SlideShare ist ein Scribd-Unternehmen logo
1 von 18
Copyright © 2014 Fasoo
Fasoo protects, controls and tracks FileNet documents
persistently no matter where they are
Your Data at Rest, in Transit or in Use Must be Encrypted Continuously!
Data-Centric Security Solution for FileNet
Copyright © 2014 Fasoo
Lifecycle Management
Workflow & Routing
Library Services
Archive
Search
Security & Access Management
Thousands of organizations use
FileNet to increase efficiency,
improve control of information and
reduce overall cost of information
management.
o organizations still maintain
control of FileNet documents that
have left protective confines of
repository?
fter documents are
downloaded, FileNet’s perimeter
security is no longer effective, and
organizations lose control of their
digital assets.
D Content
Create Reuse
Control Access
A
Copyright © 2014 Fasoo
• Millions of confidential files are exposed by current and former employees each year
• 80% increase in insider theft in 2013 from 2012 (idtheftcenter.org)
• 58% of information security incidents attributed to insider threats (infosecurity-magazine.com)
• 29% of total thefts are employees stealing business ideas (universalshredding.com)
After FileNet documents are downloaded by users, the documents can be read, saved and
printed by any user without restrictions, thus risk of data loss increases dramatically.
Competitors
Viewed, Distributed
FileNet
Documents are stored,
shared and managed
within FileNet
After legitimately downloading
a FileNet document, a user can
use and share the document
without any restriction
Copied, Edited and Printed
Authentication
Partners/Contractors
Prospects
Viewed, Distributed
Copyright © 2014 Fasoo
• FileNet alone cannot provide persistent protection throughout the document lifecycle
• There is no way to track user/file activities of FileNet documents after files are downloaded
• Legitimately downloaded FileNet documents can easily be copied and printed by or shared with unauthorized users
• Local copies of FileNet documents should be protected from unauthorized screen capture attempts
• Derivatives of FileNet documents created at a PC should also be protected
FileNet can increase efficiency, improve control of information and reduce overall cost of
information management of organizations, but cannot provide sufficient security at all times.
• Protecting and tracing FileNet documents beyond controlled boundaries at all times
• Ensuring FileNet documents are only accessed by the intended audience with appropriate access privileges
• Leveraging existing FileNet security permissions (e.g., View Content, Modify Content) for data security
• Applying automatic encryption policy based on FileNet security classification (e.g., Confidential, Strictly Confidential)
• Revoke access of FileNet documents that have been distributed when required
Fasoo’s data-centric security solution safeguards and prevents unauthorized use of FileNet
documents and provides persistent and reliable protection of data at rest, in transit or in use.
Copyright © 2014 Fasoo
• Automatically encrypting (encapsulating) a classified FileNet document at download
• Applying granular access controls (permission) to FileNet documents at all times
‐ Who can access,
‐ What actions can be done to the file (e.g. edit, print, screen capture, etc.)
• Providing audit trails of protected FileNet documents, including files that have already been distributed
• No need to setup additional DRM policies for FileNet object store folders
Fasoo Enterprise DRM persistently protects, controls and tracks FileNet documents
no matter where they are
FileNet
Based on the security classification of
the FileNet document, it is automatically
encrypted upon download
A user can access a document
without any restriction
A user without proper
credentials cannot access
the document
A user can access a document
with limited permissions
FSD Server
Revoked – Disconnected
access to the document
Unclassified Document
Confidential Document
Copyright © 2014 Fasoo
FSD for FileNet | Defining Target FileNet Object Store Folders for Encryption
• To set a target object store folder to encrypt FileNet documents at download, administrators can specify the object storefolder path in the FSD
administration console as shown below
• All classified FileNet documents under the target directory will be automatically encrypted at download without user intervention
• Once the protection is applied, the policy travels with the documents, whether the documents are at rest, in transit, or even in use
Copyright © 2014 Fasoo
FSD for FileNet | Defining Auto Encryption Policy based on Security Classification
• FSD allows an administrator to set an encryption policy based on FileNet security classification
• For example, if users select “Confidential” or “Strictly Confidential” security classification, the file will be encrypted at download
• If the document is classified as “Unclassified”, the file will not be encrypted
Not Encrypted
at Download
Encrypted at
Download
Copyright © 2014 Fasoo
FSD for FileNet | Setting up DRM Policy for FileNet Documents
• Instead of setting up a separate DRM policy to FileNet object store folders or files, administrators can map any combination of DRM permissions
(e.g., View, Edit, Print…) on the existing FileNet permissions (security level), such as View Content, Modify Content or Owner Control
• As a result, FileNet users will have different access privileges to the protected documents depending on their FileNet credentials
*FileNet Security Level: Owner Control, Promote Version, Modify Content, View Content, etc.
FileNet Security Level
Fasoo DRM Permission
Copyright © 2014 Fasoo
FSD for FileNet | Protecting FileNet Documents Continuously
• When a classified FileNet document is downloaded from a Fasoo-protected object store folder, the document will be encrypted automatically,
and a Fasoo lock icon is displayed on the file as shown below
• The local copy of a protected document will retain the security control of FileNet at all times, thus only authorized FileNetusers can access the
document based on their FileNet credentials
Copyright © 2014 Fasoo
FSD for FileNet | Protecting Derivative Files of FileNet Documents
• In general, FileNet users with Modify Content permission will have View and Edit rights to the protected documents, and willbe restricted from
printing, screen capturing or decrypting the files
• When the users attempt to save a protected Excel file as a PDF file, the converted PDF file will maintain the DRM policy of the Excel file, and
users will have the same limited access to the PDF file
Save As
Copyright © 2014 Fasoo
FSD for FileNet | Preventing Unauthorized Content Extract of FileNet Documents
• FileNet users with Modify Content permission can view and edit protected documents, but unauthorized copy and paste actions are disallowed
• A user with Modify Content permission may copy content from a protected document, but cannot paste it to a unprotected document
• Copy and paste actions are only allowed between protected documents unless the users have Decrypt permission to the protecteddocuments
Copyright © 2014 Fasoo
FSD for FileNet | Preventing Unauthorized Screen Capture of FileNet Documents
• Unauthorized screen capture attempts should not be allowed while accessing protected documents
• To prevent unauthorized screen capture, Fasoo adds a masking layer to captured images of protected documents
• When users are accessing protected documents, some capture tools may be restricted from use
• Accessing protected documents in virtual machines and web conferencing tools may be restricted depending on users’ credentials
Copyright © 2014 Fasoo
FSD for FileNet | Allowing Offline Access to FileNet Documents
• Although it is not recommended, offline access may be granted to specific users and groups
• Users with offline access may access protected documents with given permissions without connecting to the policy server
• User/file activities are collected by the DRM Client while users are offline, and sent to the policy server when users are back online
Copyright © 2014 Fasoo
FSD for FileNet | Tracking User Activities of FileNet Documents
• Every usage log of protected FileNet documents is sent to the policy server, even when the document has been used offline, the usage log will
be sent to the server when the device is re-connected
• The FSD administration console offers suitable tools for the document owner or administrator to review and audit activities of users and
documents including user ID, file name, accessed rights, IP address, time & date, etc.
Copyright © 2014 Fasoo
FSD for FileNet | Accessing Protected FileNet Documents on Mobile Devices
• Protected FileNet documents can be securely accessed on iOS or Android mobile devices using Fasoo Mobile Solution
• Fasoo Mobile Solution consists of a gateway that normally sits in the DMZ and relays permission requests to the policy server, and mobile app
which can be installed on mobile devices via App Store and Android Market
• After proper user authentication and permission validation processes, mobile users can access the protected documents with screen watermark
(e.g., company logo, file name, user ID, time & date, etc.), and mobile access logs are collected and managed at the server
Copyright © 2014 Fasoo
• Organizations that need to have employees share sensitive files internally according to set security polices for users,
groups, departments, etc.
• Organizations that have employees who frequently work outside of the office or often go on business trips
• Organizations with high employee turnover that work with valuable intellectual property
Who needs this solution?
Customer Benefits
Raising Competitive AdvantageOptimizing Productivity |
Building reputation &
gaining customer trust
Complying w/
regulations
Protecting sensitive information
to prevent data breach events
Simplifying secure
inter-organizational collaboration
Encrypting automatically based on
security classifications without user
intervention
Offering flexibilities to users
to improve productivity
Enabling better managed workflows
via data-centric security
Copyright © 2014 Fasoo
Business Area
Sharing and Collaborating Internally Printing and Displaying Your Files
Collaborating with Partners & Customers
Sharing and Syncing Files in the CloudSharing Files to Your Mobile Device
Monitor with Pattern Based Strategy
Fasoo Secure Node (FSN)
Secure all files created and saved on any PC
Fasoo Secure Document (FSD)
Securely share sensitive files downloaded from repositories. Integrate easily
with Microsoft SharePoint, IBM FileNet, etc.
Fasoo Secure Exchange (FSE)
Share sensitive files securely through email, FTP, USB, the cloud and more
Fasoo Mobile Solution (FMS)
Prevents data breaches with Mobile Data and Access Management (MDAM)
Fasoo Usage Tracer (FUT)
Monitor and manage user/file activities through usage log analysis
Fasoo Secure Print (FSP)
Trace printing activities and help deter leaks of printouts by mandating the use
of watermarks
Fasoo ePrint
Manage and control all printouts for a secure and efficient printing environment
Fasoo Secure Screen (FSS)
Safeguard the content on your screen from capture tools and cameras
DigitalQuick
Securely sync, store, and share files in the cloud, desktop and mobile device
Copyright © 2014 Fasoo
Fasoo has been successfully building its worldwide reputation as an EDRM (enterprise digital rights management a.k.a.
information rights management, IRM) solution provider with industry leading solutions and services. Fasoo solutions allow
organizations to prevent unintended information disclosure or exposure, ensure a secure information-sharing environment,
better manage workflows and simplify secure collaboration internally and externally. Fasoo Enterprise DRM, a data-centric
security solution safeguards and prevents unauthorized use of digital files and provides persistent and reliable protection of
the documents with effective file encryption, permission control and audit trail technologies. Fasoo has successfully retained
its leadership in the EDRM market by deploying solutions for more than 1,200 organizations in enterprise-wide level, securing
more than 2 million users.
About Fasoo
US Headquarters
197 State Route 18 South, East Brunswick, NJ 08817, USA
Global Headquarters
396 WorldCupbuk-ro, Mapo-gu, Seoul 121-795, South Korea
Web: www.fasoo.com
Email: inquiry@fasoo.com
Phone: (408) 389-3097 (US HQ) | +82-2-300-9000 (Global HQ)

Weitere ähnliche Inhalte

Was ist angesagt?

Secure Enterprise File Sharing and Mobile Content Management
Secure Enterprise File Sharing and Mobile Content ManagementSecure Enterprise File Sharing and Mobile Content Management
Secure Enterprise File Sharing and Mobile Content ManagementBlackBerry
 
Awingu deck for eurosys gdpr march 2018
Awingu deck for eurosys gdpr march 2018Awingu deck for eurosys gdpr march 2018
Awingu deck for eurosys gdpr march 2018Marketing Team
 
3 ways to secure your law firm’s information and reputation
3 ways to secure your law firm’s information and reputation3 ways to secure your law firm’s information and reputation
3 ways to secure your law firm’s information and reputationNikec Solutions
 
Information management
Information managementInformation management
Information managementDeepak John
 
Information security - what is going on 2016
Information security - what is going on 2016Information security - what is going on 2016
Information security - what is going on 2016Tomppa Järvinen
 
Seclore: Information Rights Management
Seclore: Information Rights ManagementSeclore: Information Rights Management
Seclore: Information Rights ManagementRahul Neel Mani
 
Compliance to privacy act and mandatory data breach reporting for corporates
Compliance to privacy act and mandatory data breach reporting for corporatesCompliance to privacy act and mandatory data breach reporting for corporates
Compliance to privacy act and mandatory data breach reporting for corporatese-Safe Systems
 
Data security strategies and drivers
Data security strategies and driversData security strategies and drivers
Data security strategies and driversFreeform Dynamics
 
CIO Summit: Data Security in a Mobile World
CIO Summit: Data Security in a Mobile WorldCIO Summit: Data Security in a Mobile World
CIO Summit: Data Security in a Mobile WorldiMIS
 
Sysctr Track: Unified Device Management: It’s all about the experience
Sysctr Track: Unified Device Management: It’s all about the experienceSysctr Track: Unified Device Management: It’s all about the experience
Sysctr Track: Unified Device Management: It’s all about the experienceITProceed
 
mohammed ayoub
mohammed ayoubmohammed ayoub
mohammed ayoubmeedo225
 
Essential Layers of IBM i Security: File and Field Security
Essential Layers of IBM i Security: File and Field SecurityEssential Layers of IBM i Security: File and Field Security
Essential Layers of IBM i Security: File and Field SecurityPrecisely
 
OTechs Cloud computing security
OTechs Cloud computing securityOTechs Cloud computing security
OTechs Cloud computing securityOsman Suliman
 
Carestream white paper_cloud-security 2016
Carestream white paper_cloud-security 2016Carestream white paper_cloud-security 2016
Carestream white paper_cloud-security 2016Carestream
 
Running head technology vulnerabilities in the cloud
Running head technology vulnerabilities in the cloud             Running head technology vulnerabilities in the cloud
Running head technology vulnerabilities in the cloud AKHIL969626
 
En msft-scrty-cntnt-e book-protectyourdata
En msft-scrty-cntnt-e book-protectyourdataEn msft-scrty-cntnt-e book-protectyourdata
En msft-scrty-cntnt-e book-protectyourdataOnline Business
 
Slicksheet best practicesforkeepingyourhomenetworksecure
Slicksheet best practicesforkeepingyourhomenetworksecureSlicksheet best practicesforkeepingyourhomenetworksecure
Slicksheet best practicesforkeepingyourhomenetworksecureMargus Meigo
 

Was ist angesagt? (19)

Secure Enterprise File Sharing and Mobile Content Management
Secure Enterprise File Sharing and Mobile Content ManagementSecure Enterprise File Sharing and Mobile Content Management
Secure Enterprise File Sharing and Mobile Content Management
 
Threats
ThreatsThreats
Threats
 
Awingu deck for eurosys gdpr march 2018
Awingu deck for eurosys gdpr march 2018Awingu deck for eurosys gdpr march 2018
Awingu deck for eurosys gdpr march 2018
 
3 ways to secure your law firm’s information and reputation
3 ways to secure your law firm’s information and reputation3 ways to secure your law firm’s information and reputation
3 ways to secure your law firm’s information and reputation
 
Information management
Information managementInformation management
Information management
 
Information security - what is going on 2016
Information security - what is going on 2016Information security - what is going on 2016
Information security - what is going on 2016
 
Seclore: Information Rights Management
Seclore: Information Rights ManagementSeclore: Information Rights Management
Seclore: Information Rights Management
 
Compliance to privacy act and mandatory data breach reporting for corporates
Compliance to privacy act and mandatory data breach reporting for corporatesCompliance to privacy act and mandatory data breach reporting for corporates
Compliance to privacy act and mandatory data breach reporting for corporates
 
Data security strategies and drivers
Data security strategies and driversData security strategies and drivers
Data security strategies and drivers
 
Information Rights Management (IRM)
Information Rights Management (IRM)Information Rights Management (IRM)
Information Rights Management (IRM)
 
CIO Summit: Data Security in a Mobile World
CIO Summit: Data Security in a Mobile WorldCIO Summit: Data Security in a Mobile World
CIO Summit: Data Security in a Mobile World
 
Sysctr Track: Unified Device Management: It’s all about the experience
Sysctr Track: Unified Device Management: It’s all about the experienceSysctr Track: Unified Device Management: It’s all about the experience
Sysctr Track: Unified Device Management: It’s all about the experience
 
mohammed ayoub
mohammed ayoubmohammed ayoub
mohammed ayoub
 
Essential Layers of IBM i Security: File and Field Security
Essential Layers of IBM i Security: File and Field SecurityEssential Layers of IBM i Security: File and Field Security
Essential Layers of IBM i Security: File and Field Security
 
OTechs Cloud computing security
OTechs Cloud computing securityOTechs Cloud computing security
OTechs Cloud computing security
 
Carestream white paper_cloud-security 2016
Carestream white paper_cloud-security 2016Carestream white paper_cloud-security 2016
Carestream white paper_cloud-security 2016
 
Running head technology vulnerabilities in the cloud
Running head technology vulnerabilities in the cloud             Running head technology vulnerabilities in the cloud
Running head technology vulnerabilities in the cloud
 
En msft-scrty-cntnt-e book-protectyourdata
En msft-scrty-cntnt-e book-protectyourdataEn msft-scrty-cntnt-e book-protectyourdata
En msft-scrty-cntnt-e book-protectyourdata
 
Slicksheet best practicesforkeepingyourhomenetworksecure
Slicksheet best practicesforkeepingyourhomenetworksecureSlicksheet best practicesforkeepingyourhomenetworksecure
Slicksheet best practicesforkeepingyourhomenetworksecure
 

Ähnlich wie Fasoo Secure Document for FileNet 2014-2Q

Seclore FileSecure IBM Filenet Walkthrough
Seclore FileSecure IBM Filenet WalkthroughSeclore FileSecure IBM Filenet Walkthrough
Seclore FileSecure IBM Filenet Walkthroughsiddarthc
 
FinalCode-At-A-Glance-Webcopy-Optimized
FinalCode-At-A-Glance-Webcopy-OptimizedFinalCode-At-A-Glance-Webcopy-Optimized
FinalCode-At-A-Glance-Webcopy-OptimizedPhillip Stalnaker
 
Karomi Brand Asset Management
Karomi Brand Asset ManagementKaromi Brand Asset Management
Karomi Brand Asset ManagementKaromi Technology
 
IRM Secure on SecuLogica Technical Whitepaper
IRM Secure on SecuLogica Technical WhitepaperIRM Secure on SecuLogica Technical Whitepaper
IRM Secure on SecuLogica Technical WhitepaperJim Kitchen
 
The Enterprise File Fabric for Media & Entertainment Industry | Solution Brief
The Enterprise File Fabric for Media & Entertainment Industry | Solution BriefThe Enterprise File Fabric for Media & Entertainment Industry | Solution Brief
The Enterprise File Fabric for Media & Entertainment Industry | Solution BriefHybrid Cloud
 
Remote Working: On-cloud and On-premises Remote Collaboration and File Sharin...
Remote Working: On-cloud and On-premises Remote Collaboration and File Sharin...Remote Working: On-cloud and On-premises Remote Collaboration and File Sharin...
Remote Working: On-cloud and On-premises Remote Collaboration and File Sharin...Hybrid Cloud
 
The Enterprise File Fabric for Healthcare and Genomics | SME Solution Brief
The Enterprise File Fabric for Healthcare and Genomics | SME Solution BriefThe Enterprise File Fabric for Healthcare and Genomics | SME Solution Brief
The Enterprise File Fabric for Healthcare and Genomics | SME Solution BriefHybrid Cloud
 
Cryptolab cse datasheet v1.1.pdf
Cryptolab cse datasheet v1.1.pdfCryptolab cse datasheet v1.1.pdf
Cryptolab cse datasheet v1.1.pdfMassimo Bertaccini
 
Intelligent Security, Compliance and Privacy in Office 365
Intelligent Security, Compliance and Privacy in Office 365Intelligent Security, Compliance and Privacy in Office 365
Intelligent Security, Compliance and Privacy in Office 365Miguel Isidoro
 
The Enterprise File Fabric for Mirantis
The Enterprise File Fabric for MirantisThe Enterprise File Fabric for Mirantis
The Enterprise File Fabric for MirantisHybrid Cloud
 
M-Stream® File Transfer Acceleration | Solution Brief
M-Stream® File Transfer Acceleration | Solution BriefM-Stream® File Transfer Acceleration | Solution Brief
M-Stream® File Transfer Acceleration | Solution BriefHybrid Cloud
 
Secure Enterprise Content Management and File Management for the Legal Sector...
Secure Enterprise Content Management and File Management for the Legal Sector...Secure Enterprise Content Management and File Management for the Legal Sector...
Secure Enterprise Content Management and File Management for the Legal Sector...Hybrid Cloud
 
Secure File Sharring-owncloud.pptx
Secure File Sharring-owncloud.pptxSecure File Sharring-owncloud.pptx
Secure File Sharring-owncloud.pptxAgusto Sipahutar
 
The Enterprise File Fabric for Vecima MediaScaleX
The Enterprise File Fabric for Vecima MediaScaleXThe Enterprise File Fabric for Vecima MediaScaleX
The Enterprise File Fabric for Vecima MediaScaleXHybrid Cloud
 
Enterprise solution for backup, access and sharing data
Enterprise solution for backup, access and sharing dataEnterprise solution for backup, access and sharing data
Enterprise solution for backup, access and sharing dataSoftControl.net Ltd.
 
CloudControl - Enterprise backup, access and collaboartion solution from Soft...
CloudControl - Enterprise backup, access and collaboartion solution from Soft...CloudControl - Enterprise backup, access and collaboartion solution from Soft...
CloudControl - Enterprise backup, access and collaboartion solution from Soft...ILYA ROITMAN
 
Presentation Australia
Presentation AustraliaPresentation Australia
Presentation AustraliaGreg Lennon
 
Acronis access for blaud event
Acronis access for blaud eventAcronis access for blaud event
Acronis access for blaud eventBLAUD
 

Ähnlich wie Fasoo Secure Document for FileNet 2014-2Q (20)

Seclore FileSecure IBM Filenet Walkthrough
Seclore FileSecure IBM Filenet WalkthroughSeclore FileSecure IBM Filenet Walkthrough
Seclore FileSecure IBM Filenet Walkthrough
 
FinalCode-At-A-Glance-Webcopy-Optimized
FinalCode-At-A-Glance-Webcopy-OptimizedFinalCode-At-A-Glance-Webcopy-Optimized
FinalCode-At-A-Glance-Webcopy-Optimized
 
Karomi Brand Asset Management
Karomi Brand Asset ManagementKaromi Brand Asset Management
Karomi Brand Asset Management
 
IRM Secure on SecuLogica Technical Whitepaper
IRM Secure on SecuLogica Technical WhitepaperIRM Secure on SecuLogica Technical Whitepaper
IRM Secure on SecuLogica Technical Whitepaper
 
The Enterprise File Fabric for Media & Entertainment Industry | Solution Brief
The Enterprise File Fabric for Media & Entertainment Industry | Solution BriefThe Enterprise File Fabric for Media & Entertainment Industry | Solution Brief
The Enterprise File Fabric for Media & Entertainment Industry | Solution Brief
 
Remote Working: On-cloud and On-premises Remote Collaboration and File Sharin...
Remote Working: On-cloud and On-premises Remote Collaboration and File Sharin...Remote Working: On-cloud and On-premises Remote Collaboration and File Sharin...
Remote Working: On-cloud and On-premises Remote Collaboration and File Sharin...
 
The Enterprise File Fabric for Healthcare and Genomics | SME Solution Brief
The Enterprise File Fabric for Healthcare and Genomics | SME Solution BriefThe Enterprise File Fabric for Healthcare and Genomics | SME Solution Brief
The Enterprise File Fabric for Healthcare and Genomics | SME Solution Brief
 
Cryptolab cse datasheet v1.1.pdf
Cryptolab cse datasheet v1.1.pdfCryptolab cse datasheet v1.1.pdf
Cryptolab cse datasheet v1.1.pdf
 
Intelligent Security, Compliance and Privacy in Office 365
Intelligent Security, Compliance and Privacy in Office 365Intelligent Security, Compliance and Privacy in Office 365
Intelligent Security, Compliance and Privacy in Office 365
 
The Enterprise File Fabric for Mirantis
The Enterprise File Fabric for MirantisThe Enterprise File Fabric for Mirantis
The Enterprise File Fabric for Mirantis
 
M-Stream® File Transfer Acceleration | Solution Brief
M-Stream® File Transfer Acceleration | Solution BriefM-Stream® File Transfer Acceleration | Solution Brief
M-Stream® File Transfer Acceleration | Solution Brief
 
Document management and collaboration system
Document management and collaboration systemDocument management and collaboration system
Document management and collaboration system
 
Secure Enterprise Content Management and File Management for the Legal Sector...
Secure Enterprise Content Management and File Management for the Legal Sector...Secure Enterprise Content Management and File Management for the Legal Sector...
Secure Enterprise Content Management and File Management for the Legal Sector...
 
FILR Demo
FILR DemoFILR Demo
FILR Demo
 
Secure File Sharring-owncloud.pptx
Secure File Sharring-owncloud.pptxSecure File Sharring-owncloud.pptx
Secure File Sharring-owncloud.pptx
 
The Enterprise File Fabric for Vecima MediaScaleX
The Enterprise File Fabric for Vecima MediaScaleXThe Enterprise File Fabric for Vecima MediaScaleX
The Enterprise File Fabric for Vecima MediaScaleX
 
Enterprise solution for backup, access and sharing data
Enterprise solution for backup, access and sharing dataEnterprise solution for backup, access and sharing data
Enterprise solution for backup, access and sharing data
 
CloudControl - Enterprise backup, access and collaboartion solution from Soft...
CloudControl - Enterprise backup, access and collaboartion solution from Soft...CloudControl - Enterprise backup, access and collaboartion solution from Soft...
CloudControl - Enterprise backup, access and collaboartion solution from Soft...
 
Presentation Australia
Presentation AustraliaPresentation Australia
Presentation Australia
 
Acronis access for blaud event
Acronis access for blaud eventAcronis access for blaud event
Acronis access for blaud event
 

Mehr von Jason Sohn

Fasoo Digital Intelligence 2020 - 장일수
Fasoo Digital Intelligence 2020 - 장일수Fasoo Digital Intelligence 2020 - 장일수
Fasoo Digital Intelligence 2020 - 장일수Jason Sohn
 
Fasoo Digital Intelligence 2020 - 윤화섭
Fasoo Digital Intelligence 2020 - 윤화섭Fasoo Digital Intelligence 2020 - 윤화섭
Fasoo Digital Intelligence 2020 - 윤화섭Jason Sohn
 
Fasoo Digital Intelligence 2020 - 윤덕상
Fasoo Digital Intelligence 2020 - 윤덕상Fasoo Digital Intelligence 2020 - 윤덕상
Fasoo Digital Intelligence 2020 - 윤덕상Jason Sohn
 
Fasoo Digital Intelligence 2020 - 김용길
Fasoo Digital Intelligence 2020 - 김용길Fasoo Digital Intelligence 2020 - 김용길
Fasoo Digital Intelligence 2020 - 김용길Jason Sohn
 
Fasoo Digital Intelligence 2020 - 김규봉
Fasoo Digital Intelligence 2020 - 김규봉Fasoo Digital Intelligence 2020 - 김규봉
Fasoo Digital Intelligence 2020 - 김규봉Jason Sohn
 
Fasoo Digital Intelligence 2020 - 조규곤
Fasoo Digital Intelligence 2020 - 조규곤Fasoo Digital Intelligence 2020 - 조규곤
Fasoo Digital Intelligence 2020 - 조규곤Jason Sohn
 
AP Security Solution Providers Consortium Webinar - Fasoo Session Decks
AP Security Solution Providers Consortium Webinar - Fasoo Session DecksAP Security Solution Providers Consortium Webinar - Fasoo Session Decks
AP Security Solution Providers Consortium Webinar - Fasoo Session DecksJason Sohn
 
Build Security into the Software with Sparrow
Build Security into the Software with SparrowBuild Security into the Software with Sparrow
Build Security into the Software with SparrowJason Sohn
 

Mehr von Jason Sohn (8)

Fasoo Digital Intelligence 2020 - 장일수
Fasoo Digital Intelligence 2020 - 장일수Fasoo Digital Intelligence 2020 - 장일수
Fasoo Digital Intelligence 2020 - 장일수
 
Fasoo Digital Intelligence 2020 - 윤화섭
Fasoo Digital Intelligence 2020 - 윤화섭Fasoo Digital Intelligence 2020 - 윤화섭
Fasoo Digital Intelligence 2020 - 윤화섭
 
Fasoo Digital Intelligence 2020 - 윤덕상
Fasoo Digital Intelligence 2020 - 윤덕상Fasoo Digital Intelligence 2020 - 윤덕상
Fasoo Digital Intelligence 2020 - 윤덕상
 
Fasoo Digital Intelligence 2020 - 김용길
Fasoo Digital Intelligence 2020 - 김용길Fasoo Digital Intelligence 2020 - 김용길
Fasoo Digital Intelligence 2020 - 김용길
 
Fasoo Digital Intelligence 2020 - 김규봉
Fasoo Digital Intelligence 2020 - 김규봉Fasoo Digital Intelligence 2020 - 김규봉
Fasoo Digital Intelligence 2020 - 김규봉
 
Fasoo Digital Intelligence 2020 - 조규곤
Fasoo Digital Intelligence 2020 - 조규곤Fasoo Digital Intelligence 2020 - 조규곤
Fasoo Digital Intelligence 2020 - 조규곤
 
AP Security Solution Providers Consortium Webinar - Fasoo Session Decks
AP Security Solution Providers Consortium Webinar - Fasoo Session DecksAP Security Solution Providers Consortium Webinar - Fasoo Session Decks
AP Security Solution Providers Consortium Webinar - Fasoo Session Decks
 
Build Security into the Software with Sparrow
Build Security into the Software with SparrowBuild Security into the Software with Sparrow
Build Security into the Software with Sparrow
 

Kürzlich hochgeladen

Xen Safety Embedded OSS Summit April 2024 v4.pdf
Xen Safety Embedded OSS Summit April 2024 v4.pdfXen Safety Embedded OSS Summit April 2024 v4.pdf
Xen Safety Embedded OSS Summit April 2024 v4.pdfStefano Stabellini
 
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEBATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEOrtus Solutions, Corp
 
What are the key points to focus on before starting to learn ETL Development....
What are the key points to focus on before starting to learn ETL Development....What are the key points to focus on before starting to learn ETL Development....
What are the key points to focus on before starting to learn ETL Development....kzayra69
 
Unveiling the Future: Sylius 2.0 New Features
Unveiling the Future: Sylius 2.0 New FeaturesUnveiling the Future: Sylius 2.0 New Features
Unveiling the Future: Sylius 2.0 New FeaturesŁukasz Chruściel
 
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024StefanoLambiase
 
React Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief UtamaReact Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief UtamaHanief Utama
 
Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Andreas Granig
 
MYjobs Presentation Django-based project
MYjobs Presentation Django-based projectMYjobs Presentation Django-based project
MYjobs Presentation Django-based projectAnoyGreter
 
Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...
Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...
Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...Matt Ray
 
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio, Inc.
 
SpotFlow: Tracking Method Calls and States at Runtime
SpotFlow: Tracking Method Calls and States at RuntimeSpotFlow: Tracking Method Calls and States at Runtime
SpotFlow: Tracking Method Calls and States at Runtimeandrehoraa
 
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样umasea
 
Cyber security and its impact on E commerce
Cyber security and its impact on E commerceCyber security and its impact on E commerce
Cyber security and its impact on E commercemanigoyal112
 
Odoo 14 - eLearning Module In Odoo 14 Enterprise
Odoo 14 - eLearning Module In Odoo 14 EnterpriseOdoo 14 - eLearning Module In Odoo 14 Enterprise
Odoo 14 - eLearning Module In Odoo 14 Enterprisepreethippts
 
Buds n Tech IT Solutions: Top-Notch Web Services in Noida
Buds n Tech IT Solutions: Top-Notch Web Services in NoidaBuds n Tech IT Solutions: Top-Notch Web Services in Noida
Buds n Tech IT Solutions: Top-Notch Web Services in Noidabntitsolutionsrishis
 
How to submit a standout Adobe Champion Application
How to submit a standout Adobe Champion ApplicationHow to submit a standout Adobe Champion Application
How to submit a standout Adobe Champion ApplicationBradBedford3
 
PREDICTING RIVER WATER QUALITY ppt presentation
PREDICTING  RIVER  WATER QUALITY  ppt presentationPREDICTING  RIVER  WATER QUALITY  ppt presentation
PREDICTING RIVER WATER QUALITY ppt presentationvaddepallysandeep122
 
What is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWhat is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWave PLM
 
Balasore Best It Company|| Top 10 IT Company || Balasore Software company Odisha
Balasore Best It Company|| Top 10 IT Company || Balasore Software company OdishaBalasore Best It Company|| Top 10 IT Company || Balasore Software company Odisha
Balasore Best It Company|| Top 10 IT Company || Balasore Software company Odishasmiwainfosol
 

Kürzlich hochgeladen (20)

Xen Safety Embedded OSS Summit April 2024 v4.pdf
Xen Safety Embedded OSS Summit April 2024 v4.pdfXen Safety Embedded OSS Summit April 2024 v4.pdf
Xen Safety Embedded OSS Summit April 2024 v4.pdf
 
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEBATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
 
What are the key points to focus on before starting to learn ETL Development....
What are the key points to focus on before starting to learn ETL Development....What are the key points to focus on before starting to learn ETL Development....
What are the key points to focus on before starting to learn ETL Development....
 
Unveiling the Future: Sylius 2.0 New Features
Unveiling the Future: Sylius 2.0 New FeaturesUnveiling the Future: Sylius 2.0 New Features
Unveiling the Future: Sylius 2.0 New Features
 
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
 
React Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief UtamaReact Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief Utama
 
Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024
 
MYjobs Presentation Django-based project
MYjobs Presentation Django-based projectMYjobs Presentation Django-based project
MYjobs Presentation Django-based project
 
Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...
Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...
Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...
 
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
 
SpotFlow: Tracking Method Calls and States at Runtime
SpotFlow: Tracking Method Calls and States at RuntimeSpotFlow: Tracking Method Calls and States at Runtime
SpotFlow: Tracking Method Calls and States at Runtime
 
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
 
Cyber security and its impact on E commerce
Cyber security and its impact on E commerceCyber security and its impact on E commerce
Cyber security and its impact on E commerce
 
Odoo 14 - eLearning Module In Odoo 14 Enterprise
Odoo 14 - eLearning Module In Odoo 14 EnterpriseOdoo 14 - eLearning Module In Odoo 14 Enterprise
Odoo 14 - eLearning Module In Odoo 14 Enterprise
 
Buds n Tech IT Solutions: Top-Notch Web Services in Noida
Buds n Tech IT Solutions: Top-Notch Web Services in NoidaBuds n Tech IT Solutions: Top-Notch Web Services in Noida
Buds n Tech IT Solutions: Top-Notch Web Services in Noida
 
How to submit a standout Adobe Champion Application
How to submit a standout Adobe Champion ApplicationHow to submit a standout Adobe Champion Application
How to submit a standout Adobe Champion Application
 
PREDICTING RIVER WATER QUALITY ppt presentation
PREDICTING  RIVER  WATER QUALITY  ppt presentationPREDICTING  RIVER  WATER QUALITY  ppt presentation
PREDICTING RIVER WATER QUALITY ppt presentation
 
Advantages of Odoo ERP 17 for Your Business
Advantages of Odoo ERP 17 for Your BusinessAdvantages of Odoo ERP 17 for Your Business
Advantages of Odoo ERP 17 for Your Business
 
What is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWhat is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need It
 
Balasore Best It Company|| Top 10 IT Company || Balasore Software company Odisha
Balasore Best It Company|| Top 10 IT Company || Balasore Software company OdishaBalasore Best It Company|| Top 10 IT Company || Balasore Software company Odisha
Balasore Best It Company|| Top 10 IT Company || Balasore Software company Odisha
 

Fasoo Secure Document for FileNet 2014-2Q

  • 1. Copyright © 2014 Fasoo Fasoo protects, controls and tracks FileNet documents persistently no matter where they are Your Data at Rest, in Transit or in Use Must be Encrypted Continuously! Data-Centric Security Solution for FileNet
  • 2. Copyright © 2014 Fasoo Lifecycle Management Workflow & Routing Library Services Archive Search Security & Access Management Thousands of organizations use FileNet to increase efficiency, improve control of information and reduce overall cost of information management. o organizations still maintain control of FileNet documents that have left protective confines of repository? fter documents are downloaded, FileNet’s perimeter security is no longer effective, and organizations lose control of their digital assets. D Content Create Reuse Control Access A
  • 3. Copyright © 2014 Fasoo • Millions of confidential files are exposed by current and former employees each year • 80% increase in insider theft in 2013 from 2012 (idtheftcenter.org) • 58% of information security incidents attributed to insider threats (infosecurity-magazine.com) • 29% of total thefts are employees stealing business ideas (universalshredding.com) After FileNet documents are downloaded by users, the documents can be read, saved and printed by any user without restrictions, thus risk of data loss increases dramatically. Competitors Viewed, Distributed FileNet Documents are stored, shared and managed within FileNet After legitimately downloading a FileNet document, a user can use and share the document without any restriction Copied, Edited and Printed Authentication Partners/Contractors Prospects Viewed, Distributed
  • 4. Copyright © 2014 Fasoo • FileNet alone cannot provide persistent protection throughout the document lifecycle • There is no way to track user/file activities of FileNet documents after files are downloaded • Legitimately downloaded FileNet documents can easily be copied and printed by or shared with unauthorized users • Local copies of FileNet documents should be protected from unauthorized screen capture attempts • Derivatives of FileNet documents created at a PC should also be protected FileNet can increase efficiency, improve control of information and reduce overall cost of information management of organizations, but cannot provide sufficient security at all times. • Protecting and tracing FileNet documents beyond controlled boundaries at all times • Ensuring FileNet documents are only accessed by the intended audience with appropriate access privileges • Leveraging existing FileNet security permissions (e.g., View Content, Modify Content) for data security • Applying automatic encryption policy based on FileNet security classification (e.g., Confidential, Strictly Confidential) • Revoke access of FileNet documents that have been distributed when required Fasoo’s data-centric security solution safeguards and prevents unauthorized use of FileNet documents and provides persistent and reliable protection of data at rest, in transit or in use.
  • 5. Copyright © 2014 Fasoo • Automatically encrypting (encapsulating) a classified FileNet document at download • Applying granular access controls (permission) to FileNet documents at all times ‐ Who can access, ‐ What actions can be done to the file (e.g. edit, print, screen capture, etc.) • Providing audit trails of protected FileNet documents, including files that have already been distributed • No need to setup additional DRM policies for FileNet object store folders Fasoo Enterprise DRM persistently protects, controls and tracks FileNet documents no matter where they are FileNet Based on the security classification of the FileNet document, it is automatically encrypted upon download A user can access a document without any restriction A user without proper credentials cannot access the document A user can access a document with limited permissions FSD Server Revoked – Disconnected access to the document Unclassified Document Confidential Document
  • 6. Copyright © 2014 Fasoo FSD for FileNet | Defining Target FileNet Object Store Folders for Encryption • To set a target object store folder to encrypt FileNet documents at download, administrators can specify the object storefolder path in the FSD administration console as shown below • All classified FileNet documents under the target directory will be automatically encrypted at download without user intervention • Once the protection is applied, the policy travels with the documents, whether the documents are at rest, in transit, or even in use
  • 7. Copyright © 2014 Fasoo FSD for FileNet | Defining Auto Encryption Policy based on Security Classification • FSD allows an administrator to set an encryption policy based on FileNet security classification • For example, if users select “Confidential” or “Strictly Confidential” security classification, the file will be encrypted at download • If the document is classified as “Unclassified”, the file will not be encrypted Not Encrypted at Download Encrypted at Download
  • 8. Copyright © 2014 Fasoo FSD for FileNet | Setting up DRM Policy for FileNet Documents • Instead of setting up a separate DRM policy to FileNet object store folders or files, administrators can map any combination of DRM permissions (e.g., View, Edit, Print…) on the existing FileNet permissions (security level), such as View Content, Modify Content or Owner Control • As a result, FileNet users will have different access privileges to the protected documents depending on their FileNet credentials *FileNet Security Level: Owner Control, Promote Version, Modify Content, View Content, etc. FileNet Security Level Fasoo DRM Permission
  • 9. Copyright © 2014 Fasoo FSD for FileNet | Protecting FileNet Documents Continuously • When a classified FileNet document is downloaded from a Fasoo-protected object store folder, the document will be encrypted automatically, and a Fasoo lock icon is displayed on the file as shown below • The local copy of a protected document will retain the security control of FileNet at all times, thus only authorized FileNetusers can access the document based on their FileNet credentials
  • 10. Copyright © 2014 Fasoo FSD for FileNet | Protecting Derivative Files of FileNet Documents • In general, FileNet users with Modify Content permission will have View and Edit rights to the protected documents, and willbe restricted from printing, screen capturing or decrypting the files • When the users attempt to save a protected Excel file as a PDF file, the converted PDF file will maintain the DRM policy of the Excel file, and users will have the same limited access to the PDF file Save As
  • 11. Copyright © 2014 Fasoo FSD for FileNet | Preventing Unauthorized Content Extract of FileNet Documents • FileNet users with Modify Content permission can view and edit protected documents, but unauthorized copy and paste actions are disallowed • A user with Modify Content permission may copy content from a protected document, but cannot paste it to a unprotected document • Copy and paste actions are only allowed between protected documents unless the users have Decrypt permission to the protecteddocuments
  • 12. Copyright © 2014 Fasoo FSD for FileNet | Preventing Unauthorized Screen Capture of FileNet Documents • Unauthorized screen capture attempts should not be allowed while accessing protected documents • To prevent unauthorized screen capture, Fasoo adds a masking layer to captured images of protected documents • When users are accessing protected documents, some capture tools may be restricted from use • Accessing protected documents in virtual machines and web conferencing tools may be restricted depending on users’ credentials
  • 13. Copyright © 2014 Fasoo FSD for FileNet | Allowing Offline Access to FileNet Documents • Although it is not recommended, offline access may be granted to specific users and groups • Users with offline access may access protected documents with given permissions without connecting to the policy server • User/file activities are collected by the DRM Client while users are offline, and sent to the policy server when users are back online
  • 14. Copyright © 2014 Fasoo FSD for FileNet | Tracking User Activities of FileNet Documents • Every usage log of protected FileNet documents is sent to the policy server, even when the document has been used offline, the usage log will be sent to the server when the device is re-connected • The FSD administration console offers suitable tools for the document owner or administrator to review and audit activities of users and documents including user ID, file name, accessed rights, IP address, time & date, etc.
  • 15. Copyright © 2014 Fasoo FSD for FileNet | Accessing Protected FileNet Documents on Mobile Devices • Protected FileNet documents can be securely accessed on iOS or Android mobile devices using Fasoo Mobile Solution • Fasoo Mobile Solution consists of a gateway that normally sits in the DMZ and relays permission requests to the policy server, and mobile app which can be installed on mobile devices via App Store and Android Market • After proper user authentication and permission validation processes, mobile users can access the protected documents with screen watermark (e.g., company logo, file name, user ID, time & date, etc.), and mobile access logs are collected and managed at the server
  • 16. Copyright © 2014 Fasoo • Organizations that need to have employees share sensitive files internally according to set security polices for users, groups, departments, etc. • Organizations that have employees who frequently work outside of the office or often go on business trips • Organizations with high employee turnover that work with valuable intellectual property Who needs this solution? Customer Benefits Raising Competitive AdvantageOptimizing Productivity | Building reputation & gaining customer trust Complying w/ regulations Protecting sensitive information to prevent data breach events Simplifying secure inter-organizational collaboration Encrypting automatically based on security classifications without user intervention Offering flexibilities to users to improve productivity Enabling better managed workflows via data-centric security
  • 17. Copyright © 2014 Fasoo Business Area Sharing and Collaborating Internally Printing and Displaying Your Files Collaborating with Partners & Customers Sharing and Syncing Files in the CloudSharing Files to Your Mobile Device Monitor with Pattern Based Strategy Fasoo Secure Node (FSN) Secure all files created and saved on any PC Fasoo Secure Document (FSD) Securely share sensitive files downloaded from repositories. Integrate easily with Microsoft SharePoint, IBM FileNet, etc. Fasoo Secure Exchange (FSE) Share sensitive files securely through email, FTP, USB, the cloud and more Fasoo Mobile Solution (FMS) Prevents data breaches with Mobile Data and Access Management (MDAM) Fasoo Usage Tracer (FUT) Monitor and manage user/file activities through usage log analysis Fasoo Secure Print (FSP) Trace printing activities and help deter leaks of printouts by mandating the use of watermarks Fasoo ePrint Manage and control all printouts for a secure and efficient printing environment Fasoo Secure Screen (FSS) Safeguard the content on your screen from capture tools and cameras DigitalQuick Securely sync, store, and share files in the cloud, desktop and mobile device
  • 18. Copyright © 2014 Fasoo Fasoo has been successfully building its worldwide reputation as an EDRM (enterprise digital rights management a.k.a. information rights management, IRM) solution provider with industry leading solutions and services. Fasoo solutions allow organizations to prevent unintended information disclosure or exposure, ensure a secure information-sharing environment, better manage workflows and simplify secure collaboration internally and externally. Fasoo Enterprise DRM, a data-centric security solution safeguards and prevents unauthorized use of digital files and provides persistent and reliable protection of the documents with effective file encryption, permission control and audit trail technologies. Fasoo has successfully retained its leadership in the EDRM market by deploying solutions for more than 1,200 organizations in enterprise-wide level, securing more than 2 million users. About Fasoo US Headquarters 197 State Route 18 South, East Brunswick, NJ 08817, USA Global Headquarters 396 WorldCupbuk-ro, Mapo-gu, Seoul 121-795, South Korea Web: www.fasoo.com Email: inquiry@fasoo.com Phone: (408) 389-3097 (US HQ) | +82-2-300-9000 (Global HQ)