CIFKM /(ECM) Enterprise Content Management with sync - Advanced Document Management
See more functions from CIFKM

What is CIFKM?

The purpose of CIFKM is to be the answer to corporate needs for sharing information and team working, for preserving confidentiality, storage, retention, security, synchronization, version control, document routing…And much more.

Starting from the old concept of filing cabinets, CIFKM has developed the concept of “Data Smart Boxes” (DSB) with current technology.

Each DSB is a smart filing cabinet, a flexible and autonomous multifunctional software unit, that can be used, either as simple container with advanced user-right management for sharing files and folders, with links to other DSB, links to external applications through an API, attributes taken from internal and external databases, either incorporating customized automatic behaviours, either representing single states of a process, or any combination of the foregoing.

Any authorized user can create a new DBS for any subject matter when it’s needed with the aid of DSB templates; each of them suited for a specific sort of DSB, that defines the layout, types of content, specific automatic behaviors, links to other applications through an API, and attributes taken from internal or external databases doing duty as metadata. All texts are indexed except those user has encrypted.

Adaptability and flexibility for customizing and meeting corporate needs are some of its main features.

CIFKM runs on real or virtual servers on external databases of the clients: Oracle, SQLServer, PostgreSQL, Firebird … By default it is installed on PostgreSQL which is free.

Thanks to CIFKM:

1.- Companies can prevent dispersion, leaks and loss of information. Not finding something is to lose it

Many companies have not yet abandoned traditional filing systems on disks. Many others are still halfway because they do not yet apply advanced solutions for sharing, for preventing information leaks, and for easily retrieving information. Structured information, although it may be critical to business, very often is scattered and uncontrolled in local networks, in disks, and in email managers of Company staff. Thus, information leaks are inevitable, locating and retrieving information may, not only be bothersome, but a waste of time especially if one has forgotten where it’s saved, or isn’t aware of its existence. Besides, oodles of information are in risk of being lost when Company is restructured or people simply leave.

A person alone can work saving files in his own PC disk, in cloud systems (eg Google Drive, Dropbox), or in a network server, classifying contents in folders and subfolders.

However, an “Enterprise Content Manager” with a database is a must for any Company. These ones can’t retain the information generated by their whole staff along the time (thousands of documents and records) classified in folders and subfolders, and permissions and user rights over the folders only being managed through the operating system. A system of this kind will become immediately unmanageable. Folders will be crammed with old stuff, items will grow in number, and file routes will be forgotten. Besides, managing user rights over specific items becomes a difficult and inaccurate task.

All these bad experiences can be avoided with CIFKM. Not only all texts are indexed, but also item contexts can be monitored and recorded, what means retrieving information becomes an easy task through multiple ways.

2.- Companies can spread information balancing availability and confidentiality and thus preventing unwanted leaks

Privacy is ensured by the proper users, by managing the “user group” rights over each DSB. Besides, confidentiality can be reinforced by end to end encryption of files at user’s PC before being uploaded to CIFKM server, determining, simultaneously to the encrypting process, who other users are authorized to decrypt them.

3.- Mobility

Authorized users over a DSB can have its content available anywhere (mobility) through the client program of CIFKM or a web-browser.

4.- End to end encryption of confidential files

Authorized users can perform end to end file encryption at user’s PC. Encryption is performed before uploading files and, simultaneously to the encryption process, it can be specified who (users) can decrypt them. It combines algorithms AES+RSA.

5.- Synchronization of files and folders. Users can see CIFKM as the Company’s sync cloud

Thus, Companies become more efficient and profitable, due to the fact that less time is devoted to ancillary tasks as: archiving, locating and retrieving information.

With CIFKM any company can improve efficiency and productivity.

See more functions from CIFKM