SlideShare uma empresa Scribd logo
1 de 18
Copyright © 2014 Fasoo
Fasoo protects, controls and tracks FileNet documents
persistently no matter where they are
Your Data at Rest, in Transit or in Use Must be Encrypted Continuously!
Data-Centric Security Solution for FileNet
Copyright © 2014 Fasoo
Lifecycle Management
Workflow & Routing
Library Services
Archive
Search
Security & Access Management
Thousands of organizations use
FileNet to increase efficiency,
improve control of information and
reduce overall cost of information
management.
o organizations still maintain
control of FileNet documents that
have left protective confines of
repository?
fter documents are
downloaded, FileNet’s perimeter
security is no longer effective, and
organizations lose control of their
digital assets.
D Content
Create Reuse
Control Access
A
Copyright © 2014 Fasoo
• Millions of confidential files are exposed by current and former employees each year
• 80% increase in insider theft in 2013 from 2012 (idtheftcenter.org)
• 58% of information security incidents attributed to insider threats (infosecurity-magazine.com)
• 29% of total thefts are employees stealing business ideas (universalshredding.com)
After FileNet documents are downloaded by users, the documents can be read, saved and
printed by any user without restrictions, thus risk of data loss increases dramatically.
Competitors
Viewed, Distributed
FileNet
Documents are stored,
shared and managed
within FileNet
After legitimately downloading
a FileNet document, a user can
use and share the document
without any restriction
Copied, Edited and Printed
Authentication
Partners/Contractors
Prospects
Viewed, Distributed
Copyright © 2014 Fasoo
• FileNet alone cannot provide persistent protection throughout the document lifecycle
• There is no way to track user/file activities of FileNet documents after files are downloaded
• Legitimately downloaded FileNet documents can easily be copied and printed by or shared with unauthorized users
• Local copies of FileNet documents should be protected from unauthorized screen capture attempts
• Derivatives of FileNet documents created at a PC should also be protected
FileNet can increase efficiency, improve control of information and reduce overall cost of
information management of organizations, but cannot provide sufficient security at all times.
• Protecting and tracing FileNet documents beyond controlled boundaries at all times
• Ensuring FileNet documents are only accessed by the intended audience with appropriate access privileges
• Leveraging existing FileNet security permissions (e.g., View Content, Modify Content) for data security
• Applying automatic encryption policy based on FileNet security classification (e.g., Confidential, Strictly Confidential)
• Revoke access of FileNet documents that have been distributed when required
Fasoo’s data-centric security solution safeguards and prevents unauthorized use of FileNet
documents and provides persistent and reliable protection of data at rest, in transit or in use.
Copyright © 2014 Fasoo
• Automatically encrypting (encapsulating) a classified FileNet document at download
• Applying granular access controls (permission) to FileNet documents at all times
‐ Who can access,
‐ What actions can be done to the file (e.g. edit, print, screen capture, etc.)
• Providing audit trails of protected FileNet documents, including files that have already been distributed
• No need to setup additional DRM policies for FileNet object store folders
Fasoo Enterprise DRM persistently protects, controls and tracks FileNet documents
no matter where they are
FileNet
Based on the security classification of
the FileNet document, it is automatically
encrypted upon download
A user can access a document
without any restriction
A user without proper
credentials cannot access
the document
A user can access a document
with limited permissions
FSD Server
Revoked – Disconnected
access to the document
Unclassified Document
Confidential Document
Copyright © 2014 Fasoo
FSD for FileNet | Defining Target FileNet Object Store Folders for Encryption
• To set a target object store folder to encrypt FileNet documents at download, administrators can specify the object storefolder path in the FSD
administration console as shown below
• All classified FileNet documents under the target directory will be automatically encrypted at download without user intervention
• Once the protection is applied, the policy travels with the documents, whether the documents are at rest, in transit, or even in use
Copyright © 2014 Fasoo
FSD for FileNet | Defining Auto Encryption Policy based on Security Classification
• FSD allows an administrator to set an encryption policy based on FileNet security classification
• For example, if users select “Confidential” or “Strictly Confidential” security classification, the file will be encrypted at download
• If the document is classified as “Unclassified”, the file will not be encrypted
Not Encrypted
at Download
Encrypted at
Download
Copyright © 2014 Fasoo
FSD for FileNet | Setting up DRM Policy for FileNet Documents
• Instead of setting up a separate DRM policy to FileNet object store folders or files, administrators can map any combination of DRM permissions
(e.g., View, Edit, Print…) on the existing FileNet permissions (security level), such as View Content, Modify Content or Owner Control
• As a result, FileNet users will have different access privileges to the protected documents depending on their FileNet credentials
*FileNet Security Level: Owner Control, Promote Version, Modify Content, View Content, etc.
FileNet Security Level
Fasoo DRM Permission
Copyright © 2014 Fasoo
FSD for FileNet | Protecting FileNet Documents Continuously
• When a classified FileNet document is downloaded from a Fasoo-protected object store folder, the document will be encrypted automatically,
and a Fasoo lock icon is displayed on the file as shown below
• The local copy of a protected document will retain the security control of FileNet at all times, thus only authorized FileNetusers can access the
document based on their FileNet credentials
Copyright © 2014 Fasoo
FSD for FileNet | Protecting Derivative Files of FileNet Documents
• In general, FileNet users with Modify Content permission will have View and Edit rights to the protected documents, and willbe restricted from
printing, screen capturing or decrypting the files
• When the users attempt to save a protected Excel file as a PDF file, the converted PDF file will maintain the DRM policy of the Excel file, and
users will have the same limited access to the PDF file
Save As
Copyright © 2014 Fasoo
FSD for FileNet | Preventing Unauthorized Content Extract of FileNet Documents
• FileNet users with Modify Content permission can view and edit protected documents, but unauthorized copy and paste actions are disallowed
• A user with Modify Content permission may copy content from a protected document, but cannot paste it to a unprotected document
• Copy and paste actions are only allowed between protected documents unless the users have Decrypt permission to the protecteddocuments
Copyright © 2014 Fasoo
FSD for FileNet | Preventing Unauthorized Screen Capture of FileNet Documents
• Unauthorized screen capture attempts should not be allowed while accessing protected documents
• To prevent unauthorized screen capture, Fasoo adds a masking layer to captured images of protected documents
• When users are accessing protected documents, some capture tools may be restricted from use
• Accessing protected documents in virtual machines and web conferencing tools may be restricted depending on users’ credentials
Copyright © 2014 Fasoo
FSD for FileNet | Allowing Offline Access to FileNet Documents
• Although it is not recommended, offline access may be granted to specific users and groups
• Users with offline access may access protected documents with given permissions without connecting to the policy server
• User/file activities are collected by the DRM Client while users are offline, and sent to the policy server when users are back online
Copyright © 2014 Fasoo
FSD for FileNet | Tracking User Activities of FileNet Documents
• Every usage log of protected FileNet documents is sent to the policy server, even when the document has been used offline, the usage log will
be sent to the server when the device is re-connected
• The FSD administration console offers suitable tools for the document owner or administrator to review and audit activities of users and
documents including user ID, file name, accessed rights, IP address, time & date, etc.
Copyright © 2014 Fasoo
FSD for FileNet | Accessing Protected FileNet Documents on Mobile Devices
• Protected FileNet documents can be securely accessed on iOS or Android mobile devices using Fasoo Mobile Solution
• Fasoo Mobile Solution consists of a gateway that normally sits in the DMZ and relays permission requests to the policy server, and mobile app
which can be installed on mobile devices via App Store and Android Market
• After proper user authentication and permission validation processes, mobile users can access the protected documents with screen watermark
(e.g., company logo, file name, user ID, time & date, etc.), and mobile access logs are collected and managed at the server
Copyright © 2014 Fasoo
• Organizations that need to have employees share sensitive files internally according to set security polices for users,
groups, departments, etc.
• Organizations that have employees who frequently work outside of the office or often go on business trips
• Organizations with high employee turnover that work with valuable intellectual property
Who needs this solution?
Customer Benefits
Raising Competitive AdvantageOptimizing Productivity |
Building reputation &
gaining customer trust
Complying w/
regulations
Protecting sensitive information
to prevent data breach events
Simplifying secure
inter-organizational collaboration
Encrypting automatically based on
security classifications without user
intervention
Offering flexibilities to users
to improve productivity
Enabling better managed workflows
via data-centric security
Copyright © 2014 Fasoo
Business Area
Sharing and Collaborating Internally Printing and Displaying Your Files
Collaborating with Partners & Customers
Sharing and Syncing Files in the CloudSharing Files to Your Mobile Device
Monitor with Pattern Based Strategy
Fasoo Secure Node (FSN)
Secure all files created and saved on any PC
Fasoo Secure Document (FSD)
Securely share sensitive files downloaded from repositories. Integrate easily
with Microsoft SharePoint, IBM FileNet, etc.
Fasoo Secure Exchange (FSE)
Share sensitive files securely through email, FTP, USB, the cloud and more
Fasoo Mobile Solution (FMS)
Prevents data breaches with Mobile Data and Access Management (MDAM)
Fasoo Usage Tracer (FUT)
Monitor and manage user/file activities through usage log analysis
Fasoo Secure Print (FSP)
Trace printing activities and help deter leaks of printouts by mandating the use
of watermarks
Fasoo ePrint
Manage and control all printouts for a secure and efficient printing environment
Fasoo Secure Screen (FSS)
Safeguard the content on your screen from capture tools and cameras
DigitalQuick
Securely sync, store, and share files in the cloud, desktop and mobile device
Copyright © 2014 Fasoo
Fasoo has been successfully building its worldwide reputation as an EDRM (enterprise digital rights management a.k.a.
information rights management, IRM) solution provider with industry leading solutions and services. Fasoo solutions allow
organizations to prevent unintended information disclosure or exposure, ensure a secure information-sharing environment,
better manage workflows and simplify secure collaboration internally and externally. Fasoo Enterprise DRM, a data-centric
security solution safeguards and prevents unauthorized use of digital files and provides persistent and reliable protection of
the documents with effective file encryption, permission control and audit trail technologies. Fasoo has successfully retained
its leadership in the EDRM market by deploying solutions for more than 1,200 organizations in enterprise-wide level, securing
more than 2 million users.
About Fasoo
US Headquarters
197 State Route 18 South, East Brunswick, NJ 08817, USA
Global Headquarters
396 WorldCupbuk-ro, Mapo-gu, Seoul 121-795, South Korea
Web: www.fasoo.com
Email: inquiry@fasoo.com
Phone: (408) 389-3097 (US HQ) | +82-2-300-9000 (Global HQ)

Mais conteúdo relacionado

Mais procurados

Secure Enterprise File Sharing and Mobile Content Management
Secure Enterprise File Sharing and Mobile Content ManagementSecure Enterprise File Sharing and Mobile Content Management
Secure Enterprise File Sharing and Mobile Content ManagementBlackBerry
 
Awingu deck for eurosys gdpr march 2018
Awingu deck for eurosys gdpr march 2018Awingu deck for eurosys gdpr march 2018
Awingu deck for eurosys gdpr march 2018Marketing Team
 
3 ways to secure your law firm’s information and reputation
3 ways to secure your law firm’s information and reputation3 ways to secure your law firm’s information and reputation
3 ways to secure your law firm’s information and reputationNikec Solutions
 
Information management
Information managementInformation management
Information managementDeepak John
 
Information security - what is going on 2016
Information security - what is going on 2016Information security - what is going on 2016
Information security - what is going on 2016Tomppa Järvinen
 
Seclore: Information Rights Management
Seclore: Information Rights ManagementSeclore: Information Rights Management
Seclore: Information Rights ManagementRahul Neel Mani
 
Compliance to privacy act and mandatory data breach reporting for corporates
Compliance to privacy act and mandatory data breach reporting for corporatesCompliance to privacy act and mandatory data breach reporting for corporates
Compliance to privacy act and mandatory data breach reporting for corporatese-Safe Systems
 
Data security strategies and drivers
Data security strategies and driversData security strategies and drivers
Data security strategies and driversFreeform Dynamics
 
CIO Summit: Data Security in a Mobile World
CIO Summit: Data Security in a Mobile WorldCIO Summit: Data Security in a Mobile World
CIO Summit: Data Security in a Mobile WorldiMIS
 
Sysctr Track: Unified Device Management: It’s all about the experience
Sysctr Track: Unified Device Management: It’s all about the experienceSysctr Track: Unified Device Management: It’s all about the experience
Sysctr Track: Unified Device Management: It’s all about the experienceITProceed
 
mohammed ayoub
mohammed ayoubmohammed ayoub
mohammed ayoubmeedo225
 
Essential Layers of IBM i Security: File and Field Security
Essential Layers of IBM i Security: File and Field SecurityEssential Layers of IBM i Security: File and Field Security
Essential Layers of IBM i Security: File and Field SecurityPrecisely
 
OTechs Cloud computing security
OTechs Cloud computing securityOTechs Cloud computing security
OTechs Cloud computing securityOsman Suliman
 
Carestream white paper_cloud-security 2016
Carestream white paper_cloud-security 2016Carestream white paper_cloud-security 2016
Carestream white paper_cloud-security 2016Carestream
 
Running head technology vulnerabilities in the cloud
Running head technology vulnerabilities in the cloud             Running head technology vulnerabilities in the cloud
Running head technology vulnerabilities in the cloud AKHIL969626
 
En msft-scrty-cntnt-e book-protectyourdata
En msft-scrty-cntnt-e book-protectyourdataEn msft-scrty-cntnt-e book-protectyourdata
En msft-scrty-cntnt-e book-protectyourdataOnline Business
 
Slicksheet best practicesforkeepingyourhomenetworksecure
Slicksheet best practicesforkeepingyourhomenetworksecureSlicksheet best practicesforkeepingyourhomenetworksecure
Slicksheet best practicesforkeepingyourhomenetworksecureMargus Meigo
 

Mais procurados (19)

Secure Enterprise File Sharing and Mobile Content Management
Secure Enterprise File Sharing and Mobile Content ManagementSecure Enterprise File Sharing and Mobile Content Management
Secure Enterprise File Sharing and Mobile Content Management
 
Threats
ThreatsThreats
Threats
 
Awingu deck for eurosys gdpr march 2018
Awingu deck for eurosys gdpr march 2018Awingu deck for eurosys gdpr march 2018
Awingu deck for eurosys gdpr march 2018
 
3 ways to secure your law firm’s information and reputation
3 ways to secure your law firm’s information and reputation3 ways to secure your law firm’s information and reputation
3 ways to secure your law firm’s information and reputation
 
Information management
Information managementInformation management
Information management
 
Information security - what is going on 2016
Information security - what is going on 2016Information security - what is going on 2016
Information security - what is going on 2016
 
Seclore: Information Rights Management
Seclore: Information Rights ManagementSeclore: Information Rights Management
Seclore: Information Rights Management
 
Compliance to privacy act and mandatory data breach reporting for corporates
Compliance to privacy act and mandatory data breach reporting for corporatesCompliance to privacy act and mandatory data breach reporting for corporates
Compliance to privacy act and mandatory data breach reporting for corporates
 
Data security strategies and drivers
Data security strategies and driversData security strategies and drivers
Data security strategies and drivers
 
Information Rights Management (IRM)
Information Rights Management (IRM)Information Rights Management (IRM)
Information Rights Management (IRM)
 
CIO Summit: Data Security in a Mobile World
CIO Summit: Data Security in a Mobile WorldCIO Summit: Data Security in a Mobile World
CIO Summit: Data Security in a Mobile World
 
Sysctr Track: Unified Device Management: It’s all about the experience
Sysctr Track: Unified Device Management: It’s all about the experienceSysctr Track: Unified Device Management: It’s all about the experience
Sysctr Track: Unified Device Management: It’s all about the experience
 
mohammed ayoub
mohammed ayoubmohammed ayoub
mohammed ayoub
 
Essential Layers of IBM i Security: File and Field Security
Essential Layers of IBM i Security: File and Field SecurityEssential Layers of IBM i Security: File and Field Security
Essential Layers of IBM i Security: File and Field Security
 
OTechs Cloud computing security
OTechs Cloud computing securityOTechs Cloud computing security
OTechs Cloud computing security
 
Carestream white paper_cloud-security 2016
Carestream white paper_cloud-security 2016Carestream white paper_cloud-security 2016
Carestream white paper_cloud-security 2016
 
Running head technology vulnerabilities in the cloud
Running head technology vulnerabilities in the cloud             Running head technology vulnerabilities in the cloud
Running head technology vulnerabilities in the cloud
 
En msft-scrty-cntnt-e book-protectyourdata
En msft-scrty-cntnt-e book-protectyourdataEn msft-scrty-cntnt-e book-protectyourdata
En msft-scrty-cntnt-e book-protectyourdata
 
Slicksheet best practicesforkeepingyourhomenetworksecure
Slicksheet best practicesforkeepingyourhomenetworksecureSlicksheet best practicesforkeepingyourhomenetworksecure
Slicksheet best practicesforkeepingyourhomenetworksecure
 

Semelhante a Fasoo Secure Document for FileNet 2014-2Q

Seclore FileSecure IBM Filenet Walkthrough
Seclore FileSecure IBM Filenet WalkthroughSeclore FileSecure IBM Filenet Walkthrough
Seclore FileSecure IBM Filenet Walkthroughsiddarthc
 
FinalCode-At-A-Glance-Webcopy-Optimized
FinalCode-At-A-Glance-Webcopy-OptimizedFinalCode-At-A-Glance-Webcopy-Optimized
FinalCode-At-A-Glance-Webcopy-OptimizedPhillip Stalnaker
 
Karomi Brand Asset Management
Karomi Brand Asset ManagementKaromi Brand Asset Management
Karomi Brand Asset ManagementKaromi Technology
 
IRM Secure on SecuLogica Technical Whitepaper
IRM Secure on SecuLogica Technical WhitepaperIRM Secure on SecuLogica Technical Whitepaper
IRM Secure on SecuLogica Technical WhitepaperJim Kitchen
 
The Enterprise File Fabric for Media & Entertainment Industry | Solution Brief
The Enterprise File Fabric for Media & Entertainment Industry | Solution BriefThe Enterprise File Fabric for Media & Entertainment Industry | Solution Brief
The Enterprise File Fabric for Media & Entertainment Industry | Solution BriefHybrid Cloud
 
Remote Working: On-cloud and On-premises Remote Collaboration and File Sharin...
Remote Working: On-cloud and On-premises Remote Collaboration and File Sharin...Remote Working: On-cloud and On-premises Remote Collaboration and File Sharin...
Remote Working: On-cloud and On-premises Remote Collaboration and File Sharin...Hybrid Cloud
 
The Enterprise File Fabric for Healthcare and Genomics | SME Solution Brief
The Enterprise File Fabric for Healthcare and Genomics | SME Solution BriefThe Enterprise File Fabric for Healthcare and Genomics | SME Solution Brief
The Enterprise File Fabric for Healthcare and Genomics | SME Solution BriefHybrid Cloud
 
Cryptolab cse datasheet v1.1.pdf
Cryptolab cse datasheet v1.1.pdfCryptolab cse datasheet v1.1.pdf
Cryptolab cse datasheet v1.1.pdfMassimo Bertaccini
 
Intelligent Security, Compliance and Privacy in Office 365
Intelligent Security, Compliance and Privacy in Office 365Intelligent Security, Compliance and Privacy in Office 365
Intelligent Security, Compliance and Privacy in Office 365Miguel Isidoro
 
The Enterprise File Fabric for Mirantis
The Enterprise File Fabric for MirantisThe Enterprise File Fabric for Mirantis
The Enterprise File Fabric for MirantisHybrid Cloud
 
M-Stream® File Transfer Acceleration | Solution Brief
M-Stream® File Transfer Acceleration | Solution BriefM-Stream® File Transfer Acceleration | Solution Brief
M-Stream® File Transfer Acceleration | Solution BriefHybrid Cloud
 
Secure Enterprise Content Management and File Management for the Legal Sector...
Secure Enterprise Content Management and File Management for the Legal Sector...Secure Enterprise Content Management and File Management for the Legal Sector...
Secure Enterprise Content Management and File Management for the Legal Sector...Hybrid Cloud
 
Secure File Sharring-owncloud.pptx
Secure File Sharring-owncloud.pptxSecure File Sharring-owncloud.pptx
Secure File Sharring-owncloud.pptxAgusto Sipahutar
 
The Enterprise File Fabric for Vecima MediaScaleX
The Enterprise File Fabric for Vecima MediaScaleXThe Enterprise File Fabric for Vecima MediaScaleX
The Enterprise File Fabric for Vecima MediaScaleXHybrid Cloud
 
Enterprise solution for backup, access and sharing data
Enterprise solution for backup, access and sharing dataEnterprise solution for backup, access and sharing data
Enterprise solution for backup, access and sharing dataSoftControl.net Ltd.
 
CloudControl - Enterprise backup, access and collaboartion solution from Soft...
CloudControl - Enterprise backup, access and collaboartion solution from Soft...CloudControl - Enterprise backup, access and collaboartion solution from Soft...
CloudControl - Enterprise backup, access and collaboartion solution from Soft...ILYA ROITMAN
 
Presentation Australia
Presentation AustraliaPresentation Australia
Presentation AustraliaGreg Lennon
 
Acronis access for blaud event
Acronis access for blaud eventAcronis access for blaud event
Acronis access for blaud eventBLAUD
 

Semelhante a Fasoo Secure Document for FileNet 2014-2Q (20)

Seclore FileSecure IBM Filenet Walkthrough
Seclore FileSecure IBM Filenet WalkthroughSeclore FileSecure IBM Filenet Walkthrough
Seclore FileSecure IBM Filenet Walkthrough
 
FinalCode-At-A-Glance-Webcopy-Optimized
FinalCode-At-A-Glance-Webcopy-OptimizedFinalCode-At-A-Glance-Webcopy-Optimized
FinalCode-At-A-Glance-Webcopy-Optimized
 
Karomi Brand Asset Management
Karomi Brand Asset ManagementKaromi Brand Asset Management
Karomi Brand Asset Management
 
IRM Secure on SecuLogica Technical Whitepaper
IRM Secure on SecuLogica Technical WhitepaperIRM Secure on SecuLogica Technical Whitepaper
IRM Secure on SecuLogica Technical Whitepaper
 
The Enterprise File Fabric for Media & Entertainment Industry | Solution Brief
The Enterprise File Fabric for Media & Entertainment Industry | Solution BriefThe Enterprise File Fabric for Media & Entertainment Industry | Solution Brief
The Enterprise File Fabric for Media & Entertainment Industry | Solution Brief
 
Remote Working: On-cloud and On-premises Remote Collaboration and File Sharin...
Remote Working: On-cloud and On-premises Remote Collaboration and File Sharin...Remote Working: On-cloud and On-premises Remote Collaboration and File Sharin...
Remote Working: On-cloud and On-premises Remote Collaboration and File Sharin...
 
The Enterprise File Fabric for Healthcare and Genomics | SME Solution Brief
The Enterprise File Fabric for Healthcare and Genomics | SME Solution BriefThe Enterprise File Fabric for Healthcare and Genomics | SME Solution Brief
The Enterprise File Fabric for Healthcare and Genomics | SME Solution Brief
 
Cryptolab cse datasheet v1.1.pdf
Cryptolab cse datasheet v1.1.pdfCryptolab cse datasheet v1.1.pdf
Cryptolab cse datasheet v1.1.pdf
 
Intelligent Security, Compliance and Privacy in Office 365
Intelligent Security, Compliance and Privacy in Office 365Intelligent Security, Compliance and Privacy in Office 365
Intelligent Security, Compliance and Privacy in Office 365
 
The Enterprise File Fabric for Mirantis
The Enterprise File Fabric for MirantisThe Enterprise File Fabric for Mirantis
The Enterprise File Fabric for Mirantis
 
M-Stream® File Transfer Acceleration | Solution Brief
M-Stream® File Transfer Acceleration | Solution BriefM-Stream® File Transfer Acceleration | Solution Brief
M-Stream® File Transfer Acceleration | Solution Brief
 
Document management and collaboration system
Document management and collaboration systemDocument management and collaboration system
Document management and collaboration system
 
Secure Enterprise Content Management and File Management for the Legal Sector...
Secure Enterprise Content Management and File Management for the Legal Sector...Secure Enterprise Content Management and File Management for the Legal Sector...
Secure Enterprise Content Management and File Management for the Legal Sector...
 
FILR Demo
FILR DemoFILR Demo
FILR Demo
 
Secure File Sharring-owncloud.pptx
Secure File Sharring-owncloud.pptxSecure File Sharring-owncloud.pptx
Secure File Sharring-owncloud.pptx
 
The Enterprise File Fabric for Vecima MediaScaleX
The Enterprise File Fabric for Vecima MediaScaleXThe Enterprise File Fabric for Vecima MediaScaleX
The Enterprise File Fabric for Vecima MediaScaleX
 
Enterprise solution for backup, access and sharing data
Enterprise solution for backup, access and sharing dataEnterprise solution for backup, access and sharing data
Enterprise solution for backup, access and sharing data
 
CloudControl - Enterprise backup, access and collaboartion solution from Soft...
CloudControl - Enterprise backup, access and collaboartion solution from Soft...CloudControl - Enterprise backup, access and collaboartion solution from Soft...
CloudControl - Enterprise backup, access and collaboartion solution from Soft...
 
Presentation Australia
Presentation AustraliaPresentation Australia
Presentation Australia
 
Acronis access for blaud event
Acronis access for blaud eventAcronis access for blaud event
Acronis access for blaud event
 

Mais de Jason Sohn

Fasoo Digital Intelligence 2020 - 장일수
Fasoo Digital Intelligence 2020 - 장일수Fasoo Digital Intelligence 2020 - 장일수
Fasoo Digital Intelligence 2020 - 장일수Jason Sohn
 
Fasoo Digital Intelligence 2020 - 윤화섭
Fasoo Digital Intelligence 2020 - 윤화섭Fasoo Digital Intelligence 2020 - 윤화섭
Fasoo Digital Intelligence 2020 - 윤화섭Jason Sohn
 
Fasoo Digital Intelligence 2020 - 윤덕상
Fasoo Digital Intelligence 2020 - 윤덕상Fasoo Digital Intelligence 2020 - 윤덕상
Fasoo Digital Intelligence 2020 - 윤덕상Jason Sohn
 
Fasoo Digital Intelligence 2020 - 김용길
Fasoo Digital Intelligence 2020 - 김용길Fasoo Digital Intelligence 2020 - 김용길
Fasoo Digital Intelligence 2020 - 김용길Jason Sohn
 
Fasoo Digital Intelligence 2020 - 김규봉
Fasoo Digital Intelligence 2020 - 김규봉Fasoo Digital Intelligence 2020 - 김규봉
Fasoo Digital Intelligence 2020 - 김규봉Jason Sohn
 
Fasoo Digital Intelligence 2020 - 조규곤
Fasoo Digital Intelligence 2020 - 조규곤Fasoo Digital Intelligence 2020 - 조규곤
Fasoo Digital Intelligence 2020 - 조규곤Jason Sohn
 
AP Security Solution Providers Consortium Webinar - Fasoo Session Decks
AP Security Solution Providers Consortium Webinar - Fasoo Session DecksAP Security Solution Providers Consortium Webinar - Fasoo Session Decks
AP Security Solution Providers Consortium Webinar - Fasoo Session DecksJason Sohn
 
Build Security into the Software with Sparrow
Build Security into the Software with SparrowBuild Security into the Software with Sparrow
Build Security into the Software with SparrowJason Sohn
 

Mais de Jason Sohn (8)

Fasoo Digital Intelligence 2020 - 장일수
Fasoo Digital Intelligence 2020 - 장일수Fasoo Digital Intelligence 2020 - 장일수
Fasoo Digital Intelligence 2020 - 장일수
 
Fasoo Digital Intelligence 2020 - 윤화섭
Fasoo Digital Intelligence 2020 - 윤화섭Fasoo Digital Intelligence 2020 - 윤화섭
Fasoo Digital Intelligence 2020 - 윤화섭
 
Fasoo Digital Intelligence 2020 - 윤덕상
Fasoo Digital Intelligence 2020 - 윤덕상Fasoo Digital Intelligence 2020 - 윤덕상
Fasoo Digital Intelligence 2020 - 윤덕상
 
Fasoo Digital Intelligence 2020 - 김용길
Fasoo Digital Intelligence 2020 - 김용길Fasoo Digital Intelligence 2020 - 김용길
Fasoo Digital Intelligence 2020 - 김용길
 
Fasoo Digital Intelligence 2020 - 김규봉
Fasoo Digital Intelligence 2020 - 김규봉Fasoo Digital Intelligence 2020 - 김규봉
Fasoo Digital Intelligence 2020 - 김규봉
 
Fasoo Digital Intelligence 2020 - 조규곤
Fasoo Digital Intelligence 2020 - 조규곤Fasoo Digital Intelligence 2020 - 조규곤
Fasoo Digital Intelligence 2020 - 조규곤
 
AP Security Solution Providers Consortium Webinar - Fasoo Session Decks
AP Security Solution Providers Consortium Webinar - Fasoo Session DecksAP Security Solution Providers Consortium Webinar - Fasoo Session Decks
AP Security Solution Providers Consortium Webinar - Fasoo Session Decks
 
Build Security into the Software with Sparrow
Build Security into the Software with SparrowBuild Security into the Software with Sparrow
Build Security into the Software with Sparrow
 

Último

How To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerHow To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerThousandEyes
 
5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdfWave PLM
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...kellynguyen01
 
Right Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsRight Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsJhone kinadey
 
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...gurkirankumar98700
 
Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...OnePlan Solutions
 
Software Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsSoftware Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsArshad QA
 
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...panagenda
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️Delhi Call girls
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Modelsaagamshah0812
 
Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantAxelRicardoTrocheRiq
 
How To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.jsHow To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.jsAndolasoft Inc
 
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️anilsa9823
 
Active Directory Penetration Testing, cionsystems.com.pdf
Active Directory Penetration Testing, cionsystems.com.pdfActive Directory Penetration Testing, cionsystems.com.pdf
Active Directory Penetration Testing, cionsystems.com.pdfCionsystems
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...MyIntelliSource, Inc.
 
Clustering techniques data mining book ....
Clustering techniques data mining book ....Clustering techniques data mining book ....
Clustering techniques data mining book ....ShaimaaMohamedGalal
 

Último (20)

Call Girls In Mukherjee Nagar 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
Call Girls In Mukherjee Nagar 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...Call Girls In Mukherjee Nagar 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
Call Girls In Mukherjee Nagar 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
 
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerHow To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
 
5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
 
Right Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsRight Money Management App For Your Financial Goals
Right Money Management App For Your Financial Goals
 
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICECHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
 
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
 
Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...
 
Software Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsSoftware Quality Assurance Interview Questions
Software Quality Assurance Interview Questions
 
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Models
 
Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service Consultant
 
How To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.jsHow To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.js
 
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS LiveVip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
 
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️
 
Exploring iOS App Development: Simplifying the Process
Exploring iOS App Development: Simplifying the ProcessExploring iOS App Development: Simplifying the Process
Exploring iOS App Development: Simplifying the Process
 
Active Directory Penetration Testing, cionsystems.com.pdf
Active Directory Penetration Testing, cionsystems.com.pdfActive Directory Penetration Testing, cionsystems.com.pdf
Active Directory Penetration Testing, cionsystems.com.pdf
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
 
Clustering techniques data mining book ....
Clustering techniques data mining book ....Clustering techniques data mining book ....
Clustering techniques data mining book ....
 

Fasoo Secure Document for FileNet 2014-2Q

  • 1. Copyright © 2014 Fasoo Fasoo protects, controls and tracks FileNet documents persistently no matter where they are Your Data at Rest, in Transit or in Use Must be Encrypted Continuously! Data-Centric Security Solution for FileNet
  • 2. Copyright © 2014 Fasoo Lifecycle Management Workflow & Routing Library Services Archive Search Security & Access Management Thousands of organizations use FileNet to increase efficiency, improve control of information and reduce overall cost of information management. o organizations still maintain control of FileNet documents that have left protective confines of repository? fter documents are downloaded, FileNet’s perimeter security is no longer effective, and organizations lose control of their digital assets. D Content Create Reuse Control Access A
  • 3. Copyright © 2014 Fasoo • Millions of confidential files are exposed by current and former employees each year • 80% increase in insider theft in 2013 from 2012 (idtheftcenter.org) • 58% of information security incidents attributed to insider threats (infosecurity-magazine.com) • 29% of total thefts are employees stealing business ideas (universalshredding.com) After FileNet documents are downloaded by users, the documents can be read, saved and printed by any user without restrictions, thus risk of data loss increases dramatically. Competitors Viewed, Distributed FileNet Documents are stored, shared and managed within FileNet After legitimately downloading a FileNet document, a user can use and share the document without any restriction Copied, Edited and Printed Authentication Partners/Contractors Prospects Viewed, Distributed
  • 4. Copyright © 2014 Fasoo • FileNet alone cannot provide persistent protection throughout the document lifecycle • There is no way to track user/file activities of FileNet documents after files are downloaded • Legitimately downloaded FileNet documents can easily be copied and printed by or shared with unauthorized users • Local copies of FileNet documents should be protected from unauthorized screen capture attempts • Derivatives of FileNet documents created at a PC should also be protected FileNet can increase efficiency, improve control of information and reduce overall cost of information management of organizations, but cannot provide sufficient security at all times. • Protecting and tracing FileNet documents beyond controlled boundaries at all times • Ensuring FileNet documents are only accessed by the intended audience with appropriate access privileges • Leveraging existing FileNet security permissions (e.g., View Content, Modify Content) for data security • Applying automatic encryption policy based on FileNet security classification (e.g., Confidential, Strictly Confidential) • Revoke access of FileNet documents that have been distributed when required Fasoo’s data-centric security solution safeguards and prevents unauthorized use of FileNet documents and provides persistent and reliable protection of data at rest, in transit or in use.
  • 5. Copyright © 2014 Fasoo • Automatically encrypting (encapsulating) a classified FileNet document at download • Applying granular access controls (permission) to FileNet documents at all times ‐ Who can access, ‐ What actions can be done to the file (e.g. edit, print, screen capture, etc.) • Providing audit trails of protected FileNet documents, including files that have already been distributed • No need to setup additional DRM policies for FileNet object store folders Fasoo Enterprise DRM persistently protects, controls and tracks FileNet documents no matter where they are FileNet Based on the security classification of the FileNet document, it is automatically encrypted upon download A user can access a document without any restriction A user without proper credentials cannot access the document A user can access a document with limited permissions FSD Server Revoked – Disconnected access to the document Unclassified Document Confidential Document
  • 6. Copyright © 2014 Fasoo FSD for FileNet | Defining Target FileNet Object Store Folders for Encryption • To set a target object store folder to encrypt FileNet documents at download, administrators can specify the object storefolder path in the FSD administration console as shown below • All classified FileNet documents under the target directory will be automatically encrypted at download without user intervention • Once the protection is applied, the policy travels with the documents, whether the documents are at rest, in transit, or even in use
  • 7. Copyright © 2014 Fasoo FSD for FileNet | Defining Auto Encryption Policy based on Security Classification • FSD allows an administrator to set an encryption policy based on FileNet security classification • For example, if users select “Confidential” or “Strictly Confidential” security classification, the file will be encrypted at download • If the document is classified as “Unclassified”, the file will not be encrypted Not Encrypted at Download Encrypted at Download
  • 8. Copyright © 2014 Fasoo FSD for FileNet | Setting up DRM Policy for FileNet Documents • Instead of setting up a separate DRM policy to FileNet object store folders or files, administrators can map any combination of DRM permissions (e.g., View, Edit, Print…) on the existing FileNet permissions (security level), such as View Content, Modify Content or Owner Control • As a result, FileNet users will have different access privileges to the protected documents depending on their FileNet credentials *FileNet Security Level: Owner Control, Promote Version, Modify Content, View Content, etc. FileNet Security Level Fasoo DRM Permission
  • 9. Copyright © 2014 Fasoo FSD for FileNet | Protecting FileNet Documents Continuously • When a classified FileNet document is downloaded from a Fasoo-protected object store folder, the document will be encrypted automatically, and a Fasoo lock icon is displayed on the file as shown below • The local copy of a protected document will retain the security control of FileNet at all times, thus only authorized FileNetusers can access the document based on their FileNet credentials
  • 10. Copyright © 2014 Fasoo FSD for FileNet | Protecting Derivative Files of FileNet Documents • In general, FileNet users with Modify Content permission will have View and Edit rights to the protected documents, and willbe restricted from printing, screen capturing or decrypting the files • When the users attempt to save a protected Excel file as a PDF file, the converted PDF file will maintain the DRM policy of the Excel file, and users will have the same limited access to the PDF file Save As
  • 11. Copyright © 2014 Fasoo FSD for FileNet | Preventing Unauthorized Content Extract of FileNet Documents • FileNet users with Modify Content permission can view and edit protected documents, but unauthorized copy and paste actions are disallowed • A user with Modify Content permission may copy content from a protected document, but cannot paste it to a unprotected document • Copy and paste actions are only allowed between protected documents unless the users have Decrypt permission to the protecteddocuments
  • 12. Copyright © 2014 Fasoo FSD for FileNet | Preventing Unauthorized Screen Capture of FileNet Documents • Unauthorized screen capture attempts should not be allowed while accessing protected documents • To prevent unauthorized screen capture, Fasoo adds a masking layer to captured images of protected documents • When users are accessing protected documents, some capture tools may be restricted from use • Accessing protected documents in virtual machines and web conferencing tools may be restricted depending on users’ credentials
  • 13. Copyright © 2014 Fasoo FSD for FileNet | Allowing Offline Access to FileNet Documents • Although it is not recommended, offline access may be granted to specific users and groups • Users with offline access may access protected documents with given permissions without connecting to the policy server • User/file activities are collected by the DRM Client while users are offline, and sent to the policy server when users are back online
  • 14. Copyright © 2014 Fasoo FSD for FileNet | Tracking User Activities of FileNet Documents • Every usage log of protected FileNet documents is sent to the policy server, even when the document has been used offline, the usage log will be sent to the server when the device is re-connected • The FSD administration console offers suitable tools for the document owner or administrator to review and audit activities of users and documents including user ID, file name, accessed rights, IP address, time & date, etc.
  • 15. Copyright © 2014 Fasoo FSD for FileNet | Accessing Protected FileNet Documents on Mobile Devices • Protected FileNet documents can be securely accessed on iOS or Android mobile devices using Fasoo Mobile Solution • Fasoo Mobile Solution consists of a gateway that normally sits in the DMZ and relays permission requests to the policy server, and mobile app which can be installed on mobile devices via App Store and Android Market • After proper user authentication and permission validation processes, mobile users can access the protected documents with screen watermark (e.g., company logo, file name, user ID, time & date, etc.), and mobile access logs are collected and managed at the server
  • 16. Copyright © 2014 Fasoo • Organizations that need to have employees share sensitive files internally according to set security polices for users, groups, departments, etc. • Organizations that have employees who frequently work outside of the office or often go on business trips • Organizations with high employee turnover that work with valuable intellectual property Who needs this solution? Customer Benefits Raising Competitive AdvantageOptimizing Productivity | Building reputation & gaining customer trust Complying w/ regulations Protecting sensitive information to prevent data breach events Simplifying secure inter-organizational collaboration Encrypting automatically based on security classifications without user intervention Offering flexibilities to users to improve productivity Enabling better managed workflows via data-centric security
  • 17. Copyright © 2014 Fasoo Business Area Sharing and Collaborating Internally Printing and Displaying Your Files Collaborating with Partners & Customers Sharing and Syncing Files in the CloudSharing Files to Your Mobile Device Monitor with Pattern Based Strategy Fasoo Secure Node (FSN) Secure all files created and saved on any PC Fasoo Secure Document (FSD) Securely share sensitive files downloaded from repositories. Integrate easily with Microsoft SharePoint, IBM FileNet, etc. Fasoo Secure Exchange (FSE) Share sensitive files securely through email, FTP, USB, the cloud and more Fasoo Mobile Solution (FMS) Prevents data breaches with Mobile Data and Access Management (MDAM) Fasoo Usage Tracer (FUT) Monitor and manage user/file activities through usage log analysis Fasoo Secure Print (FSP) Trace printing activities and help deter leaks of printouts by mandating the use of watermarks Fasoo ePrint Manage and control all printouts for a secure and efficient printing environment Fasoo Secure Screen (FSS) Safeguard the content on your screen from capture tools and cameras DigitalQuick Securely sync, store, and share files in the cloud, desktop and mobile device
  • 18. Copyright © 2014 Fasoo Fasoo has been successfully building its worldwide reputation as an EDRM (enterprise digital rights management a.k.a. information rights management, IRM) solution provider with industry leading solutions and services. Fasoo solutions allow organizations to prevent unintended information disclosure or exposure, ensure a secure information-sharing environment, better manage workflows and simplify secure collaboration internally and externally. Fasoo Enterprise DRM, a data-centric security solution safeguards and prevents unauthorized use of digital files and provides persistent and reliable protection of the documents with effective file encryption, permission control and audit trail technologies. Fasoo has successfully retained its leadership in the EDRM market by deploying solutions for more than 1,200 organizations in enterprise-wide level, securing more than 2 million users. About Fasoo US Headquarters 197 State Route 18 South, East Brunswick, NJ 08817, USA Global Headquarters 396 WorldCupbuk-ro, Mapo-gu, Seoul 121-795, South Korea Web: www.fasoo.com Email: inquiry@fasoo.com Phone: (408) 389-3097 (US HQ) | +82-2-300-9000 (Global HQ)