IRJET- A Survey on File Storage and Retrieval using Blockchain TechnologyIRJET Journal
 
ICT HRM Internet MIS
ICT HRM Internet MISICT HRM Internet MIS
ICT HRM Internet MISSayeef Khan
 
BlackBerry Workspaces: Integration with Data Loss Prevention (DLP)
BlackBerry Workspaces: Integration with Data Loss Prevention (DLP)BlackBerry Workspaces: Integration with Data Loss Prevention (DLP)
BlackBerry Workspaces: Integration with Data Loss Prevention (DLP)BlackBerry
 
EDRM Foundational e-Discovery Practices-ilta
EDRM Foundational e-Discovery Practices-iltaEDRM Foundational e-Discovery Practices-ilta
EDRM Foundational e-Discovery Practices-iltaDavid Kearney
 
Investigation of Blockchain Based Identity System for Privacy Preserving Univ...
Investigation of Blockchain Based Identity System for Privacy Preserving Univ...Investigation of Blockchain Based Identity System for Privacy Preserving Univ...
Investigation of Blockchain Based Identity System for Privacy Preserving Univ...ijtsrd
 
EXPLAIN REMOTE ACCESS TO LIBRARY RESOURCES? DESCRIBE ANY ONE SOFTWARE AVAILAB...
EXPLAIN REMOTE ACCESS TO LIBRARY RESOURCES? DESCRIBE ANY ONE SOFTWARE AVAILAB...EXPLAIN REMOTE ACCESS TO LIBRARY RESOURCES? DESCRIBE ANY ONE SOFTWARE AVAILAB...
EXPLAIN REMOTE ACCESS TO LIBRARY RESOURCES? DESCRIBE ANY ONE SOFTWARE AVAILAB...`Shweta Bhavsar
 
Interplay of Digital Forensics in eDiscovery
Interplay of Digital Forensics in eDiscoveryInterplay of Digital Forensics in eDiscovery
Interplay of Digital Forensics in eDiscoveryCSCJournals
 
Extending Information Security to Non-Production Environments
Extending Information Security to Non-Production EnvironmentsExtending Information Security to Non-Production Environments
Extending Information Security to Non-Production EnvironmentsLindaWatson19
 
Good Technology Whitepaper: Mobile Content Collaboration
Good Technology Whitepaper: Mobile Content CollaborationGood Technology Whitepaper: Mobile Content Collaboration
Good Technology Whitepaper: Mobile Content CollaborationKirk Donnan
 
Expand ecm acrossorg_empower15
Expand ecm acrossorg_empower15Expand ecm acrossorg_empower15
Expand ecm acrossorg_empower15Christopher Wynder
 
Theodore Zahariadis (Synelixis Solutions): Fundamental Limitation of Current ...
Theodore Zahariadis (Synelixis Solutions): Fundamental Limitation of Current ...Theodore Zahariadis (Synelixis Solutions): Fundamental Limitation of Current ...
Theodore Zahariadis (Synelixis Solutions): Fundamental Limitation of Current ...FIA2010
 
6.1 concepts of information systems
6.1 concepts of information systems6.1 concepts of information systems
6.1 concepts of information systemskhairulanuarhasan
 
White Paper - Killing the Shadow Systems
White Paper - Killing the Shadow SystemsWhite Paper - Killing the Shadow Systems
White Paper - Killing the Shadow SystemsNewton Day Uploads
 
A Novel Framework to Improve Secure Digital Library at Cloud Environment
A Novel Framework to Improve Secure Digital Library at Cloud EnvironmentA Novel Framework to Improve Secure Digital Library at Cloud Environment
A Novel Framework to Improve Secure Digital Library at Cloud EnvironmentIJCSIS Research Publications
 

Tendances (20)

A Novel Information Accountability Framework for Cloud Computing
A Novel Information Accountability Framework for Cloud ComputingA Novel Information Accountability Framework for Cloud Computing
A Novel Information Accountability Framework for Cloud Computing
 
Ijsrp p5211
Ijsrp p5211Ijsrp p5211
Ijsrp p5211
 
‘Personal data literacies’: A critical literacies approach to enhancing under...
‘Personal data literacies’: A critical literacies approach to enhancing under...‘Personal data literacies’: A critical literacies approach to enhancing under...
‘Personal data literacies’: A critical literacies approach to enhancing under...
 
AMCTO presentation on moving from records managment to information management
AMCTO presentation on moving from records managment to information managementAMCTO presentation on moving from records managment to information management
AMCTO presentation on moving from records managment to information management
 
ThinkDox implementation whitepaper for ECM
ThinkDox implementation whitepaper for ECMThinkDox implementation whitepaper for ECM
ThinkDox implementation whitepaper for ECM
 
WHAT ARE DIGITAL RESOURCES? DISCUSS WHAT ARE DIFFERENT TYPES AND HOW LIBRARI...
WHAT ARE DIGITAL RESOURCES? DISCUSS WHAT ARE DIFFERENT  TYPES AND HOW LIBRARI...WHAT ARE DIGITAL RESOURCES? DISCUSS WHAT ARE DIFFERENT  TYPES AND HOW LIBRARI...
WHAT ARE DIGITAL RESOURCES? DISCUSS WHAT ARE DIFFERENT TYPES AND HOW LIBRARI...
 
IRJET- A Survey on File Storage and Retrieval using Blockchain Technology
IRJET- A Survey on File Storage and Retrieval using Blockchain TechnologyIRJET- A Survey on File Storage and Retrieval using Blockchain Technology
IRJET- A Survey on File Storage and Retrieval using Blockchain Technology
 
ICT HRM Internet MIS
ICT HRM Internet MISICT HRM Internet MIS
ICT HRM Internet MIS
 
BlackBerry Workspaces: Integration with Data Loss Prevention (DLP)
BlackBerry Workspaces: Integration with Data Loss Prevention (DLP)BlackBerry Workspaces: Integration with Data Loss Prevention (DLP)
BlackBerry Workspaces: Integration with Data Loss Prevention (DLP)
 
EDRM Foundational e-Discovery Practices-ilta
EDRM Foundational e-Discovery Practices-iltaEDRM Foundational e-Discovery Practices-ilta
EDRM Foundational e-Discovery Practices-ilta
 
Investigation of Blockchain Based Identity System for Privacy Preserving Univ...
Investigation of Blockchain Based Identity System for Privacy Preserving Univ...Investigation of Blockchain Based Identity System for Privacy Preserving Univ...
Investigation of Blockchain Based Identity System for Privacy Preserving Univ...
 
EXPLAIN REMOTE ACCESS TO LIBRARY RESOURCES? DESCRIBE ANY ONE SOFTWARE AVAILAB...
EXPLAIN REMOTE ACCESS TO LIBRARY RESOURCES? DESCRIBE ANY ONE SOFTWARE AVAILAB...EXPLAIN REMOTE ACCESS TO LIBRARY RESOURCES? DESCRIBE ANY ONE SOFTWARE AVAILAB...
EXPLAIN REMOTE ACCESS TO LIBRARY RESOURCES? DESCRIBE ANY ONE SOFTWARE AVAILAB...
 
Interplay of Digital Forensics in eDiscovery
Interplay of Digital Forensics in eDiscoveryInterplay of Digital Forensics in eDiscovery
Interplay of Digital Forensics in eDiscovery
 
Extending Information Security to Non-Production Environments
Extending Information Security to Non-Production EnvironmentsExtending Information Security to Non-Production Environments
Extending Information Security to Non-Production Environments
 
Good Technology Whitepaper: Mobile Content Collaboration
Good Technology Whitepaper: Mobile Content CollaborationGood Technology Whitepaper: Mobile Content Collaboration
Good Technology Whitepaper: Mobile Content Collaboration
 
Expand ecm acrossorg_empower15
Expand ecm acrossorg_empower15Expand ecm acrossorg_empower15
Expand ecm acrossorg_empower15
 
Theodore Zahariadis (Synelixis Solutions): Fundamental Limitation of Current ...
Theodore Zahariadis (Synelixis Solutions): Fundamental Limitation of Current ...Theodore Zahariadis (Synelixis Solutions): Fundamental Limitation of Current ...
Theodore Zahariadis (Synelixis Solutions): Fundamental Limitation of Current ...
 
6.1 concepts of information systems
6.1 concepts of information systems6.1 concepts of information systems
6.1 concepts of information systems
 
White Paper - Killing the Shadow Systems
White Paper - Killing the Shadow SystemsWhite Paper - Killing the Shadow Systems
White Paper - Killing the Shadow Systems
 
A Novel Framework to Improve Secure Digital Library at Cloud Environment
A Novel Framework to Improve Secure Digital Library at Cloud EnvironmentA Novel Framework to Improve Secure Digital Library at Cloud Environment
A Novel Framework to Improve Secure Digital Library at Cloud Environment
 

Similaire à WatchDox CDCR CaseStudy Dec2014

Cloudciti Enterprise File Share (EFS)
Cloudciti Enterprise File Share (EFS)Cloudciti Enterprise File Share (EFS)
Cloudciti Enterprise File Share (EFS)PT Datacomm Diangraha
 
Cloudciti Enterprise File Share Services
Cloudciti Enterprise File Share ServicesCloudciti Enterprise File Share Services
Cloudciti Enterprise File Share ServicesPT Datacomm Diangraha
 
ISSC340_Presentation_Ronald_Averion.pptxNAME Ronald Averi.docx
ISSC340_Presentation_Ronald_Averion.pptxNAME Ronald Averi.docxISSC340_Presentation_Ronald_Averion.pptxNAME Ronald Averi.docx
ISSC340_Presentation_Ronald_Averion.pptxNAME Ronald Averi.docxchristiandean12115
 
BlackBerry Workspaces: Solutions for Healthcare
BlackBerry Workspaces: Solutions for HealthcareBlackBerry Workspaces: Solutions for Healthcare
BlackBerry Workspaces: Solutions for HealthcareBlackBerry
 
Simplifying Data Governance and Security with a Logical Data Fabric (ASEAN)
Simplifying Data Governance and Security with a Logical Data Fabric (ASEAN)Simplifying Data Governance and Security with a Logical Data Fabric (ASEAN)
Simplifying Data Governance and Security with a Logical Data Fabric (ASEAN)Denodo
 
Distributed Semantic Search System (DSSS)
Distributed Semantic Search System (DSSS)Distributed Semantic Search System (DSSS)
Distributed Semantic Search System (DSSS)Isuru Vincent
 
Document Management System or Digital Folder.pptx
Document Management System or Digital Folder.pptxDocument Management System or Digital Folder.pptx
Document Management System or Digital Folder.pptxBIS Safety
 
Soonr IT Buyer's Guide
Soonr IT Buyer's GuideSoonr IT Buyer's Guide
Soonr IT Buyer's GuideReece Gaumont
 
6 Signs Your RMS Needs a Digital Facelift
6 Signs Your RMS Needs a Digital Facelift6 Signs Your RMS Needs a Digital Facelift
6 Signs Your RMS Needs a Digital FaceliftNandini839089
 
Filr white paper
Filr white paperFilr white paper
Filr white paperNovell
 
Ieeepro techno solutions 2011 ieee dotnet project -secure role based data
Ieeepro techno solutions   2011 ieee dotnet project -secure role based dataIeeepro techno solutions   2011 ieee dotnet project -secure role based data
Ieeepro techno solutions 2011 ieee dotnet project -secure role based dataASAITHAMBIRAJAA
 
Ieeepro techno solutions 2011 ieee java project -secure role based data
Ieeepro techno solutions   2011 ieee java project -secure role based dataIeeepro techno solutions   2011 ieee java project -secure role based data
Ieeepro techno solutions 2011 ieee java project -secure role based datahemanthbbc
 
Secure Enterprise File Sharing and Mobile Content Management
Secure Enterprise File Sharing and Mobile Content ManagementSecure Enterprise File Sharing and Mobile Content Management
Secure Enterprise File Sharing and Mobile Content ManagementBlackBerry
 
BlackBerry Workspaces: Solutions for Energy & Utilities
BlackBerry Workspaces: Solutions for Energy & UtilitiesBlackBerry Workspaces: Solutions for Energy & Utilities
BlackBerry Workspaces: Solutions for Energy & UtilitiesBlackBerry
 
IRJET- Proficient Public Substantiation of Data Veracity for Cloud Storage th...
IRJET- Proficient Public Substantiation of Data Veracity for Cloud Storage th...IRJET- Proficient Public Substantiation of Data Veracity for Cloud Storage th...
IRJET- Proficient Public Substantiation of Data Veracity for Cloud Storage th...IRJET Journal
 
Paperless office
Paperless officePaperless office
Paperless officeLogicalDOC
 

Similaire à WatchDox CDCR CaseStudy Dec2014 (20)

Cloudciti Enterprise File Share (EFS)
Cloudciti Enterprise File Share (EFS)Cloudciti Enterprise File Share (EFS)
Cloudciti Enterprise File Share (EFS)
 
Cloudciti Enterprise File Share Services
Cloudciti Enterprise File Share ServicesCloudciti Enterprise File Share Services
Cloudciti Enterprise File Share Services
 
ISSC340_Presentation_Ronald_Averion.pptxNAME Ronald Averi.docx
ISSC340_Presentation_Ronald_Averion.pptxNAME Ronald Averi.docxISSC340_Presentation_Ronald_Averion.pptxNAME Ronald Averi.docx
ISSC340_Presentation_Ronald_Averion.pptxNAME Ronald Averi.docx
 
BlackBerry Workspaces: Solutions for Healthcare
BlackBerry Workspaces: Solutions for HealthcareBlackBerry Workspaces: Solutions for Healthcare
BlackBerry Workspaces: Solutions for Healthcare
 
Simplifying Data Governance and Security with a Logical Data Fabric (ASEAN)
Simplifying Data Governance and Security with a Logical Data Fabric (ASEAN)Simplifying Data Governance and Security with a Logical Data Fabric (ASEAN)
Simplifying Data Governance and Security with a Logical Data Fabric (ASEAN)
 
Distributed Semantic Search System (DSSS)
Distributed Semantic Search System (DSSS)Distributed Semantic Search System (DSSS)
Distributed Semantic Search System (DSSS)
 
Encrypt-Everything-eB.pdf
Encrypt-Everything-eB.pdfEncrypt-Everything-eB.pdf
Encrypt-Everything-eB.pdf
 
Wp security-data-safe
Wp security-data-safeWp security-data-safe
Wp security-data-safe
 
I42024349
I42024349I42024349
I42024349
 
Document Management System or Digital Folder.pptx
Document Management System or Digital Folder.pptxDocument Management System or Digital Folder.pptx
Document Management System or Digital Folder.pptx
 
Soonr IT Buyer's Guide
Soonr IT Buyer's GuideSoonr IT Buyer's Guide
Soonr IT Buyer's Guide
 
What is killing ecm
What is killing ecmWhat is killing ecm
What is killing ecm
 
6 Signs Your RMS Needs a Digital Facelift
6 Signs Your RMS Needs a Digital Facelift6 Signs Your RMS Needs a Digital Facelift
6 Signs Your RMS Needs a Digital Facelift
 
Filr white paper
Filr white paperFilr white paper
Filr white paper
 
Ieeepro techno solutions 2011 ieee dotnet project -secure role based data
Ieeepro techno solutions   2011 ieee dotnet project -secure role based dataIeeepro techno solutions   2011 ieee dotnet project -secure role based data
Ieeepro techno solutions 2011 ieee dotnet project -secure role based data
 
Ieeepro techno solutions 2011 ieee java project -secure role based data
Ieeepro techno solutions   2011 ieee java project -secure role based dataIeeepro techno solutions   2011 ieee java project -secure role based data
Ieeepro techno solutions 2011 ieee java project -secure role based data
 
Secure Enterprise File Sharing and Mobile Content Management
Secure Enterprise File Sharing and Mobile Content ManagementSecure Enterprise File Sharing and Mobile Content Management
Secure Enterprise File Sharing and Mobile Content Management
 
BlackBerry Workspaces: Solutions for Energy & Utilities
BlackBerry Workspaces: Solutions for Energy & UtilitiesBlackBerry Workspaces: Solutions for Energy & Utilities
BlackBerry Workspaces: Solutions for Energy & Utilities
 
IRJET- Proficient Public Substantiation of Data Veracity for Cloud Storage th...
IRJET- Proficient Public Substantiation of Data Veracity for Cloud Storage th...IRJET- Proficient Public Substantiation of Data Veracity for Cloud Storage th...
IRJET- Proficient Public Substantiation of Data Veracity for Cloud Storage th...
 
Paperless office
Paperless officePaperless office
Paperless office
 

Plus de joepanora

SOMS HP case study 2014
SOMS HP case study 2014SOMS HP case study 2014
SOMS HP case study 2014joepanora
 
McAfee CDCR Case Study
McAfee CDCR Case StudyMcAfee CDCR Case Study
McAfee CDCR Case Studyjoepanora
 
CDRC Oracle exadata final case-study
CDRC Oracle exadata final case-studyCDRC Oracle exadata final case-study
CDRC Oracle exadata final case-studyjoepanora
 
CDRC Oracle exadata final case-study
CDRC Oracle exadata final case-studyCDRC Oracle exadata final case-study
CDRC Oracle exadata final case-studyjoepanora
 
Cdcr oracle exadata case study
Cdcr oracle exadata case  studyCdcr oracle exadata case  study
Cdcr oracle exadata case studyjoepanora
 
Cdcr oracle exadata case study
Cdcr oracle exadata case  studyCdcr oracle exadata case  study
Cdcr oracle exadata case studyjoepanora
 
V mware cdcr-11-q3-en-case-study
V mware cdcr-11-q3-en-case-studyV mware cdcr-11-q3-en-case-study
V mware cdcr-11-q3-en-case-studyjoepanora
 
Troux case study cdcr
Troux case study cdcrTroux case study cdcr
Troux case study cdcrjoepanora
 
Microsoft share point final case study
Microsoft share point final case studyMicrosoft share point final case study
Microsoft share point final case studyjoepanora
 
Delegata cdcr ea best fit press release 8 5 11
Delegata cdcr ea best fit press release 8 5 11Delegata cdcr ea best fit press release 8 5 11
Delegata cdcr ea best fit press release 8 5 11joepanora
 
Cdcr hp networking
Cdcr hp networkingCdcr hp networking
Cdcr hp networkingjoepanora
 
Cdcr verdiem case study_final
Cdcr verdiem case study_finalCdcr verdiem case study_final
Cdcr verdiem case study_finaljoepanora
 
GTC West 2011 - CDCR\'s IT Strategic Plan Presentation
GTC West 2011 - CDCR\'s IT Strategic Plan PresentationGTC West 2011 - CDCR\'s IT Strategic Plan Presentation
GTC West 2011 - CDCR\'s IT Strategic Plan Presentationjoepanora
 
Gtc West 2011 It Strategic Plan Presentation
Gtc West 2011 It Strategic Plan PresentationGtc West 2011 It Strategic Plan Presentation
Gtc West 2011 It Strategic Plan Presentationjoepanora
 

Plus de joepanora (14)

SOMS HP case study 2014
SOMS HP case study 2014SOMS HP case study 2014
SOMS HP case study 2014
 
McAfee CDCR Case Study
McAfee CDCR Case StudyMcAfee CDCR Case Study
McAfee CDCR Case Study
 
CDRC Oracle exadata final case-study
CDRC Oracle exadata final case-studyCDRC Oracle exadata final case-study
CDRC Oracle exadata final case-study
 
CDRC Oracle exadata final case-study
CDRC Oracle exadata final case-studyCDRC Oracle exadata final case-study
CDRC Oracle exadata final case-study
 
Cdcr oracle exadata case study
Cdcr oracle exadata case  studyCdcr oracle exadata case  study
Cdcr oracle exadata case study
 
Cdcr oracle exadata case study
Cdcr oracle exadata case  studyCdcr oracle exadata case  study
Cdcr oracle exadata case study
 
V mware cdcr-11-q3-en-case-study
V mware cdcr-11-q3-en-case-studyV mware cdcr-11-q3-en-case-study
V mware cdcr-11-q3-en-case-study
 
Troux case study cdcr
Troux case study cdcrTroux case study cdcr
Troux case study cdcr
 
Microsoft share point final case study
Microsoft share point final case studyMicrosoft share point final case study
Microsoft share point final case study
 
Delegata cdcr ea best fit press release 8 5 11
Delegata cdcr ea best fit press release 8 5 11Delegata cdcr ea best fit press release 8 5 11
Delegata cdcr ea best fit press release 8 5 11
 
Cdcr hp networking
Cdcr hp networkingCdcr hp networking
Cdcr hp networking
 
Cdcr verdiem case study_final
Cdcr verdiem case study_finalCdcr verdiem case study_final
Cdcr verdiem case study_final
 
GTC West 2011 - CDCR\'s IT Strategic Plan Presentation
GTC West 2011 - CDCR\'s IT Strategic Plan PresentationGTC West 2011 - CDCR\'s IT Strategic Plan Presentation
GTC West 2011 - CDCR\'s IT Strategic Plan Presentation
 
Gtc West 2011 It Strategic Plan Presentation
Gtc West 2011 It Strategic Plan PresentationGtc West 2011 It Strategic Plan Presentation
Gtc West 2011 It Strategic Plan Presentation
 

WatchDox CDCR CaseStudy Dec2014

  • 1. “Given today’s business environment, the ability to share and exchange critical information in a secure and timely manner is crucial to sustaining operations.” - Joe Panora, Director of CDCR’s Enterprise Information Services (EIS) As one of the largest state departments in the United States, the California Department of Corrections and Rehabilitation (CDCR) is responsible for administering justice by upholding the integrity and operation of the California state prison and parole system. Inevitably, they retain an array of highly sensitive files, such as inmate and parolee personal details, audio transcription and criminal case information – which they are required by law to provide for casework and trials. CDCR needed a way to securely and easily share such data between the agency and external entities involved in the cases of inmates that need to be processed. Goals CDCR traditionally processed inmate and parolee case files by paper. Even when most of the information was available electronically, much of it was still printed out and sent for processing. In select cases, the information would be encrypted, burned onto a CD and mailed. However, transporting this volume of data to the Board of Parole Hearings stakeholders in time for the scheduled hearing became an issue. To comply with court mandates, CDCR needed a way to accelerate the availability of data for inmates and parolees waiting to be processed. “Given today’s business environment, the ability to share and exchange critical information in a secure and timely manner is crucial to sustaining operations,” explains Joe Panora, Director of CDCR’s Enterprise Information Services (EIS). . . . Customer California Department of Corrections and Rehabilitation (CDCR) operates the state prison and parole system One of the largest state departments in the United States with approximately 57,000 employees Oversees 34 state adult prisons, 3 juvenile facilities, a variety of community correctional facilities, and parole systems Goals Securely share files within the agency and with external entities, such as public defender and private attorneys Implement an easy-to-use solution, evaluated on usability, security and scalability Dynamically control, revoke and track all files shared, even after they are downloaded from the system Deliver various file types including Microsoft Office, PDF and media files in a timely manner Solution Deployed as a cloud service, with 24/7 access to data and the option of transitioning on premise in the future Unparalleled security: Robust DRM, mobile container, optimized rendering and customizable watermarks to ensure that only authorized users can access shared files Users are able to track the document activity of the information they shared without the involvement of IT Benefits Rapidly adopted in the initial pilot by the department of 260 users and foresee strong growth in the future High quality of customized training and guidance from WatchDox in rolling out the solution at scale Option to utilize existing SharePoint and Windows File Share repositories using WatchDox Content Connectors . . . . . . . . . . California Department of Corrections and Rehabilitation (CDCR) Adopts WatchDox for Secure External Collaboration Case Study Government
  • 2. Case Study | Government Page 2 CDCR is using WatchDox as a cloud service for fast deployment and easy scalability with the assured security of the WatchDox solution. With WatchDox, CDCR retains full ownership over its data and can choose to migrate to an on-premise virtual appliance solution, if required in the future. Most importantly, EIS considered the unparalleled security that distinguishes WatchDox in the market. WatchDox has the unique ability to provide true digital rights management (DRM) control of files on all devices, yet the security it provides extends even further. Data is fully encrypted and containerized within WatchDox Mobile Applications on Android and iOS devices, as well as optimized for accurate rendering in the web and mobile viewers. Files marked with “Advanced Rights Management” can be protected even after they are downloaded from the system directly on the desktop as they are used in native Microsoft Office and Adobe Reader applications and can be dynamically revoked regardless of where they reside. Additionally, WatchDox allows file owners and workspace administrators to manage documents and user permissions, including being able to view and download document activity logs for reference in their day-to-day interactions. While IT unsurprisingly wants to track everything, agency users expressed the desire to be able to audit their own data to understand what is being shared by their collaborators for what purpose. Other EFSS solutions only allow system administrators to access tracking information, which would require an IT ticket to be submitted in order to Solution EIS chose WatchDox for enterprise file sync and share (EFSS) after consulting with an analyst from an independent research firm and conducting a proof-of- concept evaluation. They decided that WatchDox best matched the usability and security requirements that CDCR set forth to provide the features that both users wanted and IT needed. CDCR needed a solution to: 1. Securely share files within the agency and with external entities, such as public defenders and private attorneys. 2. Implement an easy-to-use solution, evaluated on usability, security and scalability that could be established as an agency standard. 3. Dynamically control, revoke and track all files shared, even after they are downloaded from the system. 4. Deliver various file types including Microsoft Office, PDF and media files in a timely manner. Internally there are many ways for employees to share data, but when it came to external parties it became extremely difficult while ensuring adequate security was in place. Previous methods of user-provisioning were extremely cumbersome and deterred widespread adoption. “None of the tools that were in place offered the combination of security and customer experience that people have come to expect from modern consumer file sharing applications,” says Scott MacDonald, CDCR’s Information Security Officer.
  • 3. Case Study | Government relay the information.“By putting the power to provision users in the hands of authorized agency employees (i.e. only internal agency super users identified by department are given workspace administrator rights), customers can efficiently and effectively share information while minimizing IT overhead,” explains Dan Marshall an IT security analyst for EIS. In today’s technology environment, mobility must be considered. CDCR knew that they could not overlook the need for mobility in its user base. With integrated access, creation, edit and annotation features built in, WatchDox has that covered. At this time, CDCR does not allow employees to “bring your own device” (BYOD), yet still has a need to support people who are not a part of the department and cannot control how outside users consume data. WatchDox provides a solution where CDCR can adhere to best practices when sharing data across multiple platforms. Benefits Since launching WatchDox, CDCR is seeing rapid adoption in the various lines of business where it is introduced. An added benefit that CDCR found in working with WatchDox is the high quality of customizable training that is offered by WatchDox.When deploying a solution to hundreds and potentially thousands of users, IT departments can easily be overwhelmed dealing with the technical implementation as well as training end users. Rather than assuming the entire burden, CDCR chose to engage WatchDox in administering training to internal agency employees as well as outside entities (public defenders and private attorneys). By leveraging the experience that WatchDox brings to rolling out solutions at scale, CDCR can provide the comprehensive education, resources and support necessary for their complete user base. Page 3 “With integrated access, creation, edit and annotation features built in, WatchDox has [mobility] covered.” Looking towards the future, EIS is evaluating the possibility of extending the security, mobility and collaboration benefits of WatchDox to existing SharePoint and Windows File Share repositories using WatchDox Content Connectors. CDCR currently operates two SharePoint instances, one internal and oneexternal,usedacrosstheorganization.Theexternal instance was originally established with external sharing in mind, but now with WatchDox CDCR can reevaluate its necessity and potentially consolidate systems. CIFS file shares are also presently used to store automatically generated content that needs to be provided to different external departments. Rather than having to pull the data manually from the existing systems to be shared in WatchDox, CDCR is planning to leverage WatchDox Content Connectors to do so dynamically and without duplicating the data. CDCR can now rest assured that regardless of whom their employees are collaborating with and where the data resides, it can always be protected, secured, tracked and revoked with WatchDox.
  • 4. Enterprises share with WatchDox. Learn more at watchdox.com. 299 S. California Ave. #300 Palo Alto, CA 94306 1.800.209.1688 | watchdox.com WatchDox enables organizations to access, protect and control their critical documents wherever they go: on any tablet, smartphone or PC, even those beyond the IT department’s control. With WatchDox technology, organizations can collaborate securely with partners, safely adoptbring-your-own-device(BYOD)initiatives,anddestroy their documents remotely if a device goes missing. More than 100 of the Fortune 1000 including many of the world’s leading financial institutions, manufacturers and government agencies depend on WatchDox secure file-sharing solutions.