Today organizations have access to more technology and information than ever before. Xerox® DocuShare® is designed to maximize this potential; a content management platform to take workgroups further to minimize the hassle and frustration of manual workflows.
Empower workflows
With DocuShare every user is empowered to do more by automating repetitive tasks which eliminate inefficient and error-prone steps that waste time and money. Plus, intuitive workflows can be created to send notifications, automatically route files to the correct location, even manage the lifecycle freeing up users for more productive tasks.
Beyond the office
Collaborate with team members and external parties anywhere, anytime. Sharing documents and workflows is easy and secure, allowing your organization to control access in a granular way. This means work can be conducted collaboratively without any compromises to your data privacy and security.
Protect your business
DocuShare is built to secure the valuable content trusted to it. Whether you choose cloud or localized hosting, robust access controls ensure only authorized users see the content available to them. Additionally, it automates the review, update and disposal of your business-critical documents, ensuring auditing and compliance is a simpler and easier exercise.
How do you ready your business processes to be primed for growth?
Digital content is essential to getting work done whatever form it takes –documents, forms, images, video… With team members and key stakeholders increasingly distributed, Xerox® DocuShare® offers the ideal central content management platform to start your digital transformation journey. DocuShare makes it easy to start digitizing paper files and automating key processes to reduce manual tasks and allow individuals in any location to access the content they need.
Seamless digital transformation
Existing paper-based stepped processes can progressively be digitized to flow into company procedures to avoid disruption. DocuShare easily assimilates files from multifunction printers, desktop scanners, even mobile devices and, once converted, all your files are now unleashed for workflow automation.
Transform to a better way
Together with DocuShare, new digital work processes are created easily to help remove the need for paper. Amongst other benefits this eliminates the time, cost, errors and shortfalls of manual data entry. Instead deploy efficient, intuitive, mobile-friendly webforms to make completely digitalized, automated workflows such as sales orders, job applications, expense reimbursements and more.
Connect and collaborate
Whether you choose cloud hosting or manage it yourself, content is secure and accessible anytime, anywhere on any device to colleagues and beyond. As no business is an island, extend outside your organization to third parties with peace of mind that access permissions ensure you only share what you want.
Xerox® DocuShare® – Transform processes and make work… flow for an enhanced and resilient business.
Why DocuShare?
Xerox® DocuShare® offers the ideal central content management platform for your digital transformation. DocuShare makes it easy to start digitizing paper files and automating key processes to reduce manual tasks and to allow employees and external stakeholders in any location to access the content they need.
DocuShare at a glance
Capture structured and unstructured content simply and seamlessly to help your office go digital.
Manage information and compliance easily – categorize, store and organize business content throughout its lifecycle.
Collaborate better and promote communication through document-level collaboration capabilities that help teams work more efficiently.
Keep information secure, protect sensitive data and minimize your organization’s risk with auditable tracking, reporting and retention.
Access anything, anytime, anywhere with powerful search capabilities to find business-critical content on any device.
Benefits of DocuShare
Progressive digital transformation
With DocuShare, you can easily build new work processes that reduce paper, eliminating the lengthy & error-prone shortfalls of manual data entry. Plus, efficient, intuitive, mobile-friendly webforms can be deployed to create completely digitalized, automated workflows such as sales orders, job applications, expense reimbursements, etc.
Connect and collaborate
With DocuShare content is accessible anytime, anywhere on any device to colleagues and beyond. As no business is an island, extend outside your organization to third parties with peace of mind that access permissions ensure you only share what you want.
Valuable content secured
Whether you choose cloud or localized hosting, robust access controls ensure only authorized users see the content available to them. Additionally, it automates the review, update and disposal of your business-critical documents, ensuring auditing and compliance is a simpler and easier exercise.
Get in touch and find out how our content management specialists can implement a DocuShare solution to optimize your workflow and future-proof your organization.
Case Studies
How DocuShare helped a 99-year-old furniture maker digitize 500,000 documents
Change is hard when you’ve been around as long as Fairfield Chair. But the company knew it needed to transform its workplace processes to stay on top in the digital age.
How DocuShare helped financial services break free from paper
See how financial services firm, Freedman & Co., used DocuShare to digitize and easily manage volumes of sensitive client files, ultimately helping spur a decade of growth.
Source: G2 Spring 2021 Reports and Spring 2021 ECM Emotional Footprint report from SoftwareReviews, G2 is a division of IT research and consulting firm Info-Tech Research Group.
Network security challenges have evolved significantly over the years as users have become increasingly decentralized and attacks have become more sophisticated and persistent. Traditional security approaches that focused primarily on the perimeter of the network have become ineffective as standalone security strategies. Modern network security must accommodate an ever-changing, diverse set of users and devices, as well as much more prevalent threats targeting previously “trusted” parts of the network infrastructure. Zero Trust has emerged as an effective model to better address the changing security requirements for the modern enterprise by assuming that all users, devices, servers, and network segments are inherently insecure and potentially hostile. Aruba ESP with Zero Trust Security improves the overall network security posture by applying a more rigorous set of security best practices and controls to previously trusted network resources.
ARUBA ESP: CORE ZERO TRUST PRINCIPLES
Zero Trust varies significantly depending on which domain of security is being considered. Although application-level controls have been a focal point within Zero Trust, a comprehensive strategy must also encompass network security and the growing number of connected devices, including the work from home environment. Aruba ESP with Zero Trust Security incorporates comprehensive visibility, least access micro segmentation and control, as well as continuous monitoring and enforcement. Even traditional VPN solutions are enhanced by ensuring that the same controls applied to campus or branch networks, also extend to the home or remote worker. In the age of IoT, basic principles of good network security are often difficult to implement. When possible, all devices and users should be identified and properly authenticated before granting them network access. In addition to authentication, users and devices should be given the least amount of access necessary to perform their business-critical activities once they’re on the network. This means authorizing which network resources and applications any given user or device can access. Finally, all communications between end users and applications should be encrypted.
ARUBA ESP: ADOPTING “LEAST ACCESS” AND MICRO SEGMENTATION
Once visibility is in place, applying Zero Trust best practices related to “Least Access” and micro segmentation are critical next steps. This means using the best authentication method possible for each endpoint on the network (i.e. full 802.1X and multi-factor authentication for user devices) and applying an access control policy that only authorizes access to resources that are absolutely necessary for that device or user. Aruba ClearPass Policy Manager enables the creation of role-based access policies that enable IT and security teams to operationalize these best practices using a single role and associated access privileges that are applied anywhere on the network – wired or wireless infrastructure, in branch or on campus. Once profiled, devices are automatically assigned the proper access control policy and segmented from other devices via Aruba’s Dynamic Segmentation capabilities. Enforcement is provided by Aruba’s Policy Enforcement Firewall (PEF), a full application firewall that is embedded in Aruba network infrastructure. Aruba infrastructure also utilizes the most secure encryption protocols such as the WPA3 standard over wireless network connections.
ClearPass Policy Manager also integrates with a wide variety of authentication solutions enabling the use of multi-factor authentication and the ability to force re-authentication at key points throughout the network. Through the ClearPass ecosystem, customers can also easily incorporate other solutions to meet Zero Trust requirements related to contextual information and other security telemetry. This means ClearPass can integrate with a wide variety of solutions such as Endpoint Security tools to make more intelligent access control decisions based on a device’s posture. Access control policies can also be changed based on which type of device is being used, where the user is connecting from, and other context-based criteria.
CONTINUOUS MONITORING AND ENFORCEMENT
With role-based access control in place to enforce granular segmentation, ongoing monitoring of users and devices on the network make up another Zero Trust best practice. This addresses risks related to insider threats, advanced malware, or persistent threats that have circumvented traditional perimeter defenses.
Engage with our presales specialists by contacting us on info@ccs.al for more details
RUT950 is a professional industrial 4G/LTE WiFi router for IoT applications. This rugged mobile device delivers high performance cellular communication in harsh environments and a wide operating temperature range. It is also compatible with RMS – Teltonika‘s remote management platform that is ready to deliver the true value of M2M and IoT networking applications.
The router is equipped with four Ethernet ports, two external SIM holders, digital input/output and signal strength status LED indicators, while external SMA connectors make it possible to attach desired antennas. RUT950 is a professional LTE CAT4 router empowered by RutOS – a unified operating system for all Teltonika routers, created for the most demanding mobile networking applications. Ensure your business continuity with Dual-SIM and 4G failover. more
MOBILE
Mobile module
4G (LTE) – Cat 4 up to 150 Mbps, 3G – Up to 42 Mbps, 2G – Up to 236.8 kbps
SIM switch
2 SIM cards, auto-switch cases: weak signal, data limit, SMS limit, roaming, no network, network denied, data connection fail, SIM idle protection
Status
Signal strength, SINR, RSRP, RSRQ, Bytes sent/received
Bridge
Direct connection (bridge) between mobile ISP and device on LAN
Passthrough
Router assigns its mobile WAN IP address to another device on LAN
APN
Auto APN
SMS
SMS status, SMS configuration, send/read SMS via HTTP POST/GET, EMAIL to SMS, SMS to EMAIL, SMS to HTTP, SMS to SMS, scheduled SMS, SMS autoreply, SMPP
Black/White list
Operator black/white list
Multiple PDN (optional)
Possibility to use different PDNs for multiple network access and services
Band management
Band lock, Used band status display
WIRELESS
Wireless mode
IEEE 802.11b/g/n, Access Point (AP), Station (STA)
WiFi
WPA2-Enterprise (with external/internal Radius server), WPA2-PSK, WPA-PSK, WEP, MAC Filter
IKEv1, IKEv2, supports up to 4 x VPN IPsec tunnels (instances), with 5 encryption methods (DES, 3DES, AES128, AES192, AES256)
GRE
GRE tunnel
PPTP, L2TP
Client/Server services can run simultaneously
Stunnel
Proxy designed to add TLS encryption functionality to existing clients and servers without any changes in the programs’ code
SSTP
SSTP client instance support
ZeroTier
ZeroTier VPN
MODBUS
MODBUS TCP SLAVE
ID range
1-255
Allow Remote Access
Allow access through WAN
Custom registers
Modbus TCP custom register block requests, which read/write to a file inside the router, and can be used to extend Modbus TCP Slave functionality
MODBUS TCP MASTER
Supported functions
01, 02, 03, 04, 05, 06, 15, 16
Supported data formats
8 bit: INT, UINT; 16 bit: INT, UINT (MSB or LSB first); 32 bit float (Big endian, Big endian with byte-swapped, Little endian, Little endian with byte-swapped)
MODBUS DATA TO SERVER
Protocol
HTTP(S), MQTT, Azure MQTT
MQTT GATEWAY
MQTT gateway
Allows sending commands and receiving data from Modbus Master through MQTT broker
Allows monitoring of: Device data, Mobile data, Network info, Availability
ThingWorx
Allows monitoring of: WAN Type, WAN IP Mobile Operator Name, Mobile Signal Strength, Mobile Network Type
Cumulocity
Allows monitoring of: Device Model, Revision and Serial Number, Mobile Cell ID, ICCID, IMEI, Connection Type, Operator, Signal Strength, WAN Type and IP
Azure IoT Hub
Can send device IP, Number of bytes send/received/ 3G connection state, Network link state, IMEI, ICCID, Model, Manufacturer, Serial, Revision, IMSI, Sim State, PIN state, GSM signal, WCDMA RSCP WCDMA EC/IO, LTE RSRP, LTE SINR, LTE RSRQ, CELL ID, Operator, Operator number, Connection type, Temperature, PIN count to Azure IoT Hub server
SYSTEM CHARACTERISTICS
CPU
Atheros Wasp, MIPS 74Kc, 550 MHz
RAM
128 MB, DDR2
FLASH memory
16 MB SPI Flash
FIRMWARE / CONFIGURATION
WEB UI
Update FW from file, check FW on server, configuration profiles, configuration backup, restore point
FOTA
Update FW/configuration from server
RMS
Update FW/configuration for multiple devices
Keep settings
Update FW without losing current configuration
FIRMWARE CUSTOMIZATION
Operating system
RutOS (OpenWrt based Linux OS)
Supported languages
Busybox shell, Lua, C, C++
Development tools
SDK package with build environment provided
INPUT/OUTPUT
Input
1 x Digital non-isolated input (on 4 pin power connector)
Output
1 x Digital open collector output (30 V, 300 mA, on 4 pin power connector)
Compact but powerful 4G /LTE & WiFi cellular router with Ethernet and I/O. Great for quick deployment in mission critical IoT applications where advanced Networking, VPN and security features are needed.
RUT240 is a compact, cost-effective and secure industrial 4G/LTE WiFi router for professional applications. The mobile router delivers high performance for mission-critical cellular communication in harsh and hazardous environments where a wide operating temperature is required. Equipped with an external SIM holder, digital input/output and signal strength status LEDs, it ensures easy network deployment and management. External SMA connectors make it possible to attach desired antennas and easily find the best signal location. RUT240 Industrial LTE router supports industry leading security features and is widely used for 4G backup, Remote Connection, Out-of-Band Management, Advanced VPN and tunneling services in IoT networking solutions, details here
MOBILE
Mobile module
4G (LTE) – Cat 4 up to 150 Mbps, 3G – Up to 42 Mbps, 2G – Up to 236.8 kbps
Status
Signal strength (RSSI), SINR, RSRP, RSRQ, EC/IO, RSCP Bytes sent/received
Bridge
Direct connection (bridge) between mobile ISP and device on LAN
Passthrough
Router assigns its mobile WAN IP address to another device on LAN
APN
Auto APN
SMS
SMS status, SMS configuration, send/read SMS via HTTP POST/GET, EMAIL to SMS, SMS to EMAIL, SMS to HTTP, SMS to SMS, scheduled SMS, SMS autoreply, SMPP
Black/White list
Operator black/white list
Multiple PDN (optional)
Possibility to use different PDNs for multiple network access and services
Band management
Band lock, Used band status display
WIRELESS
Wireless mode
IEEE 802.11b/g/n, Access Point (AP), Station (STA)
WiFi
WPA2-Enterprise (with external/internal Radius server), WPA2-PSK, WPA-PSK, WEP, MAC Filter
TCP, UDP, IPv4, IPv6, ICMP, NTP, DNS, HTTP, HTTPS, FTP, SMTP, SSL v3, TLS, ARP, VRRP, PPP, PPPoE, UPnP, SSH, DHCP, Telnet, SMNP, MQTT, Wake On Lan (WOL)
VoIP passthrough support
H.323 and SIP-alg protocol NAT helpers, allowing proper routing of VoIP packets
Connection monitoring
Ping Reboot, Periodic Reboot, LCP and ICMP for link inspection
Firewall
Port forward, traffic rules, custom rules
DHCP
Static and dynamic IP allocation, DHCP Relayd
QoS
Traffic priority queuing by source/destination, service, protocol or port, traffic priority queuing by source/destination, service, protocol or port, WMM, 802.11e
IKEv1, IKEv2, supports up to 4 x VPN IPsec tunnels (instances), with 5 encryption methods (DES, 3DES, AES128, AES192, AES256)
GRE
GRE tunnel
PPTP, L2TP
Client/Server services can run simultaneously
Stunnel
Proxy designed to add TLS encryption functionality to existing clients and servers without any changes in the programs’ code
SSTP
SSTP client instance support
ZeroTier
ZeroTier VPN
MODBUS
MODBUS TCP SLAVE
ID range
1-255
Allow Remote Access
Allow access through WAN
Custom registers
Modbus TCP custom register block requests, which read/write to a file inside the router, and can be used to extend Modbus TCP Slave functionality
MODBUS TCP MASTER
Supported functions
01, 02, 03, 04, 05, 06, 15, 16
Supported data formats
8 bit: INT, UINT; 16 bit: INT, UINT (MSB or LSB first); 32 bit float (Big endian, Big endian with byte-swapped, Little endian, Little endian with byte-swapped)
MODBUS DATA TO SERVER
Protocol
HTTP(S), MQTT, Azure MQTT
MQTT GATEWAY
MQTT gateway
Allows sending commands and receiving data from Modbus Master through MQTT broker
Allows monitoring of: Device data, Mobile data, Network info, Availability
ThingWorx
Allows monitoring of: WAN Type, WAN IP Mobile Operator Name, Mobile Signal Strength, Mobile Network Type
Cumulocity
Allows monitoring of: Device Model, Revision and Serial Number, Mobile Cell ID, ICCID, IMEI, Connection Type, Operator, Signal Strength, WAN Type and IP
Azure IoT Hub
Can send device IP, Number of bytes send/received/ 3G connection state, Network link state, IMEI, ICCID, Model, Manufacturer, Serial, Revision, IMSI, Sim State, PIN state, GSM signal, WCDMA RSCP WCDMA EC/IO, LTE RSRP, LTE SINR, LTE RSRQ, CELL ID, Operator, Operator number, Connection type, Temperature, PIN count to Azure IoT Hub server
SYSTEM CHARACTERISTICS
CPU
Atheros Hornet, MIPS 24Kc, 400 MHz
RAM
64 MB, DDR2
FLASH memory
16 MB SPI Flash
FIRMWARE / CONFIGURATION
WEB UI
Update FW from file, check FW on server, configuration profiles, configuration backup, restore point
FOTA
Update FW/configuration from server
RMS
Update FW/configuration for multiple devices
Keep settings
Update FW without losing current configuration
FIRMWARE CUSTOMIZATION
Operating system
RutOS (OpenWrt based Linux OS)
Supported languages
Busybox shell, Lua, C, C++
Development tools
SDK package with built environment provided
INPUT/OUTPUT
Input
1 x Digital non-isolated input (on 4 pin power connector)
Output
1 x Digital open collector output (30 V, 300 mA, on 4 pin power connector)
Passive PoE over spare pairs (available from HW revision 0007 and batch number 0010). Possibility to power up through LAN port, not compatible with IEEE802.3af and 802.3at