Products
e-DRM
Secure confidentiality of important documents!
Build strong document security with e-DRM
“Protect and manage your important documents securely!”
e-DRM (Enterprise Digital Rights Management) is a cutting-edge security solution that safely protects enterprise confidential information, internal documents, and customer data.
Block unauthorized leakage and manage access permissions precisely so only authorized users can access the content!
Our approach
The Impact of e-DRM
With strong encryption and access control features, it prevents document leakage and blocks illegal copying and unauthorized distribution.
By adopting e-DRM, whether internal employees or external partners, only authorized users can use documents with specific permissions. All document usage is logged to help prevent security incidents.
Strong Document Encryption and Protection
e-DRM encrypts important documents to block unauthorized access. Documents remain encrypted even when moved internally or externally, and only authorized users can view their contents. This protects enterprise data from hacking, insider leaks, and data theft.
Granular Access Control and Permission Settings
Document access can be finely controlled per user:
• Some users can have read-only access,
• Others may be allowed to edit,
• Printing and copying can be completely restricted.
This prevents unnecessary information sharing and ensures critical documents are only shared with the right people.
Prevention of Unauthorized Distribution and Screen Capture
Prevents unauthorized sharing or duplication of documents:
• Blocks external sharing via email, USB, or cloud uploads
• Supports screen capture and recording prevention
• Automatically blocks document access by unauthorized users
These features minimize the risk of leakage and enhance protection of sensitive corporate information.
Automatic Expiry and Document Usage Tracking
Documents can be set to expire after a period or retrieved remotely when needed. Audit log functions track who accessed or edited documents and when, enabling rapid detection and response to any security breach.
Powerful Security Features Provided by e-DRM!
The ultimate security solution to protect critical enterprise data and fully control document usage — e-DRM!

Multi-layered Encryption
- Forced Encryption: All files are encrypted regardless of user choice
- Selective Encryption: Only sensitive files are encrypted
- Collaboration Encryption: Provides selective security in collaboration environments
- Real-time encryption of all documents/designs upon process creation
- Encryption method can be applied per individual or department
All documents and drawings are encrypted in real time upon creation.
Encrypted documents cannot be opened by users outside the same domain or document group.
Each document group has a separate key, thoroughly protected by certificates.
Encryption and decryption occur in real time and are very fast.
Standards supported: RSA, X.509, SHA2, ARIA, SEED
Protected file systems: Local disk, network drive, NFS, USB, etc.

Transparent Encryption
-No change to existing work environments
- Business-friendly system with minimal impact on operations
- Users do not notice PKI or encryption
- Real-time encryption of all documents/designs upon process creation
- Encryption method can be applied per individual or department
User experience is unaffected by the existing application environment.
Users only need to log in with a certificate once when launching a secure application.
Works seamlessly with various network storage systems.
Also supports terminal servers and SBC environments.

Non-repudiation
- Prevents denial of internal leakage
- Provides legal evidence in case of unauthorized leakage
- Electronic signatures (Certified Authority / CA)
- Tamper-proof and forgery-proof
- Applies Public Key Infrastructure (PKI)
All user actions are logged.
Each log is signed and verified with the user's private key and stored securely.
Usage logs cannot be tampered with.
Document usage logs: create, read, write, print, decrypt
Audit logs: user authentication, license issuance/revocation
Unauthorized actions: uninstall attempts, attempts to disable the product.
Legally effective under Article 3 of the Electronic Signature Act.

Personal Information Protection
- Forced encryption: Even authorized personnel cannot leak personal data externally
- Selective encryption: Only files containing personal data are protected
- Restricts unauthorized access to personal information documents
- Real-time detection/encryption/logging of personal data
- Supports custom regex patterns for identifying personal information
Detects personal data in files on the PC and encrypts them with authorized access.
Newly created files containing personal information are automatically encrypted by the monitoring agent.
Unauthorized internal staff cannot access personal data files.
Supports logging and statistics on personal data presence.
Enables tailored protection based on organizational regex patterns.

Content Protection Function
- Prevents copying content from secure applications to general applications
- Allows free content flow between secure applications
- Prevents content leaks via bulletin boards, messengers, emails
- Prevents screen capture of document or drawing content
- Allows control over copy-paste sizes (e.g., 128 Bytes, 1024 Bytes)

Watermarking Feature
- Inserts watermarks during document printing.
- Allows insertion of information at desired position and opacity.
- Applies watermark and encryption to printed image files.
- Supports all types of printers.
- Enables watermark configuration by department or individual.

Secure Document Approval System Provided by Default
- Allows secure legal document export via approval system.
- Sends secure document links by email for external download.
- Approval workflows can be configured to suit the organization.
- Usage and export statistics allow for pattern analysis.
- Only ShadowCube provides this approval system by default.