Search
English Korean Japanese Partner Portal Contact

Most Recent

navigation
  • Download The Latest Ponemon Report on How Company Insiders Put High Value Information at Risk

    Fasoo partnered with the Ponemon Institute to present: "Risky Business: How Company Insiders Put High Value Information at Risk". About 640 IT security practitioners familiar with their organization's approach to protecting data, documents and files against cyberattacks were surveyed and found that: 56% say company insiders are the primary cause of data breaches 72% are not confident they can manage and control employee access to confidential files 70% do not know the location of confidential information 73% believe they lost confidential information in the past 12 months Some other highlights of this report are that Sales, C-level executives, Finance and Human Resources departments pose the greatest risk to high-value data, while 83% struggle with determining the approrpriate level of confidentiality documents and files should possess. .main .wrap .column.right .container.article .articleView .articleText ul.resourceItem { display: none; }

    06/13/2016 Resources 06/13/2016
  • The Security Blueprint for Your Data

    An overview on Fasoo's Data Security Framework. The Fasoo data security framework consists of a three-tiered suite of solutions to strengthen information security. The Fasoo Enterprise DRM (FED) suite plays a pivotal role to enforce security policy on data among three layers of data protection. At the front-end, Fasoo eData Manager discovers and classifies the data, reapply policy to the data unprotected due to policy exceptions and exclusions. At the back-end, Fasoo RiskView enables organizations to manage risks holistically by collecting and analyzing logs of data usage and various sources that can be useful. This multi-layered approach enhances and completes an organization's security framework.

    02/25/2016 Products/Solutions 02/25/2016
  • Digital Intelligence for Security and Productivity

    About Fasoo - Who are we? At Fasoo, our main goal is to provide you with more robust and scalable data and application security, as well as mobile security to liberate people and businesses from various risks and constraints in their digital life and business. Fasoo plans to deliver exceptional value through our software to our customers and gain credit by developing software of true value that is recognized all around the world. As a leader within the Digital Rights Management industry, we continue to challenge ourselves and expand into new business areas to provide you with high quality software. Fasoo has developed competitive products and DRM solutions to succeed in the constantly changing IT environment and promises to meet the challenges to provide you with the software you need to secure your data and tackle security threats and unwanted limitations in this environment. Our Vision Our vision provides us with the framework to guide every aspect of our business. By 2020, Fasoo aims to be a global top 100 software company, produce four global software products along with two global number one products, have Fasoo Enterprise DRM be part of every business application and have our source code analysis tool, SPARROW on every developer’s desktop. These are just some of the visions we aim to accomplish in order to achieve sustainable, quality growth.

    03/01/2016 About Fasoo 03/01/2016
  • Persistent Data Security Solution for Any Business Environment

    An overview on Fasoo Enterprise DRM. How secure are your files? What would happen to your business if a file with sensitive information were to leave your organization? Can you afford not to have the best protection solutions? Fasoo Enterprise DRM (Digital Rights Management) protects the file itself to provide a more secure work environment. Fasoo Enterprise DRM is a file-based security solution that prevents the exposure of sensitive and confidential files by trusted insiders, business partners, customers and unauthorized people. Here is the problem with traditional content management systems: People can easily access sensitive business information from mobile, cloud or virtual environments. This allows us to communicate and collaborate more conveniently, but increases the risk of losing our trade secrets, classified documents and PII (Personally Identifiable Information) with just one click. Against these threats, file-based security such as information rights management is the best solution to protect you from information leaks. Documents are secure while they remain in a controlled boundary, like a content management system. DLP (Data Loss Prevention), firewalls, intrusion detection and intrusion prevention systems can protect information from outside attacks or potentially stop sensitive information from leaving an organization. These solutions can’t stop everything and increase the complexity of the network infrastructure. Authorized people inside your organization can send out sensitive information by mistake or deliberately. That information is no longer secure once it leaves your organization. Persistent File-based Security for Any Business Environment Fasoo Enterprise DRM protects, controls, and traces sensitive files containing intellectual property, trade secrets, PII, and more. It maintains file protection and prevents unintended information disclosure no matter where it is. In contrast with conventional security solutions, Fasoo Enterprise DRM protects information itself persistently whether it is stored, being used, being transmitted, or even after transmission, throughout the entire document lifecycle. This is the only complete and effective solution that protects you against unwanted information leaks from anyone. Fasoo Enterprise DRM uses an encryption in their solutions that is certified from Korea's National Intelligence Service (NIS), to protect and manage sensitive documents in any environment whether it is saved to a PC, downloaded from a server, printed, or sent by email. Fasoo Enterprise DRM is an essential security infrastructure component for every enterprise application system as mobile and cloud computing diversify and expand the enterprise IT environment. With Fasoo Enterprise DRM, organizations can safely share confidential documents internally and externally, freeing themselves of any concern about unintended information loss. Fasoo Enterprise DRM Key Facts Global leader in enterprise DRM First company in the world to commercialize DRM as a product World’s largest enterprise DRM customer base Fasoo is the only company that has developed and equipped their encryption module “Fasoo Crypto Framework” with a National Intelligence Service certified encryption technology Supports any environment where files are distributed Can be integrated with information systems such as ECM, ERP, PLM and more Extend security to mobile and cloud environments Deployed to more than 1,100 organizations, with over 2 million users around the world In 2014, Fasoo was awarded as a winner in the Security Products and Solutions for Enterprise (Large) category at Info Security Products Guide's Golbal Excellence Awards In 2011, Fasoo was awarded with the ‘2011 Global Digital Rights Management Competitive Strategy Innovation of the Year’ from global research and consulting company, Frost and Sullivan In 2010, Fasoo was referenced as one of the “Global Top 6 DRM Companies” in an Aberdeen Group Report In 2010, Fasoo was the only Asian company to be referred as one of the “Global Enterprise DRM Top 7 Vendors’ from world renowned global research & consulting company, Gartner.

    02/02/2016 Products/Solutions 02/02/2016
  • Location

    US Headquarters 197 State Route 18 South, Suite 203N East Brunswick, NJ 08816 Phone: (732) 955-2333 Korea Headquarters 396 World Cup Buk-ro Nuritkum Square Business Tower, 17th Floor Sangam-dong, Mapo-gu, Seoul, South Korea 121-795 Tel : +82-2-300-9000 Fax : +82-2-300-9400 Korea Regional Office EWR Building, 10th Floor, 1330-8 Seocho-gu, Seoul, South Korea 137-858 Tel : +82-2-300-9190 Fax : +82-2-300-9405 function initialize() { var mapDiv = document.getElementById('fmap1'); var map = new google.maps.Map(mapDiv, { center: new google.maps.LatLng(37.579702,126.890266), zoom: 18, mapTypeId: google.maps.MapTypeId.ROADMAP }); var content = '17th FL, Nuritkum Square Business'; var infowindow = new google.maps.InfoWindow({ content: content }); var marker = new google.maps.Marker({ map: map, position: map.getCenter(), draggable: true }); infowindow.open(map, marker); } function initialize2() { var mapDiv = document.getElementById('fmap2'); var map = new google.maps.Map(mapDiv, { center: new google.maps.LatLng(37.492669,127.028346), zoom: 18, mapTypeId: google.maps.MapTypeId.ROADMAP }); var content = 'EWR Building 10th Floor'; var infowindow = new google.maps.InfoWindow({ content: content }); var marker = new google.maps.Marker({ map: map, position: map.getCenter(), draggable: true }); infowindow.open(map, marker); } function initialize3() { var mapDiv = document.getElementById('fmap3'); var map = new google.maps.Map(mapDiv, { center: new google.maps.LatLng(40.4691587,-74.4084256), zoom: 18, mapTypeId: google.maps.MapTypeId.ROADMAP }); var content = 'Fasoo USA Inc'; var infowindow = new google.maps.InfoWindow({ content: content }); var marker = new google.maps.Marker({ map: map, position: map.getCenter(), draggable: true }); infowindow.open(map, marker); } google.maps.event.addDomListener(window, 'load', initialize); google.maps.event.addDomListener(window, 'load', initialize2); google.maps.event.addDomListener(window, 'load', initialize3);

    01/01/2016 About Fasoo 01/01/2016
  • Fasoo Solution Overview

    Lead Digital, Fasoo Fasoo provides strategic intelligence for digital business in the areas of data security, application security, digital content management and cloud services. Data Security In this time in the digital era, data breaches are unstoppable because business data is freely distributed without any concern for internal/external corporate boundaries, through insider information disclosure and by APT attacks. Fasoo provides data-centric security to protect data as it travels both within the organizational perimeter and beyond by limiting access to sensitive data according to policies that cover both users and activities. Fasoo Data Security Framework Fasoo Data Security Framework helps organizations discover, classify and protect sensitive data so that you control who can access it, regardless of location. It discovers and classifies sensitive files automatically and encrypts them as you create them on the desktop, localize them from databases or download them from information systems. Dynamic security policies travel with the files and apply permission controls that grant or deny users the right to View, Edit, Copy, Paste, Print or Decrypt the files. If any unauthorized user got access to the file, they could not read the information inside. You can analyze how users copy, move and access files over time. This allows you to prevent unauthorized activity, detect suspicious behavior patterns that suggest APTs and take action before it’s too late. Fasoo Enterprise DRM Fasoo Enterprise DRM (Digital Rights Management) is an award winning persistent data security solution for protecting, controlling and tracing data throughout the enterprise – including data at rest, data in use, and data in motion – according to predefined policies based on user, group or role, or dynamically binding existing access control lists of information systems to enable file-level permissions at all times. Fasoo Enterprise DRM has been deployed to over 1,200 organization enterprise-wide, securing more than 2.5 million users. Fasoo Secure Node (FSN) - ​​When sharing and collaborating internally, FSN allows you to secure, control and track sensitive documents created and used on endpoints. Fasoo Secure Document (FSD) - When sharing and collaborating, FSD allows you to secure, control and track sensitive ECM, ERP, groupware and other related documents beyond its controlled boundaries. Fasoo Secure Exchange (FSE) - When collaborating with partners and customers, FSE allows you to secure, control and track sensitive documents shared with external users. Fasoo Secure Print (FSP) - When printing your files, FSP allows you to trace printing activities and deter information leaks through printouts. Fasoo Secure Document for IBM ECM (FSD for IBM ECM) - When extending security perimeter of your ECM, FSD for IBM ECM allows you to secure, control and track documents beyond controlled boundaries of IBM ECM. Fasoo Secure Document for SharePoint (FSD for SharePoint) - When extending security perimeter of your ECM, FSD for SharePoint allows you to secure, control and track documents beyond controlled boundaries of SharePoint. Fasoo Secure Screen (FSS) - When displaying your files on your screen, FSS prevents and deters security breaches through your screen. Fasoo Usage Tracer - When monitoring and analyzing your data, Fasoo Usage Tracer allows you to monitor and analyze user/file activities, and optimize existing security policies. Fasoo Mobile Gateway - When sharing your files to your mobile device, Fasoo Mobile Gateway allows you to extend file based security from your PC to your mobile device. Fasoo View/Fasoo View Plus - When viewing Fasoo Enterprise DRM files on your mobile device, Fasoo View and Fasoo View Plus applications allows you to view and edit secure data on your mobile device. Fasoo eData Manager Fasoo eData Manager is a data governance solution for discovering and classifying the constantly changing set of unstructured data based on its association with people and other characteristics, showing the data’s security vulnerability and dynamically applying security policies on a continuous basis. Fasoo RiskView Fasoo RiskView is a risk assessment solution for monitoring and analyzing users and their activities in using both protected and unprotected files, determining normal levels of activity, and using sophisticated data analysis techniques to discover deviations that may indicate security risks. Printing Security Fasoo Secure Print (FSP) When printing your files, FSP allows you to trace printing activities and deter information leaks through printouts. Fasoo ePrint When printing your files, Fasoo ePrint allows you reinforce print security and detect personal information in a document and through pull printing, block printing based on a predefined policy. Mobile Security Fasoo Mobile Solution When using personal devices for work, Fasoo Mobile Solution secures your data itself and controls access to your server for complete BYOD security. Fasoo Mobile Gateway When sharing your files to your mobile device, Fasoo Mobile Gateway allows you to extend file based security from your PC to your mobile device. Fasoo View/Fasoo View Plus When viewing Fasoo Enterprise DRM files on your mobile device, Fasoo View and Fasoo View Plus applications allows you to view and edit secure data on your mobile device. Content Platform Fasoo eBook DRM When distributing eBook content, Fasoo eBook DRM protects the copyright of eBook contents and securely allows you to distribute them to your customers. Application Security Application today build up the life of business, however, more than ever they are under constant attack. This is a new frontier for hackers. Rather than attacking perimeter security defenses, like firewalls and end point encryption applications, the hackers are getting developers to embed security vulnerabilities in their code. Fasoo provides a semantic-based static code analysis tool that can be deployed from the early stages of the SDLC (Software Development Life Cycle) to help identify and remediate software vulnerabilities. SPARROW SPARROW is a static code analysis tool that detects critical software vulnerabilities at the early stages of software development. SPARROW analyzes source code with a robust static analysis engine that uses a deep semantic method to find vulnerabilities, and provide analysis results that differentiates us from other tools. SPARROW SAST SPARROW SAST (Static Application Security Testing) tool provides developers and security managers with the ability to accurately identify security vulnerabilities, remediate these flaws through code suggestions. SPARROW QCE SPARROW QCE enables developers, quality testers and managers to analyze all possible paths of a program and identify quality defects in the very early stages of software development. SPARROW QCE provides accurate and efficient quality control for software development. Digital Docuemnt Platform Every company faces constant challenges with managing the information that its employees generate. The ubiquity of devices and increasing availability of low cost storage encourage people to generate unprecedented numbers of copies of the files they create – many of which they don’t even realize they are creating. Fasoo has introduced Wrapsody, a new approach to content management. Wrapsody Wrapsody improves productivity with document sharing and collaboration through a digital document ID technology, which enables the same document to be automatically updated and synced. The Wrapsody platform can expand it’s flexibility through it’s core functions such as having full version control of their files (Spot Version Control) and always having the latest version of the file (On-Demand Sync) to cover document storage, management and distribution systems in addition to PC and mobile devices. The Wrapsody platform motivates document usage by users and document related work management for managers intelligently, through usage logs and analysis of the document content. Cloud Service Fasoo provides cloud and mobile services that lets you secure, store data and manage different notes. DigitalQuick DigitalQuick is a cloud storage service for efficient collaboration that allows you to keep your documents up-to-date and manage updated history. Folder Cryptor Folder Cryptor offers a robust cloud security service that automatically encrypts files before they are uploaded into secure folders. DigitalPage DigitalPage is an application that allows you to classify and manage different notes, schedules or business ideas by writing, tagging and linking pages on your mobile device.

    04/20/2016 Products/Solutions 04/20/2016
  • Management - CEO

    President & CEO Kyugon Cho He has more than 20 years of experience in the software industry as a researcher and business development expert. Kyugon Cho is the Founder, President and CEO of Fasoo. He has more than 20 years of experience in the software industry as a researcher and business development expert. Prior to working for Fasoo, he worked for Samsung SDS, the largest systems integrator in Korea, for eight years. He established the Open Solution Center, a center for creating new IT solutions for Samsung Group, and developed new businesses in Knowledge Management, Public Key Infrastructure, Internet Banking and System Management. He also served as a researcher for Samsung Electronics, where he developed network protocol emulators, prior to receiving his Ph.D. While receiving his Ph.D. he had also focused his research on artificial intelligence (AI) and also had a paper published in September 1994 in the IEEE Transactions on Pattern Analysis and Machine Intelligence about “Learning Shape Classes”. He has most recently served as the Chairman for the Korean Information Security Industry Association as well as the Korean Digital Rights Management Company Association. He has held the position as the Vice-Chairman for the IEEE Seoul Section and the Financial Security Forum. He holds a B.S. and M.S. in Electrical Engineering from Seoul National University, and a Ph.D. in Computer Engineering from Rutgers University.

    01/02/2016 About Fasoo 01/02/2016
  • Management - Fasoo North America

    William Blake President of Fasoo, Inc. Bill Blake is the President and CCO of Fasoo, Inc. He has over 30 years of experience in business process re-engineering and IT system integration. Prior to working for Fasoo, he formed eDocument Sciences, LLC, which provided consulting services related to management and control of critical businesses information. Following a successful career with IBM, Bill built and managed a systems integration firm focused on document management within the banking, legal and government sectors. IKON Office Solutions acquired his company in 1997 as a part of its efforts to meet growing demand for comprehensive document lifecycle solutions. Bill was Vice President of Enterprise Consulting for IKON Office Solutions in Malvern, PA. During his tenure with IKON, Bill developed a formal methodology for the analysis and design of complex document management applications focused on identifying inefficiencies and improving workflows that reduce operating costs, while also targeting improved customer retention and overall productivity. He holds a B.S. in Business Administration from Canisius College. Ronald Arden Executive Vice President, COO of Fasoo, Inc. Ron Arden is the Executive Vice President and COO of Fasoo, Inc. He has 30 years of strategic planning, marketing, sales, business development, consulting and technical experience in the information technology industry. Prior to working for Fasoo, he was Vice President of Strategy and Marketing at eDocument Sciences, LLC where he drove document security, cloud and collaboration strategies and solutions. Prior to eDocument Sciences, Ron was Director of National Solutions Support for IKON Office Solutions where he developed, implemented and managed IKON’s channel program for its software and solutions partners. He also developed and launched repeatable solutions, which was a key to refocusing the company toward services. Ron has held executive, management and technical positions at numerous organizations, including IKON Office Solutions, Digital Equipment Corporation and Wang Laboratories. Throughout his career, Ron has participated in industry forums, speaking engagements and written articles for industry publications. He holds a B.S. in Electrical Engineering from the University of New Hampshire. TJ Kwon Vice President, CTO of Fasoo, Inc. Dr. TJ Taekjin Kwon is the Vice President and CTO of Fasoo, Inc. He has over 25 years of research and developmental experience in the field of computer networks and wireless systems. Prior to joining Fasoo, Dr. Kwon worked as a Senior Research Scientist in Applied Communication Sciences, formerly known as Telcordia Technologies and Bell Communication Research (Bellcore). He is the author of several high-impact publications which have been actively referenced in over 800 technical journals and conference papers. His publications include 7 US patents and a journal paper published in the proceedings of IEEE. Dr. Kwon has served as president of KOCSEA (Korean-American Computer Scientists and Engineers Association) and as executive committee member and Technical Group Director of KSEA (Korean-American Scientists and Engineers Association). He holds a B.S. (with Honors) and M.S. from Seoul National University. He also holds a Ph.D. in Computer Science from the University of California at Los Angeles. .wrap .main .column.right .container.article .articleView .articleText { max-width: 800px; }

    01/02/2016 About Fasoo 01/02/2016
  • Survey Roundup: Cross-Industry Fraud Vexes Companies

    Survey Roundup: Cross-Industry Fraud Vexes Companies Blame The Insiders: A survey of 640 IT security professionals by data security firm Fasoo and Ponemon Institute found 56% said company insiders are the primary cause of data breaches, and 70% admitted they don’t know the location of some confidential information. For more information on this article, select the link below: http://blogs.wsj.com/riskandcompliance/2016/06/17/survey-roundup-cross-industry-fraud-vexes-companies/

    06/17/2016 PR 06/17/2016
  • Study: Most companies can't protect confidential documents

    Study: Most companies can't protect confidential documents A majority of companies don't have the technology in place to keep employees from sharing confidential documents,according to a study released today. In particular, only 36 percent of over 600 IT practitioners at large companies said that their companies were able to restrict the sharing of confidential documents with third parties, and only 27 percent were able to restrict sharing between employees. For more about this article, please click on the link below: http://www.csoonline.com/article/3082557/data-protection/study-most-companies-cant-protect-confidential-documents.html

    06/13/2016 PR 06/13/2016
  • Privileged Insiders Remain the Top Data Threat

    Privileged Insiders Remain the Top Data Threat Perhaps given the repeated breaches that arise from escalated privileges for insiders, Ponemon Institute has found that 72% of surveyed organizations are not confident in their ability to manage and control employee access to confidential documents and files. “What should be concerning to C-level executives and corporate boards is that most organizations have no idea where mission-critical information is located on the corporate network, who has access and what they are doing with that information,” said Bill Blake, president of Fasoo, which sponsored the report. “Deploying DRM solutions is a first step. Beyond that, organizations must be vigilant in applying and enforcing security policies as well as knowing where the organization’s most valuable information is located at all times.” For more about this article, click on the link below: http://www.infosecurity-magazine.com/news/privileged-insiders-remain-the-top/

    06/13/2016 PR 06/13/2016
  • Study: Most companies struggle to restrict sharing confidential data

    Study: Most companies struggle to restrict sharing of confidential data According to the survey, conducted by the Ponemon Institute on behalf of Fasoo, 58% of companies say their employees use free online file sharing applications, and almost half say their employees, on occasion, keep confidential documents on their home computers or personal mobile devices. In addition, 68% of those surveyed say they don't even know where their company’s confidential information is located. "A lot of people don't realize how much intellectual property or trade secrets is floating around the organization," Ron Arden, COO at data security vendor Fasoo told CSO. For more on this article, please click on the link below: http://www.ciodive.com/news/study-most-companies-struggle-to-restrict-sharing-of-confidential-data/420848/

    06/14/2016 PR 06/14/2016
  • Too Little Is Done Internally to Prevent Insider Threats

    Too Little Is Done Internally to Prevent Insider Threats Why is nearly half an organization’s data loss due to insiders? A Fasoo and Ponemon Institute study found that it could be because the vast majority of IT security professionals (72 percent) aren’t confident in their ability to manage or control employee access to sensitive files. Even more worrisome is that these same professionals don’t know where those sensitive files are and have no visibility into what employees are accessing or sharing without authorization. Bill Blake, president of Fasoo, addressed this discovery: What should be concerning to C-level executives and corporate boards is that most organizations have no idea where mission-critical information is located on the corporate network, who has access and what they are doing with that information. Organizations must be vigilant in applying and enforcing security policies as well as knowing where the organization's most valuable information is located at all times. To read the full article, please click on the link below: http://www.itbusinessedge.com/blogs/data-security/too-little-is-done-internally-to-prevent-insider-threats.html

    06/21/2016 PR 06/21/2016
  • Fasoo and Ponemon Institute Study Reveals That Employees Still Present the Highest Security Risk

    Fasoo and Ponemon Institute Study Reveals That Employees Still Present the Highest Security Risk to Organizations Fasoo, Inc., the leader in Data and Software Security, today released the results of the security industry's first look at organizations' confidence around protecting intellectual property and other high value assets. In the latest Ponemon Institute survey titled, "Risky Business: How Company Insiders Put High Value Information at Risk," 72 percent of surveyed organizations are not confident in their ability to manage and control employee access to confidential documents and files. Here is the link to the article: http://www.prnewswire.com/news-releases/fasoo-and-ponemon-institute-study-reveals-that-employees-still-present-the-highest-security-risk-to-organizations-300282500.html

    06/13/2016 PR 06/13/2016
  • Intelligent Digital Document Platform

    An overview on Wrapsody. Every company faces constant challenges with managing the information that its employees generate. The ubiquity of devices and increasing availability of low cost storage encourage people to generate unprecedented numbers of copies of the files they create - many of which they don't even realize they are creating. To manage all this information, several tools exist: email, content management systems, file servers, cloud storage, enterprise messaging, social networks and many others. All of these can be valuable but they have limitations. Multiple versions of files proliferate throughout an organization, often without means of tracking them. Email messages are sent with file attachments that are not tracked and sometimes not properly saved on employees' devices. Multiple people will revise documents in parallel, leading to conflicts and lost changes. This makes it difficult to monitor how documents and document templates are used over time. Wrapsody improves productivity with document sharing and collaboration through a digital document ID technology Fasoo has introduced Wrapsody to address these issues. Wrapsody is based on a file-centric approach: it links files with metadata to enable automated content synchronization and version control management beyond repositories that employees may use inconsistently. As a platform, Wrapsody can expand its core functions flexibly into existing server systems such as ECM, Groupware, and ERP, in addition to PCs and mobile devices. The Wrapsody platform encourages document usage by users and allows managers to intelligently administer document related work through usage logs and analysis of the document content. 브로슈어제품 소개서구축 사례--> "We had trouble locating documents and had to search for the latest versions on different PCs, in email, cloud storage or on flash drives. After using Wrapsody, we could work on the latest customer response documents easily regardless of file location. We got instant feedback from colleagues helping us develop an ideal response.” -Principal Consultant- Try a 30-day FREE TRIAL today!

    05/04/2016 Products/Solutions 05/04/2016
  • Manage Security Vulnerabilities Effectively

    An overview on SPARROW. SPARROW is a static code analysis tool that is performed without actually executing programs, detecting critical software vulnerabilities at the early stages of software development. SPARROW analyzes source code with a robust static analysis engine that uses a deep semantic method to find vulnerabilities that other tools can’t. It detects security vulnerabilities such as buffer overruns, SQL injection, cross-site scripting, information leakage, TOCTOU race condition and hardcoded password. It also detects run-time errors such as memory/resource leaks, null dereference, uninitialized variables, division by zero, use after free and integer overflow. People choose SPARROW because it uncovers critical and relevant vulnerabilities during the early stages of the Software Development Life Cycle (SDLC). SPARROW is popular with government agencies, corporations and anyone developing embedded software that requires a very high level of software quality. The Static Application Security Testing (SAST) version of SPARROW is also used by the government and financial industries which aim to eliminate all security weaknesses from their source code. Static Application Security Testing (SAST) tool with... ACTIVE SUGGESTION SPARROW can be deployed on both the development and testing phases in the SDLC. As an SAST tool, SPARROW provides developers and security/quality managers with the ability to accurately identify software vulnerabilities, remediate code using ACTIVE SUGGESTION, enforce project based rules for developers and customize policies according to project requirements. Currently no other solution has a similar feature as ACTIVE SUGGESTION, where you are provided code suggestions to easily fix the vulnerabilities in your software. Intelligent Alarm Clustering SPARROW's Intelligent Alarm Clustering gorups related vulnerabilities in the source code with a unique ID. A developer can review results and address vulnerabilities faster and easier throughout the SDLC. Intelligent Alarm CLustering reduces review time because it reduces the number of alarms to review and also reduces fix time since these vulnerabilities are in clustered groups and can be remediated in order instead of going back and forth. Advanced Issue Filtering SPARROW provides Avanced Issue Filtering which analyzes the characteristics of issues and eliminates errors with have to analyze them over and over again, each time. Static analysis tool based on a deep semantic method with the best technology It is the semantic approach that allows SPARROW to follow all possible execution scenarios, to be more exhaustive than other tools, rather than focusing on discovering particular patterns. In addition to the semantic tools, SPARROW also utilizes syntactic tools to quickly find shallow bugs based on fixed patterns. SPARROW balances the depth of its bug detection coverage with a reasonable analysis cost. Development process linked to the highest academic research SPARROW is similar to other analysis tools which derived their research and product toolsets from prestigious universities like Stanford University and the University of Wisconsin. These tools have gained great respect and success in the marketplace for their technological research. SPARROW’s semantic based static analysis tool was developed based on a joint research program with the prestigious Seoul National University. With six years in research and another five years for commercialization, SPARROW has been proven not only technically but also on its marketability. Fasoo continues to work with Seoul National University to improve SPARROW and develop new programs to strengthen the overall source code analysis market. Active support for correcting flaws in source code SPARROW offers a web based user interface that links between source pages, helping the user quickly navigate source code to verify alarms. Prompt correction of the detected bug can be made through an error analysis report and detailed analysis guide. Related examples and information about each defect can be confirmed and explained through CWE, CERT, OWASP, HIS, HICPP, MISRA and more. CWE: A Community-Developed Dictionary of Software Weakness Types CERT: Computer Emergency Response Team for Internet Security Incidents OWASP: Open Web Application Security Project Flexible deployment and operation All on-going projects are managed on the server through the web-based integrated management system which provides helpful resources to configure a safe collaborative system and to operate efficiently for large-scale projects.No matter the development environment, organizations can use SPARROW without restriction on where the analysis engine is installed, whether on a server or on a user’s PC. [Award] Gold Winner in the Vulnerability Assessment, Remediation and Management category at the 2014 Info Security Products Guide's Global Excellence Awards [Certification] SGS TUV SAAR - Certified for products in accordance with ISO 26262 [Korean Patent] Memory Leak Detecting Apparatus and Method thereof (Patent No. 100965426)

    02/02/2016 Products/Solutions 02/02/2016
  • Fasoo Talks About Cyber Security at FinCyberSec 2016

    Fasoo, Inc. Vice President and COO Ron Arden participated in a panel discussion on cyber security priorities in the finance industry during the FinCyberSec 2016 that was held at the Stevens Institute of Technology in Hoboken, NJ on June 1, 2016. Ron was joined by Alan Brill, Senior Managing Director from Kroll, and Michael Frank, President of Secure Business Strategies. The panel was moderated by Dr. Paul Rohmeyer, who organized the conference. Some of the discussions addressed the challenges of cyber security in the financial industry, risk posed by insider threats to unstructured data and “Where are we off target?” which focused on the wrong areas that companies are concentrating on when it comes to cyber security. Ron’s key point at the end of the panel mentioned that just because a company is compliant does not mean it’s secure. Regulations frequently have guidelines that meet minimal requirements for data security, but do not specify technologies or processes. That is changing and newer laws are mandating encryption and permission controls as ways to ensure that sensitive information remains safe from all unauthorized users.

    06/07/2016 PR 06/07/2016
  • Privacy and Terms

    Last Modified: Feb 2016 This Privacy Policy provides our policies and procedures for collecting, using, and disclosing your information. Users can access Fasoo services (the "Services") through applications on devices, through APIs, and through third-parties. A "Device" is any computer used to access the Services, including without limitation a desktop, laptop, mobile phone, tablet, or other consumer electronic device. This Privacy Policy governs your access of the Services, regardless of how you access it, and by using our Services you consent to the collection, transfer, processing, storage, disclosure and other uses described in this Privacy Policy. All of the different forms of data, content, and information described below are collectively referred to as "information". The Information We Collect and Store We may collect and store the following information when running the Services: Information You Provide to Fasoo When you register an account, we collect some personal information, such as your name, and email address. You may also ask us to import your contacts by giving us access to your third party services (for example, your email account). You may also provide us with your contacts' email addresses when sharing folders or files with them. We may also receive Personal Information (for example, your email address) through other users, for example if they have tried to share something with you. Lastly, you will provide your password for use of the Services. Automatically Collected Information We automatically receive certain types of information when you interact with our Web pages, services and communications. For example, it is standard for your Web browser to automatically send information to every Web site you visit, including ours. That information includes your computer's IP address, access times, your browser type and language, and referring Web site addresses. We may also collect information about the type of operating system you use, your account activity, and files and pages accessed or used by you. Log Data When you use the Services, we automatically record information from your Device, its software, and your activity using the Services. This may include the Device's Internet Protocol ("IP") address, browser type, the web page visited before you came to our website, information you search for on our website, locale preferences, identification numbers associated with your Devices, your mobile carrier, date and time stamps associated with transactions, system configuration information, metadata concerning your Files, and other interactions with the Services. We collect IP addresses to audit the use of our service. Although we automatically record your IP address, the actual IP address will not be shown on our website; instead, the general location of where the IP address is located will be shown. In addition, we do not share your IP address to any third parties. Use of Personal Information In general, we use your personal information to process your requests or transactions, to provide you with information or services you request, to inform you about other information, events, promotions, products or services we think will be of interest to you, to facilitate your use of, and our administration and operation of, the Web site and services and to otherwise serve you and our users. For example, we may use your personal information: · to request feedback and to enable us to develop, customize and improve the Web site and our publications, products and services; · to conduct marketing analysis, to send you surveys or newsletters, to contact you about services, products, activities, special events or offers from Fasoo or our partners and for other marketing, informational, product development and promotional purposes; · to send you a welcoming email and to contact you about your use of the Web site and services; · to respond to your emails, submissions, comments, requests or complaints; · to perform after-sales services; · to anticipate and resolve problems with our service; · to respond to customer support inquiries, for assistance with our product and service development; · and to inform you of updates to products and services from Fasoo that better meet your needs; · to store contacts you enter or upload into your contacts list for your private use and viewing; · to send emails to users you invite (and contacts you invite to become users) to collaborate and access your files; · to enable you to communicate, collaborate, and share files with users you designate; · to contact you if you win a contest; and · for other purposes about which we notify you. Service Providers, Business Partners and Others We may use certain trusted third party companies and individuals to help us provide, analyze, and improve the Service (including but not limited to data storage, maintenance services, database management, web analytics, payment processing, and improvement of the Service's features). These third parties may have access to your information only for purposes of performing these tasks on our behalf and under obligations similar to those in this Privacy Policy. Our Site includes links to other Web sites whose privacy practices may differ from those of Fasoo. If you submit personal information to any of those sites, your information is governed by their privacy statements. We encourage you to carefully read the privacy statement of any Web site you visit. Disclosure Your personal Information may be disclosed as we believe to be necessary or appropriate in order to: (a) comply with a law, regulation or compulsory legal request; (b) respond to requests from public and government authorities; (c) protect our rights and property; (d) allow us to pursue available remedies or limit the damages that we may sustain. Changes to This Policy We may change this Policy from time to time. If we make any changes to this Policy, we will change the "last updated" date above. If there are material changes to this Policy, we will notify you more directly. We encourage you to check this Policy whenever you use our Web sites and services to understand how your personal information is used. Fasoo Terms of Service Thank you for your interest in Fasoo! Please read these terms of service carefully (“Terms”) before using the Services. These Terms govern and apply to your access to and use of Fasoo (“we” or “our”) websites and services (the “Services”). By accessing or using our Services, you agree to be bound by all of the terms and conditions described in these Terms. If you are using the Services on behalf of an organization, you are agreeing to these Terms for that organization and promising that you have the authority to binda that organization to these terms. If you do not agree to all of these terms and conditions, do not use our Services. Acceptable Use Policy/User Conduct You agree that you are responsible for your own conduct and all conduct under your account, and all Content that is encrypted or decrypted by anyone using your Account Information with the Service and for any consequences arising as a result thereof. You agree that you shall not copy, sell, transfer, distribute, publish, or assign your license to our services in any format to any third party. You agree to use the Services only for purposes that are legal, proper and in accordance with these Terms of Service and any Separate Agreements, and all applicable laws and regulations in the relevant legal jurisdictions. You further agree not to: a. Probe, harm, disrupt, or attack any system, network, or the Services. b. interfere with or disrupt the Services or servers or networks connected to the Services, or disobey any requirements, procedures, policies or regulations of networks connected or applicable to the Services. c. Modify, translate, adapt, edit, copy, decompile, disassemble, or reverse engineer any software used or provided by Fasoo. d. Use the Services to encrypt or otherwise disguise any material that contains virus, worms, corrupted files, or any other similar software to interfere with or disrupt any user, host, or network. e. Send any unsolicited or unauthorized advertising, promotional materials, “junk mail,” “spam,” “chain letters,” “pyramid schemes” or any other form of solicitation f. Stalk, harass, abuse or threaten another person or company, or take any action invasive to another's privacy (by sharing, for example, another's photograph, address, email, phone number or any other contact information) without permission from such other person g. Impersonate or misrepresent your identity with any person or entity h. Promote or provide products or services other than your own without appropriate authorization i. Use the Services to encrypt any Content that you do not have a right to transmit under any law or under contractual or fiduciary relationships (such as inside information, proprietary and confidential information learned or disclosed as part of employment relationships or under nondisclosure agreements) j. Take any action that would be in violation of Fasoo's copyright, trademark, any code of conduct or other guidelines which may be applicable to the Services. k. Publish or share unlawful materials. l. Violate the law in any way. Notice We may send you communications or data regarding the Services, including but not limited to (i) notices about your use of the Services, including any notices concerning violations of use, (ii) updates, and (iii) promotional information and materials regarding our products and services, via electronic mail, posting on the website, or other reliable method. Ownership Our Apps and Services are protected by copyright, trademark, and other laws of the United States and foreign countries. Except as expressly provided in these Terms, we (or our licensors) exclusively own all right, title and interest in and to the Apps and the Services, including all associated intellectual property rights. You may not remove, alter or obscure any copyright, trademark, service mark or other proprietary rights notices incorporated in or accompanying the Apps or the Services, including in any Content. You acknowledge and agree that any feedback, comments or suggestions you may provide regarding the Apps or the Services (“Feedback”) will be the sole and exclusive property of Fasoo and you hereby irrevocably assign to us all of your right, title and interest in and to all Feedback. Modifications We reserve the right at any time and at our sole discretion to modify or discontinue, temporarily or permanently, the Services or any part thereof (including Software), with or without notice. You agree that we shall not be liable to you or to any third party for any modification, suspension or discontinuance of any part of the Services. In connection with any modification of the Services, Fasoo may automatically download and install software updates from time to time with the intention of improving, enhancing, repairing and/or further developing the Services, and you agree to permit Fasoo to deliver these to you (and you to receive them) as part of your use of the Services. Modifications to this agreement We reserve the right at any time and at our sole discretion to change, modify or otherwise alter these terms of service at any time. If a revision, in our sole discretion, is material we will notify you (for example via email to the email address associated with your account). Other changes may be posted to our blog or terms page, so please check those pages regularly. By continuing to access or use the Services after revisions become effective, you agree to be bound by the revised Terms. If you do not agree to the new terms, please stop using the Services. YOU EXPRESSLY UNDERSTAND AND AGREE THAT: a. YOUR USE OF THE SERVICES IS AT YOUR OWN RISK. THE SERVICES ARE PROVIDED “AS IS” AND “AS AVAILABLE” BASIS. TO THE MAXIMUM EXTENT PERMITTED BY LAW, FASOO EXPRESSLY DISCLAIMS ALL WARRANTIES AND CONDITIONS OF ANY KIND, WHETHER EXPRESS OR IMPLIED, INCLUDING, BUT NOT LIMITED TO THE IMPLIED WARRANTIES AND CONDITIONS OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NON-INFRINGEMENT. b. FASOO DOES NOT WARRANT THAT (i) THE SERVICES WILL MEET ALL OF YOUR REQUIREMENTS; (ii) THE SERVICES WILL BE UNINTERRUPTED, TIMELY OR ERROR-FREE; OR (iii) ERRORS IN THE SOFTWARE WILL BE CORRECTED. c. ANY CONFIDENTIAL DOCUMENTS THAT ARE DECRYPTED IS DONE AT YOUR OWN DISCRETION AND RISK AND THAT YOU WILL BE SOLELY RESPONSIBLE FOR ANY LOSS OR THEFT OF CONFIDENTIAL DOCUMENTS. d. NO ADVICE OR INFORMATION, WHETHER ORAL OR WRITTEN, OBTAINED BY YOU FROM FASOO OR THROUGH OR FROM THE SERVICES SHALL CREATE ANY WARRANTY NOT EXPRESSLY STATED IN THESE TERMS OF SERVICE. Limitations of Liability YOU EXPRESSLY UNDERSTAND AND AGREE THAT FASOO, ITS PARENT, SUBSIDIARIES, AFFILIATES AND LICENSORS, AND OUR AND THEIR RESPECTIVE OFFICERS, EMPLOYEES, AGENTS, SHALL NOT BE LIABLE TO YOU FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, CONSEQUENTIAL OR EXEMPLARY DAMAGES, INCLUDING BUT NOT LIMITED TO, DAMAGES FOR LOSS OF PROFITS, GOODWILL, USE, DATA, COVER OR OTHER INTANGIBLE LOSSES (EVEN IF FASOO HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES) RESULTING FROM: (i) THE USE OR THE INABILITY TO USE THE SERVICES; (ii) THE COST OF PROCUREMENT OF SUBSTITUTE GOODS AND SERVICES RESULTING FROM ANY GOODS, DATA, INFORMATION OR SERVICES PURCHASED OR OBTAINED OR MESSAGES RECEIVED OR TRANSACTIONS ENTERED INTO THROUGH OR FROM THE SERVICES; (iii) UNAUTHORIZED ACCESS TO OR THE LOSS, CORRUPTION OR ALTERATION OF YOUR TRANSMISSIONS, CONTENT OR DATA; (iv) STATEMENTS OR CONDUCT OF ANY THIRD PARTY ON OR USING THE SERVICES; (v) FASOO'S ACTIONS OR OMISSIONS IN RELIANCE UPON YOUR ACCOUNT INFORMATION AND ANY CHANGES THERETO OR NOTICES RECEIVED THEREFROM; (vi) YOUR FAILURE TO PROTECT THE CONFIDENTIALITY OF ANY PASSWORDS OR ACCESS RIGHTS TO YOUR ACCOUNT INFORMATION; (vii) THE ACTS OR OMISSIONS OF ANY THIRD PARTY USING THE SERVICES; (viii) ANY ADVERTISING CONTENT OR YOUR PURCHASE OR USE OF ANY ADVERTISED PRODUCT OR SERVICE; (ix) THE TERMINATION OF YOUR ACCOUNT IN ACCORDANCE WITH THE TERMS OF THESE TERMS OF SERVICE; OR (x) ANY OTHER MATTER RELATING TO THE SERVICES. NOTHING IN THIS AGREEMENT IS INTENDED TO EXCLUDE OR LIMIT ANY CONDITION, WARRANTY, RIGHT OR LIABILITY WHICH MAY NOT BE LAWFULLY EXCLUDED OR LIMITED. SOME JURISDICTIONS DO NOT ALLOW THE EXCLUSION OF CERTAIN WARRANTIES OR CONDITIONS OR THE LIMITATION OR EXCLUSION OF LIABILITY FOR LOSS OR DAMAGE CAUSED BY NEGLIGENCE, BREACH OF CONTRACT OR BREACH OF IMPLIED TERMS, OR INCIDENTAL OR CONSEQUENTIAL DAMAGES. ACCORDINGLY, ONLY THOSE LIMITATIONS IN SECTIONS DISCLAIMER OF WARRANTIES AND LIMITATIONS OF LIABILITY WHICH ARE LAWFUL IN YOUR JURISDICTION (IF ANY) WILL APPLY TO YOU AND OUR LIABILITY WILL BE LIMITED TO THE MAXIMUM EXTENT PERMITTED BY LAW. Indemnification You agree to indemnify and hold Fasoo, its parent, subsidiaries, affiliates, officers, agents, employees, advertisers and partners harmless from and against any and all claims, liabilities, damages (actual and consequential), losses and expenses (including legal and other professional fees) arising from or in any way related to any third party claims relating to your use of any of the Services, any violation of these Terms of Service or any other actions connected with your use of the Services (including all actions taken under your account). In the event of such claim, we will provide notice of the claim, suit or action to the contact information we have for the account, provided that any failure to deliver such notice to you shall not eliminate or reduce your indemnification obligation hereunder. Termination You may discontinue your use of the Services at any time, for any or no reason and with or without notice. We also reserve the right to suspend or end the Services at any time, with or without cause, and with or without notice. For example, we may suspend or terminate your use if you are not complying with these Terms, or use the Services in any way that would cause us legal liability or disrupt others' use of the Services. If we suspend or terminate your use, we will try to let you know in advance and help you retrieve data, though there may be some cases (for example, repeatedly or flagrantly violating these Terms, a court order, or danger to other users) where we may suspend immediately. General Terms These Terms of Service constitute the entire agreement between you and Fasoo and governs your use of the Services, except, and then only to the extent that you have entered into a Separate Agreement. These Terms of Service, as in effect from time to time, supersedes any prior agreements or earlier versions of these Terms of Service between you and Fasoo for the use of the Services. If, through accessing or using the Services, you utilize or obtain any product or service from a third party, you may additionally be subject to such third party's terms and conditions applicable thereto, and these Terms of Service shall not affect your legal relationship with such third party. These Terms of Service and the relationship between you and Fasoo shall be governed by the laws of the Republic of Korea without regard to its conflict of law provisions. You and Fasoo agree to submit to the personal and exclusive jurisdiction of the courts located in Seoul, Korea. Notwithstanding this, you agree that Fasoo shall still be allowed to apply for injunctive remedies (or an equivalent type of urgent legal relief) in any applicable jurisdiction. You are also responsible for complying with all local laws, rules and regulations.

    01/01/2016 PR 01/01/2016
  • Site Map

    Products/Solutions Data Security Fasoo Data Security Framework Fasoo Enterprise DRM Fasoo Secure Node (FSN) Fasoo Secure Document (FSD) Fasoo Secure Exchange (FSE) Fasoo Secure Print (FSP) Fasoo Secure Document for IBM ECM Fasoo Secure Document for SharePoint Fasoo Secure Screen (FSS) Fasoo Usage Tracer Fasoo Mobile Gateway Fasoo View/Fasoo View Plus Data Discovery Fasoo eData Manager Risk Management Fasoo RiskView Print Security Fasoo Secure Print (FSP) Fasoo ePrint Mobile Security Fasoo Mobile Solution Fasoo Mobile Gateway Fasoo View/Fasoo View Plus Content Platform Fasoo eBook DRM Application Security SPARROW SPARROW SAST SPARROW QCE Digital Document Platform Wrapsody Cloud Service DigitalQuick Folder Cryptor DigitalPage Resources Brochures Videos Solutions Sheets Reports About Fasoo Overview CEO Fasoo North America Executives Careers Locations Customers Partners PR Announcements Fasoo in the Media Support Support .smTitle_h2 { display: inline-block; margin: 0 0 12px; height: 36px; line-height: 36px; padding: 0 8px; background: #f0a400; color: #fff; font-size: 15px; font-weight: bold; } .smTitle_h3 { color: #f0a400; font-size: 14px; padding: 0 0 0 18px !important; clear: both; font-weight: bold; margin: 0 0 18px !important; } .smTitle_h4 { padding: 0 0 0 40px !important; color: #2d93d5 !important; font-weight: bold; font-size: 14px; clear: both; margin: 0 0 5px !important; } .smTitle_h4 a { text-decoration: none !important; } .dep4 { color: #444444; font-size: 14px; font-weight: bold; clear: both; display: block; padding: 0 0 0 58px; margin: 0 0 0; } .dep4 a { color: #444444 !important; text-decoration: none !important; } .sm_ul { float: left; max-width: 300px; list-style: none !important; padding-right: 0 !important; margin: 0 0 16px !important; padding-left: 78px !important; } .sm_ul li { min-height: 18px; line-height: 18px; } .dep5 { color: #666; font-size: 13px; } .dep5 a { color: #555!important; text-decoration: none !important; } .fl { float: left; } .cb { clear: both; }

    01/01/2016 PR 01/01/2016
  • Fasoo's Partners

    Fasoo has numerous business partnerships with companies all over the world. Fasoo’s partners include sales partners as well as technology partners. If you are interested in being a partner of Fasoo, please contact inquiry@fasoo.com. Partner Portal As a partner of Fasoo, you can register to gain access to our partner portal. The partner portal provides marketing materials, price lists and other relevant information to help you with achieving sales opportunities with your customers. If you have not already made an account, please select the button below and go to 'Create a Partner Account'. Then fill in the required information and the administrator will then authorize your access to the partner portal. Go To Partner Portal .partnerView { margin: 0 auto; max-width: 800px; } .partnerView ul { list-style: none; padding: 0 !important; } .partnerView ul li { float: left; margin: 0 12px 12px 0; list-style: none!important; } .partnerView h3 { clear: both; } .partnerView .btn2 { display: block; width: 200px; font-size: 12px; font-weight: bold; border: 1px solid #c9c9c9; background: #f9f9f9; text-align: center; height: 30px; line-height: 30px; text-decoration: none !important; margin: 0 auto 52px; } .partnerView .btn2 font { color: #222; }

    01/01/2016 PR 01/01/2016
  • Discover and Classify to Understand Your Data

    An overview on Fasoo eDaa Manager. For an effective and efficient data security, organizations must define the scope of data to protect. However, it is not easy to understand all the target documents since the volume, location, filename extension, number of copies or security sensitiveness of target files are continuously changing. To properly understand the target files to enforce data security, organizations must discover and all unstructured data residing in endpoint devices and repositories, and classify and protect the files according to its own data security strategies. Understand your own data to set up your own data security policy with Fasoo eData Manager Fasoo eData Manager is an enterprise classification and security policy management tool that is complementary to Fasoo Enterprise DRM as well as valuable by itself. It scans files throughout the enterprise to find content that is confidential or of high value. It can scan files located within folders and logical drives on PCs – that is, it can scan files on file servers, cloud storage servers, repositories, and anything else that can be mounted as a logical drive or shared folder. The files that Fasoo eData Manager scans are those that match templates which specify criteria for files to be scanned. These include: Storage devices (fixed or portable), folders, or individual files. Filename extensions (file types, e.g. Microsoft Word documents, Excel spreadsheets, PDF). Pattern matching within file names or file content, as defined by keywords or regular expression matches Fasoo Enterprise DRM document classes Users and user groups Scans can be set up to take place periodically, (i.e daily, weekly, etc.). Fasoo eData Manager displays statistics on file characteristics that it gathers from scans, which include: Files that are unprotected, protected by Fasoo Enterprise DRM, or protected by Fasoo eData Manager encryption. Files whose names or contents contain matches to regular expressions or keywords, such as PII. File extensions (types) of interest, such as Microsoft Excel spreadsheets or PDFs. Files that have been distributed throughout the organization. Day-to-day variations in these statistics. ""With Fasoo eData Manager, managers and security administrators now have an adequate decision making process, to determine and respond to risks related to sensitive documents. -CIO of Nuclear Power Plant -

    02/23/2016 PR 02/23/2016
  • Protect Files Beyond the Boundaries of Content Repositories

    An oveview on Fasoo Secure Document. What happens when information leaves the repository? Information repositories are widely used to store and share data and documents. The security measures in these systems are insufficient to protect files outside of the repository. Once someone downloads files, they no longer retain any security controls. Organizations realize that investments in network security cannot prevent leaking of sensitive information by insiders, since they already have authorized access to that information. Fasoo Secure Document (FSD) persistently protects documents downloaded from information systems Fasoo ensures your documents remain secure no matter where they go after you download them. You are protected whether you use Microsoft SharePoint, IBM FileNet or any ECM, EDM, ERP or groupware system. To persistently protect the documents populated from central repositories, organizations need to extend the security of the repository to include files downloaded to end point devices. In addition, access to the downloaded files need to be dynamically enforced to reflect any changes on the repository ACL for ensuring continuous and consistent security. FSD integration with Microsoft SharePoint and IBM ECM is seamless and will provide the security you need when files containing sensitive information are downloaded from SharePoint or IBM ECM. “Our company shares sensitive research information and company assets stored in an information system and patent application system. Due to the sensitive nature of these files, it is extremely important that we prevent exposing this information to our competitors, as we will suffer heavy financial losses. We needed a security solution that could limit certain department’s access to specific files. For example, only allowing research departments access, and restricting access to the management support, planning, and other departments. With the addition of Fasoo’s solution we didn’t have to worry about information leaking and getting into the wrong hands.” -Research Institute IT Security Manager-

    02/10/2016 PR 02/10/2016
  • Build Security into the Software

    An overview of SPARROW SAST. SPARROW SAST detects security weaknesses in source code with its semantic based static program analysis engine History has proven that defects, bugs and flaws in software have consistently been the leading cause of security vulnerabilities. If developers can pinpoint this insecure code and correct it before deployment, the chances of these security vulnerabilities causing problems can be reduced or eliminated. SPARROW SAST (Static Application Security Testing) tool not only detects security vulnerabilities through the best static analysis engine based on semantic and syntactic methods, it also follows a strict set of compliance requirements and follows CWE, OWASP, CERT and other international standards. SPARROW SAST applies the best technology to the most optimal diagnostic tool Uses the latest semantic based static analysis tool Provides both semantic and syntactic engines to increase detection for security vulnerabilities and decrease or eliminate the number of defects, bugs and flaws in software Meets compliance requirements and detects fatal errors identified by international standards for coding SPARROW SAST can help you defend against threats of cyber terrorism Cyber-attacks typically target network weaknesses causing organizations to protect themselves with firewalls, intrusion prevention systems, and similar tools. Current cyber-attacks target weaknesses in the software organizations develop and use. It is difficult to stop malware related attacks after software has been developed. SPARROW SAST lets you virtually eliminate these attacks before the software is developed by detecting all security vulnerabilities in the source code. Meeting secure coding compliance requirements Most organizations and regulations now demand that developers follow secure coding compliance requirements for software development. This is in reaction to major incidents of cyber terrorism all over the world. SPARROW SCE can detect security vulnerabilities in your software and meet the compliance regulations and requirements before releasing the software. SPARROW SAST also detects some of the top weaknesses identified by international standard organizations such as the CWC/SANS Top 25, OWASP Top 10, and CERT. Fasoo helps developers reduce or eliminate these coding errors before they are deployed. CWE/SANS Top 25 Most Dangerous Software Errors GO CERT Secure Coding GO OWASP Top 10 GO Reduce the amount of detection time and lower the cost of security vulnerabilities According to NIST, if organizations detect and remove security weaknesses before completing development, they can reduce a maximum of 30 times of the expense compared to finding and removing security weaknesses after development. The use of a semantic-based static analysis tool, such as SPARROW SAST, is the only way to detect all of these security weaknesses within the source code before it is released. Establishes a practice of making security a priority in software development When SPARROW SAST is applied to secure coding, you create a safe and efficient software development environment. Checking source code for security vulnerabilities at an early stage of development improves all areas of security for an organization, since it will use defect and error free software. [Source: http://blog.typemock.com/wp-content/uploads/2012/07/Infographic-The-Severity-of-Bugs-Are-We-Doomed.pdf]

    02/23/2015 PR 02/23/2015
  • Visualize Risk of Your Data to Prevent Insider Threats

    An overview on Fasoo RiskView. The risk of insider threats exists in any company in any sizes. Security solutions cannot always rule out the insider threats, even though it can help lessen the probability to some extent. This is largely because it is difficult to detect insider threats, since insiders have legitimate access to data with intimate knowledge of security controls and methods to bypass them. Fasoo RiskView helps to prevent insider threats that are real, but difficult to detect Fasoo RiskView is a tool for security administrators that monitor activity related to unstructured data and user activities with confidential data. It gathers information from Fasoo Usage Tracer (the log analysis utility for Fasoo Enterprise DRM) and Fasoo eData Manager. It has APIs that can be configured to import log data from other security technology components, including firewalls, DLP, databases, and even physical security systems (e.g., entry/exit data from keycard or biometric systems) and employee attendance records. Fasoo RiskView includes a decision making framework that security administrators as well as business managers can use to review suspicious activities and after relevant investigations, in order to decide whether or not to take action to address these concerns with potential insider threats. Fasoo RiskView applies sophisticated rule-based modeling to the data sources mentioned above, to establish normal patterns of behavior and flag suspicious activities that indicate enough risk to merit concern and potential intervention by business management. The types of activities that Fasoo RiskView tracks include: Event anomalies, such as logins with user IDs of former employees, a given user logging in from multiple locations simultaneously, or unauthorized users retaining an excessive numbers of files containing sensitive data. File based risks, such as unauthorized users’ attempts to decrypt classified files. User based risks, such as users decrypting files more frequently than usual, printing more files than usual after regular business hours, or sending files to external recipients more than usual. “To put it simply, Fasoo RiskView enabled us, especially security administrators and line of business managers, to discover risks of data theft or loss that are assumed to exist but are unknown.” -CISO of International Business Law Firm-

    02/23/2016 PR 02/23/2016
  • Secure Your Files Shared with External Users

    An overview on Fasoo Secure Exchange. Business relationships require cooperation through partnerships, outsourcing, and collaboration with many different organizations. Sensitive files are shared outside of the company through email, cloud-based sharing services, FTP, and other portable media. The threat of unwanted information disclosure is real and the potential impact this makes on a company is devastating. The need for security measures for files shared with outside parties has become critical to an organization’s security plan. Fasoo Secure Exchange (FSE) lets you share your sensitive files securely through email, FTP, USB flash drives, the cloud and more When a file is shared externally, FSE ensures a secure exchange of information, which guarantees that files are shared with only the intended recipients. The sender can decide who can access sensitive files and what permissions they have for using them, such as View, Edit or Print. Persistent security remains in place and provides the sender with assurance that these files are secure. Even when files are unintentionally sent to the wrong parties, a sender can revoke future access to them. All actions are logged for future analysis providing peace of mind. “Our company has various business affiliates including construction, raw material, and steel. We have already implemented Fasoo’s solution at our subsidiaries to protect files created within our organization. When we receive orders from construction firms, we need to cooperate with our steel affiliate so it can deliver the necessary materials. We needed to protect our information when sharing between our affiliates because there is a high risk that sensitive information could be exposed to the wrong people. After applying the Fasoo security solution to files sent outside of the company, sharing and cooperation is more prevalent and secure between subsidiaries. Business efficiency has increased along with positive feedback from all affiliates.” -J Group Data Processing Team Leader-

    02/21/2016 PR 02/21/2016
  • Fasoo's Customers

    Here are some of our customers who have deployed our solutions Enterprise DRM Customers SPARROW Customers

    01/01/2016 PR 01/01/2016
  • Prevent and Deter Security Breaches Through Your Screen

    An oveview on Fasoo Secure Screen. Screen capture tools and the proliferation of high-quality digital cameras and smartphones make it easy for anyone to capture sensitive information displayed on a computer screen. With nothing preventing it, the likelihood of a major data breach from capturing this information on the screen is increasing. Some companies limit the possession of these devices or use different items to ensure that the camera lens are blocked, but it makes life inconvenient for employees. Fasoo Secure Screen protects sensitive information displayed on your screen To protect sensitive information displayed on screens being grabbed by screen capturing tools, hot keys and/or remote desktop/virtual desktop infrastructure applications, application-specific or document-specific screen capture control must be enforced. Fasoo Secure Screen blocks efforts to capture what is on the screen and provides specific information through a watermark that shows the screen’s location. Both of these security measures help to secure your screen from unwanted exposure to competitors and other unauthorized people. “Our hospital manages patients’ medical image records through EMR and PACS systems. They make it convenient for our doctors and nurses to treat patients, however the threat for exposure of MRI and x-ray images is a major concern for us because our employees can screen capture those images, or take photos of the screen with digital cameras or smartphones. After applying Fasoo’s secure screen solution to the hospital’s medical management system, restrictions on illegally exposing copies and distributing medical information can be deterred and prevented. With improvements to security of this new system, our employees have become more effective at their jobs.” -General Hospital B, Medical Data Processing Manager-

    02/20/2016 PR 02/20/2016
  • Careers

    We're looking for the person who possesses both vision and talent to lead Fasoo's future Even a common idea can become a great idea when composed with the right team and company. Innovation can’t be done alone. We believe that through the right cooperative atmosphere those ideas will have no limit in how far they go as well as how successful they will be. Fasoo is waiting for you to help us build a better outlook collectively for the future of data and application security. Collective Creativity Being able to compromise based on good communication and consideration for others. Being able to aim higher and learn more. It’s not the time to stop learning, it’s time to continue to develop your knowledge to become an expert. Integrity and having a positive mindset are the base of our professionals. We are looking for people who believe that it is not just ‘my vision’, it is ‘our vision’. Through ‘Collective Creativity’, this is what makes up the core of the company mentality. This is what Fasoo is looking for.

    01/01/2016 PR 01/01/2016
  • Deter Information Leaks from Printed Files

    An overview on Fasoo Secure Print. Printouts often become the source of information leaks. Prints of sensitive document are easily left unclaimed or unattended at printers, and this may lead into information breaches. To prevent this, the print information needs to be centrally recorded, so that the printed information can be traced as needed. Selectively adding the user information and the custom phrases to the prints of sensitive documents is also effective in alerting users’ awareness on security. Fasoo Secure Print (FSP) adds a watermark and the ability to trace information disclosure through printouts Fasoo increases the security of printing by helping to deter leaks of sensitive information from printouts. Each secure printout contains a watermark that can reveal the source of the printed document and can even capture an image of the actual printout for reference when auditing the source of a leak. Not only will this raise awareness of printing sensitive information, but can also reduce unnecessary expenses for excessive and unwarranted printing. "As part of the planning team at a steel firm, we print a lot of architectural CAD drawings to discuss and share ideas during internal meetings until the final design is developed. Although we collect all the printed materials after our meetings, we are still nervous that some of these printouts will be leaked to the client before it is finalized, or that these printouts are accidently lost and end up in the wrong hands. After integrating the Fasoo printing solution, we can now track who prints specific files, which increases attention on security of these printouts. We have also decreased unnecessary printing. All in all, this has deterred the chance of information being leaked intentionally or accidently by one of our employees.” -Steel Firm Planning Team Manager-

    01/04/2016 PR 01/04/2016
  • Management - Executives

    Hyeyeon Ahn--> COO, CMO, Senior Executive Vice President Hyeyeon Ahn is the COO, CMO, Executive Vice President and Head of the Business Strategy Division at Fasoo. She has more than 20 years of experience in the software industry including such companies as Samsung SDS and Netpia.com. She also was awarded the 2014 ISLA Manager Professional for an Information Security Project Award, and previously has been recognized by the Women Information Technology & Science Association of Korea as well as Korea's Ministry of Information and Communication as one of the 100 experts on international IT standards She holds a B.S. and M.S. in Mathematics from Ewha Women’s University, and a Ph.D. in Computer Engineering from the University of Massachusetts. Seuk Soo Sung CTO, Senior Executive Vice President Seuk Soo Sung is the CTO, Senior Executive Vice President and Head of the Development Assurance Division at Fasoo. He oversees all aspects of product development, technology, and quality assurance. He has more than 20 years of experience in the software industry including ETRI (Korean Electronics & Telecommunications Institute), QNIX Computers and Microsoft Korea. During his time at Microsoft Korea, he led the efforts to meet the needs of customers by adding new features such as electronic payment, printing labels, research features and more to the Hangul Office 2007 system He holds a B.S. in Electronic Engineer from Kyungpook National University and M.S. in Computer Science from the Korea Advanced Institute of Science and Technology (KAIST). Jeesoo Lee--> CFO, Executive Director Jeesoo Lee is the CFO and Executive Director of the Management Support Division at Fasoo. Her previous experiences most notably are working at Samsung SDS in their Strategy Planning Team. Under her tenure at Fasoo, she has most notably led the process for Fasoo becoming a publicly traded company in Korea in October of 2013. She holds a B.S. in Mathematical Education from Seoul National University and M.S. from the Korea Advanced Institute of Science and Technology (KAIST). Jaeha Kim--> Executive Director Jaeha Kim is the Executive Director of the Enterprise Content Management Division at Fasoo. Most notably oversees Fasoo's Wrapsody solution. His previous experiences most notably are working at the Samsung Advanced Institute of Technology as well as a Senior Researcher at Samsung SDS. He was also the CEO of Partec 21, which is a B2B eMarketplace company. He has previously held positions as the vice-chairman for The Korean Council for e-Biz Businessmen as well as the Korea Association of Electronic Commerce. He has also served on the Policy Advisory Committee for the Ministry of Commerce, Industry and Energy and received the Ministry of Trade, Industry and Energy Korean e-Biz achievement award in 2003. He holds a B.S. in Electronic Engineering from Hanyang University and a M.S. in Computer Engineering from the Korean Advanced Institute of Science and Technology (KAIST). Kangman Lee--> Executive Director Kangman Lee is the executive director responsible for global marketing. He has over 25 years’ experience in the software and high tech industry. He held various executive positions in TmaxSoft, the largest software vendor in Korea, where he was responsible for sales and marketing, strategic planning and overseas business development for the last 15 years. Prior to TmaxSoft, he worked for a Korean government agency titled KOTRA promoting Korea’s high tech products and inducing foreign direct investment in New York and Seoul. He also served as Chief Operating Officer for Intellian Systems. He wrote a book titled “Product Marketing for Software” in 2013 which had been referred to by many software marketers as a guidebook on marketing practices for software products in Korea. Kangman received his Master’s degree in Business Administration with a concentration in marketing from the University of Iowa. Bongho Kang--> Managing Director Bongho Kang is the Managing Director of the National Sales Division. His previous experiences most notably are working at Doosan Information & Communications in their Interpia Sales Department, Korea Link, Sysweb as a General Manager of Sales and Cnetia also as their General Manger of Sales. He holds a B.S. in Computer Science and Engineering from Hanyang University. Jongsin Choi Managing Director Jongsin Choi is the Managing Director of the Cloud Service Division at Fasoo. He mostly oversees Fasoo's DigitalPage, DigitalQuick and Folder Cryptor services. His previous experiences most notably are Samsung C&T and Fasoo (2000~2002). He was also the CEO of Barunson Creative, which publishes and distributes console games. He holds a B.S. in Textile Engineering from Hanyang University. Ilsoo Jang Managing Director Ilsoo Jang is the Managing Director of the Program Analysis Division at Fasoo. He most notably oversees Fasoo's SPARROW solution. His previous experiences most notably are working at Hyundai Information Technology Co., Ltd in their Presales Team. He holds a M.S. in Financial Management from Sogang University. .wrap .main .column.right .container.article .articleView .articleText { max-width: 800px; } .wrap .main .column.right .container.article .articleView .articleText div h3 strong span { font-size: 20px !important; color: #1F84BA; } .wrap .main .column.right .container.article .articleView .articleText > .text_div { float: left; width: 30%; margin-top: 36px; } .wrap .main .column.right .container.article .articleView .articleText > p.intro { width: 66%; margin: 12px 0 24px 4%; float: left; } @media all and (max-width: 767px) { .wrap .main .column.right .container.article .articleView .articleText > .text_div { width: 96%; margin: 12px 2%; } .wrap .main .column.right .container.article .articleView .articleText > p.intro { width: 96%; margin: 12px 2%; } }

    01/02/2016 PR 01/02/2016
  • Protect Copyright of Your eBook and Securely Distribute

    An oveview on Fasoo eBook DRM. Starting from simply digitalizing contents on paper, eBook is steadily becoming the core element in the digital content industry; eBook has successfully extended its applications to novels, cartoons, catalogues, children contents, digital textbook, and many others by adding audio, video and interactive features and maximizing the user experience. However, because eBook is mainly distributed through the online network, there is a high chance of copyright infringement to occur through illegal replication, and this issue must be solved primarily to ensure the prosperity of the eBook market. Fasoo eBook DRM is the core solution in the eBook business that protects the copyright of eBook contents and ensures the prosperity of the eBook market As a DRM (Digital Rights Management) solution that follows eBook standards by the IDPF and consists of encryption and rights management bases, Fasoo eBook DRM is the core solution in the eBook business that protects the copyright of eBook contents and allows various business types, such as content sales and rentals. Some of the key benefits of Fasoo eBook DRM are as the only DRM (Digital Rights Management) solution that follows standards and security conditions of IDPF EPUB 2/3, the international standard eBook format, Fasoo eBook DRM protects the copyright of not only text-based eBook but also interactive eBook containing various multi-media. For the enhancement of security, we raised the reliability through adopting the cryptographic algorithm and key standards that satisfy the security recommendation (SP800-131) of the National Institute of Standards and Technology (NIST). Various platform types are supported, such as Windows based PC, iOS/Android based smartphones, and eBook readers. Fasoo eBook DRM is useful in extending business models through cross selling, B2C and B2B because it can simultaneously support various policy types, such as sales and rentals, and allows cross-compatibility among eBook services. In addition, cross selling among eBook service providers is supported. EPUB DRM technique of Fasoo has been selected as the standard eBook technique of South Korea, and Fasoo also participates in EPUB DRM international standardization of IDPF. Fasoo eBook DRM was adopted into eBook service of Kyobo Book Centre, the number one eBook provider, and Naver, the number one Korean search portal. "As the No.1 eBook service provider in Korea, we tried to adopt the safest and most robust technology for our complex business model and to support various devices from PC to mobile devices. Already being the top offline bookstore in Korea, by implementing Fasoo eBook DRM we were able to also lead the online eBook industry in providing secure online digital contents to our customers."

    02/04/2015 PR 02/04/2015
  • Secure Files Created and Used on Endpoints

    An overview on Fasoo Secure Node. Are you concerned about your files getting into the wrong hands? With conventional data security approaches, organizations may ensure documents are protected against external attacks but cannot when it comes to protecting them against insider threats. To protect documents against any malicious or careless users, documents must be protected and traced throughout the entire lifecycle, and the centralized security policy must travel with the docuemnts wherever they go, whether they are at rest, in use or in motion. Fasoo Secure Node (FSN) lets you secure sensitive files saved on your PC Even if files are lost or get into the wrong hands, unauthorized access is prevented and sensitive information is not exposed. Since files are automatically secured as they are saved, you can be assured that no one can access files leaked through any unauthorized disclosure to people inside or outside your organization. "Our internal Design team frequently creates CAD drawings and sends them to a third party for production. We take a laptop with the drawings to the production company and deliver them in person because we are afraid someone may leak these sensitive files to competitors. This helps prevent information from leaking, but there is still the issue of laptops being lost or stolen, and how to prevent someone else from accessing them. Now with Fasoo’s solution we are not concerned that sensitive CAD drawings will be lost or stolen and get into the wrong hands. Since the files are secured when saving them, we are confident about the security of our work, even if these files are exposed deliberately or by mistake to competitors.” -Heavy Industrial Machinery Corporation Design Leader-

    02/23/2016 PR 02/23/2016