Language English Japanese Korean Partner Portal Contact Us Location

Most Recent

  • Fasoo Invites You to Our Booth at RSA 2018

    We will be exhibiting at RSA 2018 in SF at the Moscone Center South Hall booth 629. Let us help you efficiently and securely manage your unstructured data with our unstructured data security and enterprise document platform. ​ -->

    Mar 21, 2018 PR Mar 21, 2018
  • Fasoo Data Security Framework - The Security Blueprint for Your Data

    The Fasoo data security framework consists of a three-tiered suite of solutions to strengthen information security. The Fasoo Enterprise DRM (FED) suite plays a pivotal role to enforce security policy on data among three layers of data protection. At the front-end, Fasoo eData Manager discovers and classifies the data, reapply policy to the data unprotected due to policy exceptions and exclusions. At the back-end, Fasoo RiskView enables organizations to manage risks holistically by collecting and analyzing logs of data usage and various sources that can be useful. This multi-layered approach enhances and completes an organization's security framework.

    Feb 25, 2016 Products / Solutions Feb 25, 2016
  • Fasoo Solution Overview

    Lead Digital, Fasoo Fasoo provides strategic intelligence for digital business in the areas of data security, application security, digital document management and productivity. Data Security < Fasoo Data Security Framework < FSD for ECM < eBook DRM < Cloud Service Application Security Static Code Analysis > Sparrow on Cloud > Digital Document Platform < Intelligent Digital Document Platform Productivity Ultimate Memo Service > Collaborative Service > top Data Security In this time in the digital era, data breaches are unstoppable because business data is freely distributed without any concern for internal/external corporate boundaries, through insider information disclosure and by APT attacks. Fasoo provides data-centric security to protect data as it travels both within the organizational perimeter and beyond by limiting access to sensitive data according to policies that cover both users and activities. Fasoo Data Security Framework Fasoo Data Security Framework helps organizations discover, classify and protect sensitive data so that you control who can access it, regardless of location. It discovers and classifies sensitive files automatically and encrypts them as you create them on the desktop, localize them from databases or download them from information systems. Dynamic security policies travel with the files and apply permission controls that grant or deny users the right to View, Edit, Copy, Paste, Print or Decrypt the files. If any unauthorized user got access to the file, they could not read the information inside. Policy Enforcement | Document Security Fasoo Enterprise DRM (Digital Rights Management) is an award winning persistent data security solution for protecting, controlling and tracing data throughout the enterprise – including data at rest, data in use, and data in motion – according to predefined policies based on user, group or role, or dynamically binding existing access control lists of information systems to enable file-level permissions at all times. Fasoo Enterprise DRM has been deployed to over 1,200 organization enterprise-wide, securing more than 2.5 million users. When sharing and collaborating internally, FSN allows you to secure, control and track sensitive documents created and used on endpoints. When sharing and collaborating, FSD allows you to secure, control and track sensitive ECM, ERP, groupware and other related documents beyond its controlled boundaries. When collaborating with partners and customers, FSE allows you to secure, control and track sensitive documents shared with external users. | Mobile Security When using personal devices for work, Fasoo Mobile Solution secures your data itself and controls access to your server for complete BYOD security. | Print Security When printing your files, Fasoo ePrint allows you reinforce print security and detect personal information in a document and through pull printing, block printing based on a predefined policy. | Screen Security When displaying your files on your screen, FSS prevents and deters security breaches through your screen. | Policy Optimization When monitoring and analyzing your data, Fasoo Usage Tracer allows you to monitor and analyze user/file activities, and optimize existing security policies. Data Discovery | Discovery and Classification of Unstructured Data Fasoo eData Manager is a data governance solution for discovering and classifying the constantly changing set of unstructured data based on its association with people and other characteristics, showing the data’s security vulnerability and dynamically applying security policies on a continuous basis. Risk Management | Analysis and Visualization of Risk Fasoo RiskView is a risk assessment solution for monitoring and analyzing users and their activities in using both protected and unprotected files, determining normal levels of activity, and using sophisticated data analysis techniques to discover deviations that may indicate security risks. FSD for ECM | Fasoo Secure Document for IBM ECM When extending security perimeter of your ECM, FSD for IBM ECM allows you to secure, control and track documents beyond controlled boundaries of IBM ECM. | Fasoo Secure Document for SharePoint When extending security perimeter of your ECM, FSD for SharePoint allows you to secure, control and track documents beyond controlled boundaries of SharePoint. eBook DRM When distributing eBook content, Fasoo eBook DRM protects the copyright of eBook contents and securely allows you to distribute them to your customers. Cloud Service Folder Cryptor offers a robust cloud security service that automatically encrypts files before they are uploaded into secure folders. top Application Security Application today build up the life of business, however, more than ever they are under constant attack. This is a new frontier for hackers. Rather than attacking perimeter security defenses, like firewalls and end point encryption applications, the hackers are getting developers to embed security vulnerabilities in their code. Fasoo provides a semantic-based static code analysis tool that can be deployed from the early stages of the SDLC (Software Development Life Cycle) to help identify and remediate software vulnerabilities. | Static Code Analysis SPARROW is a static code analysis tool that detects critical software vulnerabilities at the early stages of software development. SPARROW analyzes source code with a robust static analysis engine that uses a deep semantic method to find vulnerabilities, and provide analysis results that differentiates us from other tools. | Static Application Security Testing(SAST) SPARROW SAST (Static Application Security Testing) tool provides developers and security managers with the ability to accurately identify security vulnerabilities, remediate these flaws through code suggestions. | Static Code Analysis SPARROW QCE enables developers, quality testers and managers to analyze all possible paths of a program and identify quality defects in the very early stages of software development. SPARROW QCE provides accurate and efficient quality control for software development. | Cloud Service SPARROW on the Cloud cost effective application security testing cloud service that provides users with a source code analysis tool that detects potential security vulnerabilities in your software. top Productivity Fasoo provides cloud and mobile services that lets you secure, store data and manage different notes. | Ultimate Memo Service DigitalPage is an application that allows you to classify and manage different notes, schedules or business ideas by writing, tagging and linking pages on your mobile device. | Collaborative Service DigitalQuick is a cloud storage service for efficient collaboration that allows you to keep your documents up-to-date and manage updated history. top Digital Document Platform Every company faces constant challenges with managing the information that its employees generate. The ubiquity of devices and increasing availability of low cost storage encourage people to generate unprecedented numbers of copies of the files they create – many of which they don’t even realize they are creating. Fasoo has introduced Wrapsody, a new approach to content management. | Intelligent Digital Document Platform Wrapsody improves productivity with document sharing and collaboration through a digital document ID technology, which enables the same document to be automatically updated and synced. The Wrapsody platform can expand it’s flexibility through it’s core functions such as having full version control of their files (Spot Version Control) and always having the latest version of the file (On-Demand Sync) to cover document storage, management and distribution systems in addition to PC and mobile devices. The Wrapsody platform motivates document usage by users and document related work management for managers intelligently, through usage logs and analysis of the document content. Also, to learn more about Wrapsody, browse to .overviewWrap { font-family: Montserrat-Light, Verdana, helvetica, sans-serif;} .main .wrap .column.right .container.article .articleView .articleText .overviewWrap img {margin:0;} .overviewTopTitle {font-size: 24px; color: #2084ba; padding-left: 20px !important; position: relative;} .overviewTopTitle:before{content:''; position: absolute; width: 2px; height: 105px; display:block; background-color:#2084ba; top: 3px; left: 0;} #FDSF_tit{margin-top:20px; font-size:40px; } #FDSF_tit::before {content: '';display: block;position: absolute;width: 2px;height: 182px;background-color: #eb9419;top: 15px; left: 0;} .overviewWrap .tit1 {padding-left:100px; margin-bottom:20px; background:url('') 0 50% no-repeat; font-size:27px;height: 83px; line-height: 84px; font-weight:bold; letter-spacing:-2px; color:#eb9419; } .overviewWrap {color:#eb9419 !important;} .overviewWrap{ padding-left: 20px; font-size: 30px;} .overviewWrap {content: ''; display: block; position: absolute; width: 2px;height: 30px; background-color: #eb9419;top: 10px;left: 0;} .overviewWrap a{ color:#eb9419 !important;} .overviewWrap .tit1.bul2 {background:url('') 0 50% no-repeat; } .overviewWrap .tit1.bul3 {background:url('') 0 50% no-repeat; } .overviewWrap .tit1.bul4 {background:url('') 0 50% no-repeat; } .overviewWrap .tit1.bul5 {background:url('') 0 50% no-repeat; } .overviewWrap .tit1 span {padding-left:4px; font-size:17px; font-weight:100; vertical-align:baseline; letter-spacing:0;} .overviewWrap .tit2 {position:relative; margin:0 0 8px; font-size:34px; font-weight:bold; letter-spacing:-0.05em; color:#000;} .overviewWrap {margin-top:20px; font-size:40px; color:#0782C1 !important;} .overviewWrap .tit2 a {text-decoration:none !important; } .overviewWrap .tit3 {margin:0 0 20px; padding-left:22px; background:url('') 0 50% no-repeat; font-size:23px; font-weight:bold; color:#000;} .overviewWrap{color: #498931; background:url('') 7px 11px no-repeat; margin-top: 30px;} .overviewWrap .tit3.purple{color: #403180; background:url('') 7px 11px no-repeat;} .overviewWrap{color: #066e9b; background:url('') 7px 11px no-repeat;} /*2017 custom*/ .overviewWrap .subCon.FDSF {margin-left: 0; width: 100%; margin-top: 20px;} .overviewWrap .subCon.FDSF > img{width: 100%;} .overviewWrap .subCon.FDSF > dl{padding-left: 40px;} .overviewWrap .subCon.FDSF > dl > dt{margin: 40px 0 0 0; color: #6d6d6d;font-size: 18px;} .overviewWrap .subCon.FDSF > dl > dt:first-child{margin: 20px 0 0 0;} .overviewWrap .subCon.FDSF dl dl {margin-bottom: 20px;} .overviewWrap .subCon.FDSF dl dd{font-size: 15px;} .overviewWrap .subCon.FDSFSub {margin-left: 0; width: 100%;} .overviewWrap .subCon.FDSFSub > dl {padding-left: 20px;} .overviewWrap .subCon.FDSFSub > dl > dt{margin: 25px 0 0 0; color: #6d6d6d; font-size: 18px;} .overviewWrap .subCon.FDSFSub dl dd{font-size: 15px;} .overviewWrap .tit1.bul2 {background:url('') 0 50% no-repeat; color: #6fb92c !important;} .overviewWrap .tit1.bul3 {background:url('') 0 50% no-repeat; color: #80c241 !important;} .overviewWrap .tit1.bul4 {background:url('') 0 50% no-repeat; color: #1a96d5 !important;} .overviewWrap .tit1.bul5 {background:url('') 0 50% no-repeat; color: #6f59a5 !important;} .overBlock {position:relative; padding-top:60px; border-top:1px solid #bfbfbf;} .overBlock {position:absolute; top:-1px; right:0; width:40px; height:40px; background:url('') no-repeat; text-indent:-999em;} .overBlock .focusIdx {position:absolute; top:-108px;} .overBlock .focusIdxSub {position:absolute; top:-128px; max-width:100%; min-height:1em;} .overviewTab {width:100%; margin:20px 0 0 0; padding:0; overflow:hidden;} .overviewTab li {list-style:none; float:left; margin-left:20px; margin-right:40px; margin-bottom:15px; text-align:center;} .overviewTab li a {height:36px; font-size:12px; font-weight:bold; color:#000 !important; text-decoration:none !important; line-height:33px; box-sizing:border-box;} .overviewTab li a:hover, .overviewTab li a:active, .overviewTab li a.current {border-bottom:3px solid #1f83b8; color:#0782C1 !important;} .overviewWrap .subCon {width:790px; max-weight:100%; margin-left:63px;} .overviewWrap .subCon > dl {margin:0 0 60px; padding-left:25px;} .overviewWrap .subCon dl dt a {vertical-align:-10px; margin-right:5px;} .overviewWrap .subCon dl dt a .blue {color:#0782C1 !important;} .overviewWrap .subCon dl dt a .green {color:#71b253 !important;} .overviewWrap .subCon dl dd {margin:0 0 20px;} .overviewWrap .subCon dl dl:first-child{margin-top:16px;} .overviewWrap .subCon dl dl {margin-bottom:2px; padding-left:70px; overflow:hidden;} .overviewWrap .subCon dl dl dt {float:left; width:78px; line-height:40px;} .overviewWrap .subCon dl dl dd {float:left; width:calc(100% - 78px); line-height:20px;} .overviewWrap .subCon dl dl dd:last-child {margin:0;} .overviewWrap .subCon .small {font-size: 0.6em; letter-spacing: -0.03em;} .overviewWrap .overDl {padding:0;margin:40px 0 70px;} .overviewWrap .overDl dt {position:relative; padding:0;margin:0 0 4px 0 ;} .overviewWrap .overDl dt a {vertical-align:middle;} .overviewWrap .overDl dt span {display:inline-block; padding-bottom:0; margin-left:10px; vertical-align:bottom; font-size: 18px;color: #777;} .overviewWrap .overDl dd {padding:0;margin:0 0 26px 0;} .overviewWrap .overDl2 {padding:0 0 0 70px;margin:32px 0 65px;} .overview_menu {position:relative; width:736px; height:478px; margin:40px auto 70px; background:url('') 0 25px no-repeat;} .overview_menu ul {list-style:none; padding:0; margin:0;} .overview_menu ul > li > a {position:absolute; font-size:17px; color:#555 !important; text-decoration:none !important; line-height:1.3em;} .overview_menu ul > li > a strong {font-size:22px; letter-spacing:-0.03em; line-height:1.2em;} .overview_menu > ul > li > a:after {display:inline-block; content:''; width:16px; height:20px; margin:0 0 3px 8px; background:url('images/bul_menu_1.png') no-repeat; vertical-align:bottom;} .overview_menu ul > li > ul {position:absolute; min-width:190px;} .overview_menu ul > li > ul a {position:static; display:block !important; font-size:12px; color:#444 !important; text-decoration:none !important; line-height:18px; text-align:left;} .overview_menu ul > li > ul.after a{text-align: right;} .overview_menu ul > li > ul.after a::after {content: '';width: 20px; height: 20px;background: url( 0px -13px no-repeat; display: inline-block; position: absolute; margin-left: 5px;} .overview_menu ul > li > ul.before a::before {content: '';width: 20px; height: 20px;background: url( 0px -13px no-repeat; display: inline-block; position: absolute;left: -23px;} .overview_menu ul > li.menu5 > ul a::before { background: url( 0px -13px no-repeat; } .overview_menu ul > li.menu3 > ul a::after { background: url( 0px -13px no-repeat; } .overview_menu ul > li > ul a.rt14{position:relative; right: 14px;} .overview_menu .menu1 > a {top:70px; left:-10px;} .overview_menu .menu1 > a strong {color: #eb9419 !important;} /*.overview_menu .menu1 > a:after {background:url('') no-repeat;}*/ .overview_menu .menu2 > a {top:66px; left:625px; width: 234px;} .overview_menu .menu2 > a strong { color: #6fb92c !important;} /*.overview_menu .menu2 > a:after {background:url('') no-repeat;}*/ .overview_menu .menu3 > a {top:384px; left:24px;} .overview_menu .menu3 > a strong {color: #80c241 !important; } /*.overview_menu .menu3 > a:after {background:url('') no-repeat;}*/ .overview_menu .menu5 > a {top:410px; left:619px;} .overview_menu .menu5 > a strong { color: #6f59a5 !important;} /*.overview_menu .menu5 > a:after {background:url('') no-repeat;}*/ .overview_menu .sub1 {bottom:305px; left:-60px;} .overview_menu .sub2 {bottom:345px; left:636px;} .overview_menu .sub3 {bottom:-5px; left:-65px;} .overview_menu .sub5 {bottom:2px; left:625px;} .overviewImg {margin-bottom:30px;} .pl20{padding-left: 20px !important;} @media all and (max-width:1290px){ .overview_menu .menu2 > a{ width:120px;} .overview_menu .sub2{bottom: 315px;} .overview_menu .sub3{bottom: -25px; left: -25px;} .overview_menu .sub3 li a{width: 174px;} .overview_menu ul > li.menu3 > ul a::after{top: 0;} } @media all and (max-width:850px){ .overview_menu {width:320px; height:220px; background:url('') 50% 15px no-repeat; background-size:320px 200px;} .overview_menu ul > li > a {width:80px; font-size:9px; color:#555 !important; line-height:1.3em;} .overview_menu ul > li > a strong {font-size:12px; letter-spacing:-0.5px; line-height:1.5em;} .overview_menu > ul > li > a:after {width:8px; height:10px; margin:0 0 2px 2px; background-size:8px 10px !important;} .overview_menu ul > li > ul {display:none;} .overview_menu .menu1 > a {top:30px; left:-20px;} .overview_menu .menu2 > a {top:30px; left:264px;} .overview_menu .menu3 > a {top:166px; left:-7px;} .overview_menu .menu5 > a {top:178px; left:263px;} .overBlock .focusIdx {position:absolute; top:-126px;} .overBlock .focusIdxSub {top:-136px;} .overviewTab {margin:10px 0;} .overviewTab li a {height:21px; line-height:18px;} #FDSF_tit::before{height: 230px;} } @media all and (max-width:780px){ .overviewTab li, .overviewTab li:first-child, .overviewTab li:last-child {width:33.33%;} .overviewWrap .subCon {margin-left:0;} .overviewWrap .tit1, .overviewWrap .tit1.bul2, .overviewWrap .tit1.bul3, .overviewWrap .tit1.bul4, .overviewWrap .tit1.bul5 {background-size: 60px 60px;padding-left: 75px;} .overviewWrap .subCon dl dl, .overviewWrap .overDl2{padding-left: 35px;} } @media all and (max-width:450px){ .overviewTopTitle:before{height: 154px;} .overBlock {padding-top:40px;} .overBlock {width:20px; height:20px; background-size:20px 20px;} .overviewWrap .tit1 {padding-left:18px; font-size:18px; background-position:0 6px !important; background-size:14px 14px !important;} .overviewWrap .tit2, .overviewWrap {font-size:20px;} .overviewWrap .tit3 {padding-left:13px; font-size:17px; background-size:6px 6px;} .overviewWrap .subCon dl dt a {vertical-align:-3px;} .main .wrap .column.right .container.article .articleView .articleText .overviewWrap .subCon dl dt a img {height:16px !important;} .overviewWrap .subCon > dl {padding-left:15px;} .overviewWrap .subCon dl dl {padding-left:20px; margin-bottom:30px;} .overviewWrap .subCon dl dl dt {width:50px;} .overviewWrap .subCon dl dl dd {width:calc(100% - 50px);} .main .wrap .column.right .container.article .articleView .articleText .overviewWrap .subCon dl dt a img.overview_1_1 {width:136px; height:auto !important;} .overviewWrap .overview_2_1 {width:112px;} .overviewWrap .overview_2_2, .overviewWrap .overview_2_3 {width:87px;} .overviewWrap .overview_2_4 {width:125px;} .overviewWrap .overview_3_1 {width:149px;} .overviewWrap .overview_4_1 {width:148px;} .overviewWrap .overview_5_1, .overviewWrap .overview_5_2 {width:153px;} .overviewTab li, .overviewTab li:first-child, .overviewTab li:last-child {width:50%; margin-bottom:8px;} .overviewTab li a {height:20px; line-height:17px;} .overviewWrap .overDl {margin-bottom:40px;} .overviewWrap .overDl dt span {padding-bottom:5px; font-size:12px;} .overviewWrap .overDl2 {padding-left:40px;} .overview_menu {width:290px; height:150px; margin:20px auto 30px; background-position:50% 8px; background-size:210px auto;} .overview_menu ul > li > a {width:100px; font-size:9px; color:#555 !important; line-height:1.3em;} .overview_menu ul > li > a strong {font-size:10px; letter-spacing:-0.5px; line-height:1.5em;} .overview_menu .menu1 > a {top:-8px; left:25px;} .overview_menu .menu2 > a {top:-8px; left:200px;} .overview_menu .menu3 > a {top:95px; left:18px;} .overview_menu .menu5 > a {top:100px; left:205px;} .overviewWrap .tit1, .overviewWrap .tit1.bul2, .overviewWrap .tit1.bul3, .overviewWrap .tit1.bul4, .overviewWrap .tit1.bul5 { background-size: 40px 40px !important;padding-left: 55px; height: 50px; line-height: 50px;} .overviewWrap, .overviewWrap .tit3.purple, .overviewWrap { background-size: 6px 6px;background-position: 1px 9px;} } #FDSF_tit{font-size: 30px;} #FDSF_tit::before {height: 80px;top: 10px;} jQuery(document).ready(function($) { $(".scrollTop").click(function(event){ event.preventDefault(); $('html,body').animate({scrollTop:$('body').offset().top}, 500); }); $(".scrollShift").click(function(event){ event.preventDefault(); $('html,body').animate({scrollTop:$(this.hash).offset().top}, 500); }); });

    Apr 20, 2016 Products / Solutions Apr 20, 2016
  • Register to Download the Newest Fasoo Sponsored Ponemon Report on the New NYDFS Cybersecurity Regulations

    Register below to download a copy of the newest Ponemon Institute survey “Countdown to Compliance: Are financial services firms prepared for NYDFS 23 NYCRR 500?” Fasoo partnered with the Ponemon Institute to survey financial services executives and staff to determine how they are preparing to comply with New York’s new cybersecurity regulation. The survey was carefully designed to determine how financial services firms and registered third party service providers plan to comply with specific areas of the regulation. The results will provide valuable insight into challenges and compliance strategies. This survey is relevant to all organizations that operate under the New York banking, insurance and financial services regulations regardless of where their headquarters are located. register a.button{ display: inline-block; text-decoration: none; width: 160px; height: 34px;} a.button span{display:none;} a.button.register{background: url( no-repeat; } a.button.register:hover{background: url( no-repeat; }

    Jun 12, 2017 PR Jun 12, 2017
  • Wrapsody - Intelligent Digital Document Platform

    Every company faces constant challenges with managing the information that its employees generate. The ubiquity of devices and increasing availability of low cost storage encourage people to generate unprecedented numbers of copies of the files they create - many of which they don't even realize they are creating. To manage all this information, several tools exist: email, content management systems, file servers, cloud storage, enterprise messaging, social networks and many others. All of these can be valuable but they have limitations. Multiple versions of files proliferate throughout an organization, often without means of tracking them. Email messages are sent with file attachments that are not tracked and sometimes not properly saved on employees' devices. Multiple people will revise documents in parallel, leading to conflicts and lost changes. This makes it difficult to monitor how documents and document templates are used over time. Wrapsody improves productivity with document sharing and collaboration through a digital document ID technology Fasoo has introduced Wrapsody to address these issues. Wrapsody is based on a file-centric approach: it links files with metadata to enable automated content synchronization and version control management beyond repositories that employees may use inconsistently. As a platform, Wrapsody can expand its core functions flexibly into existing server systems such as ECM, Groupware, and ERP, in addition to PCs and mobile devices. The Wrapsody platform encourages document usage by users and allows managers to intelligently administer document related work through usage logs and analysis of the document content. To learn more about about Wrapsody, browse to 브로슈어제품 소개서구축 사례--> "We had trouble locating documents and had to search for the latest versions on different PCs, in email, cloud storage or on flash drives. After using Wrapsody, we could work on the latest customer response documents easily regardless of file location. We got instant feedback from colleagues helping us develop an ideal response.” [Principal Consultant]

    May 04, 2016 Products / Solutions May 04, 2016
  • Fasoo Sparrow - Intelligent DevSecOps Platform

    Sparrow has expanded to cover not only its static application security testing (SAST) tool, which received a 94.8 rating from OWASP and listed in the 2017 Gartner Magic Quadrant for Application Security Testing, but now also provides dynamic application security testing (DAST) tool and runtime application self-protection (RASP) tool. All of these testing tools are managed by Sparrow's new InteractiveHUB which can combine data and results in an interactive intergace as well as provide an API for other analysis tools. According to a recent Gartner report, more than 75% of cyber-attacks are on the application level, however, companies have only invested 10% of its dollars to application security. Also, about two-thirds of all web applications are vulnerable since they have never been tested for potential vulnerabilities. Existing technologies like SAST, DAST, and RASP are powerful tools, however, they are limited. For example, SAST helps companies to detect potential vulnerabilities in their source code, however, it has an issue with accuracy. DAST allows companies to mimic real attacks to test the site’s vulnerabilities, however, it does not show where the actual problems are. Finally, RASP helps to protect applications in real-time similar to a firewall, however, it can only stop a limited amount of attacks and would not completely eliminate the actual risk. To solve and to overcome these limitations, Fasoo has developed an interactive application security platform. These new interactive solutions include Sparrow SAST, DAST, RASP, and InteractiveHUB. Each testing solution’s result will be forwarded to the InteractiveHUB, an interactive analysis platform that collects and combines all the data and results to provide seamless interaction and integration of all tools. The InteractiveHUB will adjust the process or analysis approach of other solutions to complement other tools’ weaknesses to provide a more comprehensive analysis and security solution in order to mitigate possible risks. Complete Set in a Single Platform SAST, DAST, and RASP! Individually powerful tools are working together to yield a more complete analysis tool. Each technology is already powerful enough, however, each has its own weaknesses. Sparrow can eliminate these weaknesses because each tool can complement other tools to mitigate their known weaknesses to provide a more comprehensive analysis and security solution. Sparrow’s interactive solutions can be used in different phases of the SDLC to maximize efficiency and minimize risks. Seamless Integration to Manage Multiple Tools in a Single Platform Sparrow InteractiveHUB provides an interaction analysis platform that gathers and combines all data and results which allows seamless integration of all application security testing tools. Each tool’s analysis result will influence other tools’ analysis process. Unlike many other application security tools that are designed to work individually or only share results, Sparrow’s solutions are designed to work collaboratively so it will work as one solution without any competitiveness issues. Save Time and Eliminate Unnecessary Cost According to NIST, it could cost 30 times more to fix problem at the end of the SDLC than the beginning. That is why Sparrow provides you with the full coverage that covers all the benefits of SAST, DAST and RASP, while mitigating their weaknesses. Sparrow provides a flexible testing model that aligns with your organization’s testing requirements and budgets to build security into your software. *Based on Fasoo's internal testing, using SAST, DAST and RASP collaboratively and interactively, improved OWASP benchmark XSS detection rate by 92.96%. For more information on Sparrow, please contact us at

    Sep 18, 2017 Products / Solutions Sep 18, 2017
  • Fasoo Overview to the New York Department of Financial Services (NYDFS) Cybersecurity Regulations

    New York Governor Cuomo announced the first-in-the-nation cybersecurity regulation to protect New York’s financial services industry and consumers from the ever-growing threat of cyber-attacks that took effect on March 1, 2017. Four NYDFS Data-Centric Requirements 500.15 Encryption of Nonpublic Information Implment controls, including encryption, to protect Nonpublic Information held or transmitted both in transit over external networks and at rest. 500.07 Access Privileges Limit user access privileges to Information Systems that provide access to Nonpublic Information. 500.06 Audit Trail Include audit trails designed to detect and respond to Cybersecurity Events that have a reasonable likelihood of materially harming normal operations. 500.13 Limitations on Data Retention Secure disposal on a periodic basis of any Nonpublic Information that is no longer necessary for business operations or for other legitimate business purposes. INSTANT COMPLIANCE: Quick Wins in Data Security & Compliance Fasoo's solutions comprehensively meet the four data-centric requirements of the NYDFS Part 500 Cybersecurity Regulations.

    Jun 05, 2017 Products / Solutions Jun 05, 2017
  • Fasoo, Reinventing Security and Productivity

    Watch Fasoo data-centric security, governance and productivity solutions that can converge conflicts of interest of different stakeholders, and deliver ideal strategies to high pay-off business processes.

    Feb 24, 2017 Resources Feb 24, 2017
  • ​Fasoo Eyes Enterprise DRM Resurgence in the US

    A renewed interest in enterprise digital rights management (DRM) as the best data-centric security practice going forward in the United States following a string of high-profile data breaches will be a boon to Fasoo's global business, its CEO has said. Fasoo chief executive Kyugon Cho told ZDNet that there is a strong interest in enterprise DRM. "Many have expressed, and I concur, that enterprise DRM will be facing a renaissance through a 'second wave' of adoption," Cho said at the Gartner Security and Risk Management Summit 2017. To read the rest of this article, please click on the link below:

    Jun 28, 2017 PR Jun 28, 2017
  • FSD for IBM ECM - Extend and Reinforce Security to Share and Collaborate with IBM ECM Documents

    Organizations use IBM ECM to increase efficiency, improve control of information and reduce overall cost of information management. However, files are considered secure while they remain within a controlled boundary, but they cannot be controlled any more once they are legitimately downloaded to PCs. The downloaded documents can also be forwarded to unauthorized users, and thus can be read, saved and printed without restrictions. To avoid such issues, files should be persistently protected and continuously encrypted, whether in transit or in use throughout their entire lifecycle. Fasoo Secure Document for IBM ECM persistently protects your files downloaded from your ECM To persistently protect the files downloaded from IBM ECM, organizations need to extend the security of the repository to include files downloaded to end point devices. In addition, access to the downloaded files need to be dynamically enforced to reflect any changes on the repository ACL for ensuring continuous and consistent security. The integration of IBM ECM with Fasoo will extend IBM ECM security to content regardless of its location and provide enhanced access control for authorized users both inside and outside of the organization. Fasoo encrypts files downloaded from ECM repositories based on the users’ ECM permissions, or other metadata associated with them. The protected files maintain the security policy of the ECM system wherever they travel, and limit access privileges depending on users’ ECM permissions including View, Edit, Print and Screen Capture. All file activities are logged so an administrator has a full audit trail of the user, time and dataof access and even the device they accessed the file on. FSD for IBM ECM is seamless and will provide the security you need when files containing sensitive information are downloaded from IBM ECM systems. "With increase in government regulations requiring that all customer documents and anything related to monetary transactions is controlled and audited, we needed to make sure that our files from our IBM ECM system were protected at all times. With these files containing very sensitive information such as personally identifiable information, it was paramount for us that we do everything in our power to prevent exposing this information. By integrating Fasoo Secure Document for IBM ECM, we didn’t have to worry about data breaches while sharing these files or not meeting government regulations.” [Bank IT Security Manager]

    Feb 03, 2016 Products / Solutions Feb 03, 2016
  • FSD for SharePont - for Extend and Reinforce Security to Share and Collaborate with Microsoft SharePoint Documents

    Many organizations use Microsoft SharePoint to increase efficiency, improve control of information and reduce overall cost of information management. However, files are considered secure while they remain within SharePoint libraries, but these files can be legitimately downloaded to desktops, laptops and even mobile devices by authorized users, where they can be easily copied and forwarded somewhere else because it no longer retains any security controls. The documents can also now be read, saved and printed by any user without restrictions, thus the risk of data loss increases dramatically. To avoid such issues, files should be persistently protected and continuously encrypted, whether in transit or in use throughout their entire lifecycle. Fasoo Secure Document (FSD) for Microsoft SharePoint persistently protects your files downloaded from your ECM To persistently protect the files downloaded from SharePoint, organizations need to extend the SharePoint permission levels to include the documents downloaded. In addition, access to the downloaded documents need to be dynamically enforced to reflect any changes in SharePoint permission levels for ensuring continuous and consistent security. ECM allows organizations to share information and collaborate easily with colleagues, business partners and customers. ECM alone cannot provide persistent protection throughout the document lifecycle, since there is no way to track user and file activities of documents after they are downloaded. Fasoo Secure Document or FSD ensures files remain secure no matter where they go after users download them from the ECM system. FSD for Microsoft SharePoint gives enterprise complete control of how their content is being used once it leaves their direct control. The integration of Microsoft SharePoint with Fasoo will extend Microsoft SharePoint security to content regardless of its location and provide enhanced access control for authorized user both inside and outside of the organization. Fasoo encrypts files downloaded from ECM repositories based on the users’ ECM permission levels, or other metadata associated with them. The protected files maintain the security policy of the ECM system wherever they travel, and limit access privileges depending on users’ ECM permission levels including View, Edit, Print and Screen Capture. All file activities are logged so an administrator has a full audit trail of the user, time and data of access and even the device they accessed the file. FSD for Microsoft SharePoint is seamless and will provide the security you need when files containing sensitive information are downloaded from Microsoft SharePoint systems.

    Feb 18, 2015 Products / Solutions Feb 18, 2015
  • Fasoo, Discovering, Classifying, Protecting and Tracing Your Data

    Watch and learn how the Fasoo data-centric suite can help your organization discover, classify, protect and trace your data.

    Feb 23, 2017 Resources Feb 23, 2017
  • Protect Scanned Data with Fasoo Enterprise DRM

    How many of you face challenges to protect customer personally identifiable information (PII) from exposure to unauthorized internal and external personnel? Fasoo Enterprise DRM (Digital Rights Management) protects PII (personally identifiable information) gathered from multi-function devices and limits file access to authorized users.

    Aug 09, 2016 Resources Aug 09, 2016
  • Fasoo, A New Approach to Document Management

    Watch how intelligent document platform, Fasoo Wrapsody can help your organization share documents efficiently, save resources eliminating redundancies and provide security without compromising usability. To learn more about Wrapsody, browse to

    Nov 28, 2016 Resources Nov 28, 2016
  • Fasoo Management

    Kyugon Cho Chairman, Board of Directors President, CEO of, Inc. Kyugon Cho is the Chairman of the Board of, Inc. and the Founder, President and CEO of, Inc., the parent company. He has more than 30 years of experience in information technology, software and the cybersecurity industry. has been established by his leadership in 2000 and has become a global leader in data security and application security. He has been leading the Korean cybersecurity industry and served as the chairman of the Korea Information Security Association (KISIA) in 2012 and 2013. Prior to, he worked for Samsung SDS, one of the largest systems integrator companies in Korea, where he initiated several new businesses in Knowledge Management, Public Key Infrastructure, Internet Banking and Systems Management. He also worked for Samsung Electronics before receiving his Ph.D., where he developed network solutions. He holds a Ph.D. in Computer Engineering from Rutgers University and a B.S. and a M.S. in Electrical Engineering from Seoul National University. His research interests have been machine learning and artificial intelligence since his doctoral study and evolved to the areas such as advanced analytics in cybersecurity and self-organizing content management along with his professional experiences. He also actively participates in social activities such as Enactus, an international nonprofit organization dedicated to inspiring students to improve the world through entrepreneurial action, as a board member of Enactus Korea. John Herring President and CEO of Fasoo, Inc. John Herring is President and CEO of Fasoo, Inc. responsible for international expansion of Fasoo’s business. He has successfully introduced innovative information technology solutions to enterprise and government markets over the past 25 years. John led four ventures from early start to market prominence, including public market listings and strategic M&A exits. He guided companies in geospatial imaging, text search and retrieval, wireless location, and information security applications. John recently served as CEO of an In-q-Tel portfolio company, the venture investment arm of the U.S. intelligence community, where he fast tracked new technology information solutions to protect U.S. security. John serves as Founder Emeritus of Corstone Capital, a Washington DC global diversified private equity firm he established in 1993. He served as an officer in the U.S. Navy on the staff of Admiral H.G. Rickover at Headquarters of the Navy’s Nuclear Propulsion Program. John earned an MBA in Finance and Investments from George Washington University, and a Bachelor of Science from The Citadel. William Blake Senior Vice President, CCO of Fasoo, Inc. Bill Blake is the Senior Vice President and CCO (Chief Customer Officer) of Fasoo, Inc. He has over 30 years of experience in business process re-engineering and IT system integration. Following a successful career with IBM, Bill built and managed a systems integration firm focused on document management within the banking, legal and government sectors, which was acquired by IKON Office Solutions in 1997. Bill was also the Vice President of Enterprise Consulting for IKON Office Solutions in Malvern, PA. Prior to working for Fasoo, he formed eDocument Sciences, LLC, which provided consulting services related to management and control of critical businesses information. He holds a B.S. in Business Administration from Canisius College. Ronald Arden Executive Vice President, COO of Fasoo, Inc. Ron Arden is the Executive Vice President and COO of Fasoo, Inc. He has 30 years of strategic planning, marketing, sales, business development, consulting and technical experience in the information technology industry. Ron has held executive, management and technical positions at numerous organizations, including Digital Equipment Corporation and Wang Laboratories. Ron was also the Director of National Solutions Support for IKON Office Solutions. Prior to working for Fasoo, he was the Vice President of Strategy and Marketing at eDocument Sciences, LLC where he focused on improving the way customers manage documents with document security, cloud and collaboration solutions. He holds a B.S. in Electrical Engineering from the University of New Hampshire, Inc. Management Kangman Lee Senior Executive Vice President Kangman Lee is the Senior Executive Vice President at Fasoo. He has over 25 years’ experience in the software and high tech industry. He held various executive positions in TmaxSoft, the largest software vendor in Korea, where he was responsible for sales and marketing, strategic planning and overseas business development for the last 15 years. Prior to TmaxSoft, he worked for a Korean government agency titled KOTRA promoting Korea’s high tech products and inducing foreign direct investment in New York and Seoul. He also served as Chief Operating Officer for Intellian Systems. He wrote a book titled “Product Marketing for Software” in 2013 which had been referred to by many software marketers as a guidebook on marketing practices for software products in Korea. He received his Master’s degree in Business Administration with a concentration in marketing from the University of Iowa. Jeesoo Lee CFO Jeesoo Lee is the Executive Director, CFO and Head of the Management Support Division. Her previous experiences were working at Samsung SDS in the Strategy Planning Team. Under her tenure at Fasoo, she most notably led the IPO process for Fasoo in Korea in October of 2013. She holds a M.S. from the Korea Advanced Institute of Science and Technology (KAIST) and a B.S. in Mathematical Education from Seoul National University. Ducksang Yoon -->Head of Strategic Business Ducksang Yoon is the Executive Director and the Head of the Strategic Business. His previous experiences most notably were working at Samsung SDS, Secui and Lotte Data Communication. Prior to joining and Korea Telecom Data Systems (KT DS) as the Managing Director of Information Security Center. He recently was awarded with the Senior Information Security Professional Award by the Asia-Pacific ISLA in 2015 and awarded the Information Security Special Award by the Korea Association of Chief Information Security Officers in 2016. He is in process of receiving his Ph.D. in Information Security from Korea University and holds a B.S. in Natural Sciences and a M.S. in Information Security from Korea University. .wrap .main .column.right .container.article .articleView .articleText { max-width: 800px; } .wrap .main .column.right .container.article .articleView .articleText div h3 strong span { font-size: 20px !important; color: #1F84BA; } .wrap .main .column.right .container.article .articleView .articleText > .text_div { float: left; width: 30%; margin-top: 36px; } .wrap .main .column.right .container.article .articleView .articleText > p.intro { width: 66%; margin: 12px 0 24px 4%; float: left; } @media all and (max-width: 767px) { .wrap .main .column.right .container.article .articleView .articleText > .text_div { width: 96%; margin: 12px 2%; } .wrap .main .column.right .container.article .articleView .articleText > p.intro { width: 96%; margin: 12px 2%; } } .wrap .main .column.right .container.article .articleView .articleText { max-width: 800px; }

    Dec 26, 2017 About Fasoo Dec 26, 2017
  • Sparrow on Cloud - Application Security Testing Cloud Service

    SPARROW on Cloud is a static code analysis application that detects critical software vulnerabilities at the early stages of software development. This service is an agile, flexible, reliable and cost effective solutions that allowing organizations to easily manage application security challenges. Unlike other SAST solutions, SPARROW on Cloud analyzes source code with a robust static analysis engine that uses a deep semantic method to find vulnerabilities that other SAST applications may have difficulty identifying. The solution is designed to enforce multiple policies dynamically to different projects or users/groups, and offers faster analysis speed (1M LOC per hour) with accuracy (OWASP benchmark score: 94.8). In addition, SPARROW on Cloud enables organizations to identify and fix issues by leveraging machine learning and automation features like: Intelligent Issue Clustering: SPARROW on Cloud categorizes similar issues in groups that will allow organizations to identify and correct issues efficiently. Active Suggestion: SPARROW on Cloud is not only identifying software vulnerabilities, but also has the ability to remediate code using automated code suggestions. Issue Classification: SPARROW on Cloud analyzes, ranks, and prioritizes high priority issues in an easy to read dashboard display. Advanced Issue Filtering: SPARROW on Cloud provides detailed filter options for the detected issues (e.g., source API, sink API, called method, etc.). To learn more and start using SPARROW on Cloud, click on the button below.

    Jan 10, 2017 Products / Solutions Jan 10, 2017
  • Fasoo Wrapsody - Brochure

    Read more about how intelligent document platform, Fasoo Wrapsody can help your organization improve security, governance and productivity. Download the brochure to read more about Wrapsody and to learn more about Wrapsody, browse to

    Feb 24, 2017 Resources Feb 24, 2017
  • Fasoo Sparrow SAST - Brochure

    Read more about how machine learning based SAST solution, Fasoo Sparrow can help your organization build security into the software. Download the brochure to learn more about Fasoo Sparrow.

    Feb 24, 2017 Resources Feb 24, 2017
  • Fasoo Data Security Framework - Brochure

    Read more about how Fasoo Data Security Framework can help your organization enhance information security with data-centric security model with people-centric policies using data discovery, classification, protection, audit trail and behavioral analytic solutions. Download the brochure to learn more about Fasoo Data Security Framework.

    Feb 24, 2017 Resources Feb 24, 2017
  • Data-centric Everything Fasoo Solutions - Brochure

    Read more about how data-centric everything Fasoo solutions can help your organization improve security, governance and productivity. Download the brochure to learn about Fasoo data-centric solutions.

    Feb 24, 2017 Resources Feb 24, 2017
  • Fasoo, Data-centric Everything

    Watch how Fasoo data-centric security, governance and productivity solutions can help your organization to (i) enable intelligent digital document platform, (ii) discover, label and classify data, (iii) protect, control and trace information assets and (iv) analyze behaviors and re-act to potential risks.

    Feb 24, 2017 Resources Feb 24, 2017
  • Fasoo, Build Security into the Software

    Watch how Static Application Security Testing (SAST) solution, Fasoo Sparrow, can help accurately identify security vulnerabilities and remediate these critical defects through a machine learning based solution.

    Feb 24, 2017 Resources Feb 24, 2017
  • Sparrow SCE - Build Security into the Software

    Sparrow SAST detects security weaknesses in source code with its semantic based static program analysis engine History has proven that defects, bugs and flaws in software have consistently been the leading cause of security vulnerabilities. If developers can pinpoint this insecure code and correct it before deployment, the chances of these security vulnerabilities causing problems can be reduced or eliminated. Sparrow SAST (Static Application Security Testing) tool not only detects security vulnerabilities through the best static analysis engine based on semantic and syntactic methods, it also follows a strict set of compliance requirements and follows CWE, OWASP, CERT and other international standards. Sparrow SAST applies the best technology to the most optimal diagnostic tool Uses the latest semantic based static analysis tool Provides both semantic and syntactic engines to increase detection for security vulnerabilities and decrease or eliminate the number of defects, bugs and flaws in software Meets compliance requirements and detects fatal errors identified by international standards for coding Sparrow SAST can help you defend against threats of cyber terrorism Cyber-attacks typically target network weaknesses causing organizations to protect themselves with firewalls, intrusion prevention systems, and similar tools. Current cyber-attacks target weaknesses in the software organizations develop and use. It is difficult to stop malware related attacks after software has been developed. SPARROW SAST lets you virtually eliminate these attacks before the software is developed by detecting all security vulnerabilities in the source code. Meeting secure coding compliance requirements Most organizations and regulations now demand that developers follow secure coding compliance requirements for software development. This is in reaction to major incidents of cyber terrorism all over the world. SPARROW SCE can detect security vulnerabilities in your software and meet the compliance regulations and requirements before releasing the software. SPARROW SAST also detects some of the top weaknesses identified by international standard organizations such as the CWC/SANS Top 25, OWASP Top 10, and CERT. Fasoo helps developers reduce or eliminate these coding errors before they are deployed. CWE/SANS Top 25 Most Dangerous Software Errors GO CERT Secure Coding GO OWASP Top 10 GO Reduce the amount of detection time and lower the cost of security vulnerabilities According to NIST, if organizations detect and remove security weaknesses before completing development, they can reduce a maximum of 30 times of the expense compared to finding and removing security weaknesses after development. The use of a semantic-based static analysis tool, such as SPARROW SAST, is the only way to detect all of these security weaknesses within the source code before it is released. Establishes a practice of making security a priority in software development When SPARROW SAST is applied to secure coding, you create a safe and efficient software development environment. Checking source code for security vulnerabilities at an early stage of development improves all areas of security for an organization, since it will use defect and error free software. [Source:]

    Feb 23, 2015 Products / Solutions Feb 23, 2015
  • About Fasoo, Digital Intelligence for Security and Productivity

    At Fasoo, our main goal is to provide you with more robust and scalable data and application security, as well as mobile security to liberate people and businesses from various risks and constraints in their digital life and business. Fasoo plans to deliver exceptional value through our software to our customers and gain credit by developing software of true value that is recognized all around the world. As a leader within the Digital Rights Management industry, we continue to challenge ourselves and expand into new business areas to provide you with high quality software. Fasoo has developed competitive products and DRM solutions to succeed in the constantly changing IT environment and promises to meet the challenges to provide you with the software you need to secure your data and tackle security threats and unwanted limitations in this environment. Our Vision Our vision provides us with the framework to guide every aspect of our business. By 2020, Fasoo aims to be a global top 100 software company, produce four global software products along with two global number one products, have Fasoo Enterprise DRM be part of every business application and have our source code analysis tool, SPARROW on every developer’s desktop. These are just some of the visions we aim to accomplish in order to achieve sustainable, quality growth.

    Mar 01, 2016 About Fasoo Mar 01, 2016
  • Location

    North America Headquarters 7315 Wisconsin Avenue, Suite 420 Bethesda, MD 20814 Tel: (732) 955-2333 Global Headquarters 396 World Cup Buk-ro Mapo-gu, Seoul 121-795, South Korea Tel: +82-2-300-9000 Fax: +82-2-300-9400 --> Regional Office in Korea Seocho-gu, Seoul 137-858, South Korea EWR Building, 10th Floor, 1330-8 Tel: +82-2-300-9190 Fax: +82-2-300-9405 --> /* function initialize() { var mapDiv = document.getElementById('fmap1'); var map = new google.maps.Map(mapDiv, { center: new google.maps.LatLng(37.579702,126.890266), zoom: 18, mapTypeId: google.maps.MapTypeId.ROADMAP }); var content = '17th FL, Nuritkum Square Business'; var infowindow = new google.maps.InfoWindow({ content: content }); var marker = new google.maps.Marker({ map: map, position: map.getCenter(), draggable: true });, marker); } function initialize2() { var mapDiv = document.getElementById('fmap2'); var map = new google.maps.Map(mapDiv, { center: new google.maps.LatLng(37.492669,127.028346), zoom: 18, mapTypeId: google.maps.MapTypeId.ROADMAP }); var content = 'EWR Building 10th Floor'; var infowindow = new google.maps.InfoWindow({ content: content }); var marker = new google.maps.Marker({ map: map, position: map.getCenter(), draggable: true });, marker); } */ function initialize3() { var mapDiv = document.getElementById('fmap3'); var map = new google.maps.Map(mapDiv, { center: new google.maps.LatLng(38.982625,-77.092868), zoom: 18, mapTypeId: google.maps.MapTypeId.ROADMAP }); var content = 'Fasoo, Inc.'; var infowindow = new google.maps.InfoWindow({ content: content }); var marker = new google.maps.Marker({ map: map, position: map.getCenter(), draggable: true });, marker); } // google.maps.event.addDomListener(window, 'load', initialize); // google.maps.event.addDomListener(window, 'load', initialize2); google.maps.event.addDomListener(window, 'load', initialize3);

    Sep 21, 2017 About Fasoo Sep 21, 2017
  • Fasoo Enterprise DRM (FED) - Persistent Data Security Solution for Any Business Environment

    How secure are your files? What would happen to your business if a file with sensitive information were to leave your organization? Can you afford not to have the best protection solutions? Fasoo Enterprise DRM (Digital Rights Management) protects the file itself to provide a more secure work environment. Fasoo Enterprise DRM is a file-based security solution that prevents the exposure of sensitive and confidential files by trusted insiders, business partners, customers and unauthorized people. Here is the problem with traditional content management systems: People can easily access sensitive business information from mobile, cloud or virtual environments. This allows us to communicate and collaborate more conveniently, but increases the risk of losing our trade secrets, classified documents and PII (Personally Identifiable Information) with just one click. Against these threats, file-based security such as information rights management is the best solution to protect you from information leaks. Documents are secure while they remain in a controlled boundary, like a content management system. DLP (Data Loss Prevention), firewalls, intrusion detection and intrusion prevention systems can protect information from outside attacks or potentially stop sensitive information from leaving an organization. These solutions can’t stop everything and increase the complexity of the network infrastructure. Authorized people inside your organization can send out sensitive information by mistake or deliberately. That information is no longer secure once it leaves your organization. Persistent File-based Security for Any Business Environment Fasoo Enterprise DRM protects, controls, and traces sensitive files containing intellectual property, trade secrets, PII, and more. It maintains file protection and prevents unintended information disclosure no matter where it is. In contrast with conventional security solutions, Fasoo Enterprise DRM protects information itself persistently whether it is stored, being used, being transmitted, or even after transmission, throughout the entire document lifecycle. This is the only complete and effective solution that protects you against unwanted information leaks from anyone. Fasoo Enterprise DRM uses an encryption in their solutions that is certified from Korea's National Intelligence Service (NIS), to protect and manage sensitive documents in any environment whether it is saved to a PC, downloaded from a server, printed, or sent by email. Fasoo Enterprise DRM is an essential security infrastructure component for every enterprise application system as mobile and cloud computing diversify and expand the enterprise IT environment. With Fasoo Enterprise DRM, organizations can safely share confidential documents internally and externally, freeing themselves of any concern about unintended information loss. Fasoo Enterprise DRM Key Facts Global leader in enterprise DRM First company in the world to commercialize DRM as a product World’s largest enterprise DRM customer base Fasoo is the only company that has developed and equipped their encryption module “Fasoo Crypto Framework” with a National Intelligence Service certified encryption technology Supports any environment where files are distributed Can be integrated with information systems such as ECM, ERP, PLM and more Extend security to mobile and cloud environments Deployed to more than 1,100 organizations, with over 2 million users around the world In 2014, Fasoo was awarded as a winner in the Security Products and Solutions for Enterprise (Large) category at Info Security Products Guide's Golbal Excellence Awards In 2011, Fasoo was awarded with the ‘2011 Global Digital Rights Management Competitive Strategy Innovation of the Year’ from global research and consulting company, Frost and Sullivan In 2010, Fasoo was referenced as one of the “Global Top 6 DRM Companies” in an Aberdeen Group Report In 2010, Fasoo was the only Asian company to be referred as one of the “Global Enterprise DRM Top 7 Vendors’ from world renowned global research & consulting company, Gartner.

    Feb 02, 2016 Products / Solutions Feb 02, 2016
  • Fasoo Secure Document (FSD) - Protect Files Beyond the Boundaries of Content Repositories

    What happens when information leaves the repository? Information repositories are widely used to store and share data and documents. The security measures in these systems are insufficient to protect files outside of the repository. Once someone downloads files, they no longer retain any security controls. Organizations realize that investments in network security cannot prevent leaking of sensitive information by insiders, since they already have authorized access to that information. Fasoo Secure Document (FSD) persistently protects documents downloaded from information systems Fasoo ensures your documents remain secure no matter where they go after you download them. You are protected whether you use Microsoft SharePoint, IBM FileNet or any ECM, EDM, ERP or groupware system. To persistently protect the documents populated from central repositories, organizations need to extend the security of the repository to include files downloaded to end point devices. In addition, access to the downloaded files need to be dynamically enforced to reflect any changes on the repository ACL for ensuring continuous and consistent security. FSD integration with Microsoft SharePoint and IBM ECM is seamless and will provide the security you need when files containing sensitive information are downloaded from SharePoint or IBM ECM. “Our company shares sensitive research information and company assets stored in an information system and patent application system. Due to the sensitive nature of these files, it is extremely important that we prevent exposing this information to our competitors, as we will suffer heavy financial losses. We needed a security solution that could limit certain department’s access to specific files. For example, only allowing research departments access, and restricting access to the management support, planning, and other departments. With the addition of Fasoo’s solution we didn’t have to worry about information leaking and getting into the wrong hands.” -Research Institute IT Security Manager-

    Feb 10, 2016 Products / Solutions Feb 10, 2016
  • Fasoo Partners

    Fasoo Partners Fasoo believes that partnership is the fuel to drive its business forward and to the next level. So we are focusing on establishing and maintaining a mutually sustainable and strong relationship with partners to bring its products and services to maturity and perfection. From this stance, Fasoo is partnering with a number of sales, SI and technology partners worldwide. Partner-Ready Fasoo Partner Program can accommodate partners in any size, region and verticals with flexible conditions. All Fasoo-certified partners will have immediate access to a comprehensive Fasoo Partner Portal and Fasoo Technical Support Center for sales, marketing and technical resources, tools and dedicated support to gear up for and facilitate their Fasoo business practices. Become a Fasoo Partner Today! Partnering with Fasoo will enable you to capitalize on the increasing market demands for data and application security. Fasoo continues to seek channel and technology partners from all parts of the world with proven security expertise and resources. Let’s explore your partnership with Fasoo! inquiry partner a.button{ display: inline-block; text-decoration: none; width: 160px; height: 34px;} a.button span{display:none;} a.button.partner {background: url( no-repeat; } a.button.partner:hover{background: url( no-repeat; } a.button.inquiry {background: url( no-repeat; } a.button.inquiry:hover {background: url( no-repeat; } .partnerView { margin: 0 auto; max-width: 800px; } .partnerView ul { list-style: none; padding: 0 !important; } .partnerView ul li { float: left; margin: 0 12px 12px 0; list-style: none!important; } .partnerView h3 { clear: both; } .partnerView .btn2 { display: block; width: 200px; font-size: 12px; font-weight: bold; border: 1px solid #c9c9c9; background: #f9f9f9; text-align: center; height: 30px; line-height: 30px; text-decoration: none !important; margin: 0 auto 52px; } .partnerView .btn2 font { color: #222; }

    Jan 01, 2016 About Fasoo Jan 01, 2016
  • Fasoo Announces Fasoo Enterprise DRM 5.0

    Fasoo Announces Fasoo Enterprise DRM 5.0 The newest version of Fasoo Enterprise DRM builds on Fasoo's three-tiered suite of solutions, used by enterprise organizations around the world, to discover, classify and protect sensitive data as it is created and distributed. Fasoo Enterprise DRM 5.0 newest features include: Enriched risk management model – Uses advanced policy assessment techniques for quick and easy validation of security policies; comprehensive usage and policy statistics to quickly adjust policies; and a proactive policy change interface that allows administrators to change security policies quickly and easily. Flexible exception policy management – Flexible exception policy settings can now be applied to different users, groups or roles; granular exception policy templates and a built-in approval workflow solution simplifies exception policy requests to reduce change management issues. Improved external sharing – Sharing policies include restricting external collaboration permissions based on flexible policies; allowing document owners to easily change restricted number of views, device counts or validity periods with template based enforcement; and minimized helpdesk issues with the addition of a sleep mode that wakes only when the protected document is in use. Improved usability – Expanded security policies including encryption by file extension, application and scheduled batch; extended platform support including Mac, desktop virtualization and application virtualization on Windows, iOS and Android; more out-of-the-box pre-integrated modules that automatically encrypt/decrypt sensitive files; and improved client ADK allowing third party application vendors to more easily develop and customize Fasoo compatible user applications. To view the rest of this article from PR Newswire, please click on the link below:

    Sep 06, 2016 PR / Webtoon Sep 06, 2016
  • Fasoo Inc. Names John Herring as CEO

    Fasoo Inc., announced that John Herring has been appointed CEO/President and a member of the company's Board of Directors. Mr. Herring will be responsible for leading the U.S. and international expansion of its parent company's data-centric enterprise solutions. We are very pleased Mr. Herring has joined in our vision to make Fasoo a global leader in data-centric enterprise solutions," Dr. Cho commented. "We have 300 employees dedicated to solutions for enterprise security, governance and productivity needs centered on data at rest, in transit and in use, anywhere and anytime. We look forward to expanding our award-winning solutions in the U.S. and international markets." To read more about this article, please click on the link below:

    Feb 09, 2017 PR / Webtoon Feb 09, 2017
  • Fasoo Companions

    Fasoo is trusted by the world's leading organizations to safeguard and manage their digital assets. The enviable customer base covering sizes, industries and nationalities, attests to Fasoo's ability to address the market needs and deliver exceptional value to its customers.

    Jan 01, 2016 About Fasoo Jan 01, 2016
  • Fasoo Support

    How can we help you? Fasoo provides a diverse range of support services to help you with Fasoo solutions and services wherever you are. Our experienced support staff and engineers deliver dependable and satisfactory service to meet your needs. We are here to help you. US Support (866) 311-6373 Global Support +82-2-300-9300 For further assistance please use our contact form here.

    Mar 22, 2016 Support Mar 22, 2016
  • Fasoo Secure Exchange (FSE) - Secure Your Files Shared with External Users

    Business relationships require cooperation through partnerships, outsourcing, and collaboration with many different organizations. Sensitive files are shared outside of the company through email, cloud-based sharing services, FTP, and other portable media. The threat of unwanted information disclosure is real and the potential impact this makes on a company is devastating. The need for security measures for files shared with outside parties has become critical to an organization’s security plan. Fasoo Secure Exchange (FSE) lets you share your sensitive files securely through email, FTP, USB flash drives, the cloud and more When a file is shared externally, FSE ensures a secure exchange of information, which guarantees that files are shared with only the intended recipients. The sender can decide who can access sensitive files and what permissions they have for using them, such as View, Edit or Print. Persistent security remains in place and provides the sender with assurance that these files are secure. Even when files are unintentionally sent to the wrong parties, a sender can revoke future access to them. All actions are logged for future analysis providing peace of mind. “Our company has various business affiliates including construction, raw material, and steel. We have already implemented Fasoo’s solution at our subsidiaries to protect files created within our organization. When we receive orders from construction firms, we need to cooperate with our steel affiliate so it can deliver the necessary materials. We needed to protect our information when sharing between our affiliates because there is a high risk that sensitive information could be exposed to the wrong people. After applying the Fasoo security solution to files sent outside of the company, sharing and cooperation is more prevalent and secure between subsidiaries. Business efficiency has increased along with positive feedback from all affiliates.” [J Group Data Processing Team Leader]

    Feb 21, 2016 Products / Solutions Feb 21, 2016
  • Sparrow - Manage Security Vulnerabilities Effectively

    Sparrow is a static code analysis tool that is performed without actually executing programs, detecting critical software vulnerabilities at the early stages of software development. Sparrow analyzes source code with a robust static analysis engine that uses a deep semantic method to find vulnerabilities that other tools can’t. It detects security vulnerabilities such as buffer overruns, SQL injection, cross-site scripting, information leakage, TOCTOU race condition and hardcoded password. It also detects run-time errors such as memory/resource leaks, null dereference, uninitialized variables, division by zero, use after free and integer overflow. People choose Sparrow because it uncovers critical and relevant vulnerabilities during the early stages of the Software Development Life Cycle (SDLC). Sparrow is popular with government agencies, corporations and anyone developing embedded software that requires a very high level of software quality. The Static Application Security Testing (SAST) version of Sparrow is also used by the government and financial industries which aim to eliminate all security weaknesses from their source code. Static Application Security Testing (SAST) tool with... ACTIVE SUGGESTION Sparrow can be deployed on both the development and testing phases in the SDLC. As an SAST tool, Sparrow provides developers and security/quality managers with the ability to accurately identify software vulnerabilities, remediate code using ACTIVE SUGGESTION, enforce project based rules for developers and customize policies according to project requirements. Currently no other solution has a similar feature as ACTIVE SUGGESTION, where you are provided code suggestions to easily fix the vulnerabilities in your software. Intelligent Alarm Clustering Sparrow's Intelligent Alarm Clustering groups related vulnerabilities in the source code with a unique ID. A developer can review results and address vulnerabilities faster and easier throughout the SDLC. Intelligent Alarm Clustering reduces review time because it reduces the number of alarms to review and also reduces fix time since these vulnerabilities are in clustered groups and can be remediated in order instead of going back and forth. Advanced Issue Filtering Sparrow provides Advanced Issue Filtering which analyzes the characteristics of issues and eliminates errors with have to analyze them over and over again, each time. Static analysis tool based on a deep semantic method with the best technology It is the semantic approach that allows Sparrow to follow all possible execution scenarios, to be more exhaustive than other tools, rather than focusing on discovering particular patterns. In addition to the semantic tools, Sparrow also utilizes syntactic tools to quickly find shallow bugs based on fixed patterns. Sparrow balances the depth of its bug detection coverage with a reasonable analysis cost. Development process linked to the highest academic research Sparrow is similar to other analysis tools which derived their research and product toolsets from prestigious universities like Stanford University and the University of Wisconsin. These tools have gained great respect and success in the marketplace for their technological research. Sparrow's semantic based static analysis tool was developed based on a joint research program with the prestigious Seoul National University. With six years in research and another five years for commercialization, Sparrow has been proven not only technically but also on its marketability. Fasoo continues to work with Seoul National University to improve Sparrow and develop new programs to strengthen the overall source code analysis market. Active support for correcting flaws in source code Sparrow offers a web based user interface that links between source pages, helping the user quickly navigate source code to verify alarms. Prompt correction of the detected bug can be made through an error analysis report and detailed analysis guide. Related examples and information about each defect can be confirmed and explained through CWE, CERT, OWASP, HIS, HICPP, MISRA and more. CWE: A Community-Developed Dictionary of Software Weakness Types CERT: Computer Emergency Response Team for Internet Security Incidents OWASP: Open Web Application Security Project Flexible deployment and operation All on-going projects are managed on the server through the web-based integrated management system which provides helpful resources to configure a safe collaborative system and to operate efficiently for large-scale projects. No matter the development environment, organizations can use Sparrow without restriction on where the analysis engine is installed, whether on a server or on a user’s PC. [Award] Gold Winner in the Vulnerability Assessment, Remediation and Management category at the 2014 Info Security Products Guide's Global Excellence Awards [Certification] SGS TUV SAAR - Certified for products in accordance with ISO 26262 [Korean Patent] Memory Leak Detecting Apparatus and Method thereof (Patent No. 100965426)

    Feb 02, 2016 Products / Solutions Feb 02, 2016
  • Fasoo Sponsors Ponemon Institute Survey on NYDFS 23 NYCRR 500

    Fasoo, Inc., the leader in data and application security, today announced its sponsorship of a Ponemon Institute survey to determine the readiness of financial firms doing business in New York State to comply with new cybersecurity regulation (NYDFS 23 NYCRR 500). The new governance went into effect on March 1, 2017 and includes deadlines for firms to implement procedures and solutions to achieve compliance with the new standards. For more about this article, please click on the link below:

    Mar 21, 2017 PR / Webtoon Mar 21, 2017
  • Fasoo eData Manager - Discover and Classify to Understand Your Data

    For an effective and efficient data security, organizations must define the scope of data to protect. However, it is not easy to understand all the target documents since the volume, location, filename extension, number of copies or security sensitiveness of target files are continuously changing. To properly understand the target files to enforce data security, organizations must discover and all unstructured data residing in endpoint devices and repositories, and classify and protect the files according to its own data security strategies. Understand your own data to set up your own data security policy with Fasoo eData Manager Fasoo eData Manager is an enterprise classification and security policy management tool that is complementary to Fasoo Enterprise DRM as well as valuable by itself. It scans files throughout the enterprise to find content that is confidential or of high value. It can scan files located within folders and logical drives on PCs – that is, it can scan files on file servers, cloud storage servers, repositories, and anything else that can be mounted as a logical drive or shared folder. The files that Fasoo eData Manager scans are those that match templates which specify criteria for files to be scanned. These include: Storage devices (fixed or portable), folders, or individual files. Filename extensions (file types, e.g. Microsoft Word documents, Excel spreadsheets, PDF). Pattern matching within file names or file content, as defined by keywords or regular expression matches Fasoo Enterprise DRM document classes Users and user groups Scans can be set up to take place periodically, (i.e daily, weekly, etc.). Fasoo eData Manager displays statistics on file characteristics that it gathers from scans, which include: Files that are unprotected, protected by Fasoo Enterprise DRM, or protected by Fasoo eData Manager encryption. Files whose names or contents contain matches to regular expressions or keywords, such as PII. File extensions (types) of interest, such as Microsoft Excel spreadsheets or PDFs. Files that have been distributed throughout the organization. Day-to-day variations in these statistics. "With Fasoo eData Manager, managers and security administrators now have an adequate decision making process, to determine and respond to risks related to sensitive documents." [CIO of Nuclear Power Plant]

    Feb 23, 2016 Products / Solutions Feb 23, 2016
  • Fasoo ePrint - Reinforce Print Security and Help Reduce Costs

    The average employee prints about 10,000 pages a year and 17% of them are pages the employee did not intend to print. This not only leads to high printing costs but also to data breaches from printing sensitive information. Fasoo ePrint provides you with a safe and efficient printing environment With protective measures and cost cutting capabilities, Fasoo ePrint provides an effective yet secure print management solution. If Fasoo ePrint detects sensitive information in a document, a predefined policy can block printing. It controls and traces printed documents on your existing MFPs, so you can continue to use your current output devices. When used with Fasoo Enterprise DRM solutions, it extends the security area and provides stronger protection for personal information maintained within companies. "It is not uncommon to print yearly salary information as part of our daily routine in HR. Since my office is far from the printer and I worry that someone may steal this sensitive information, I intentionally wait until after work to print these documents. There was a time when I printed this kind of information and by the time I got to the printer, the printout was gone. After Fasoo ePrint was introduced into my company, I was able to go to the printer anytime I wanted and safely retrieve my documents. After authorizing myself with my smartphone application, I could print my document and retrieve it while standing in front of the printer. This assures me that this printed information will not fall into the wrong hands.” -Electronics Company HR Manager-

    Feb 05, 2016 Products / Solutions Feb 05, 2016
  • Download the Latest Ponemon Report on How Company Insiders Put High Value Information at Risk

    Fasoo partnered with the Ponemon Institute to present: "Risky Business: How Company Insiders Put High Value Information at Risk". About 640 IT security practitioners familiar with their organization's approach to protecting data, documents and files against cyberattacks were surveyed and found that: 56% say company insiders are the primary cause of data breaches 72% are not confident they can manage and control employee access to confidential files 70% do not know the location of confidential information 73% believe they lost confidential information in the past 12 months Some other highlights of this report are that Sales, C-level executives, Finance and Human Resources departments pose the greatest risk to high-value data, while 83% struggle with determining the approrpriate level of confidentiality documents and files should possess. .main .wrap .column.right .container.article .articleView .articleText ul.resourceItem { display: none; }

    Jun 13, 2016 Resources Jun 13, 2016
  • Site Map

    Products/Solutions Data Security Fasoo Data Security Framework - Fasoo Enterprise DRM Fasoo Secure Node (FSN) Fasoo Secure Document (FSD) Fasoo Secure Exchange (FSE) Fasoo Secure Document for IBM ECM Fasoo Secure Document for SharePoint Fasoo Secure Screen (FSS) Fasoo Usage Tracer Fasoo Mobile Gateway Fasoo View/Fasoo View Plus - Data Discovery Fasoo eData Manager - Risk Management Fasoo RiskView Print Security Fasoo ePrint Mobile Security Fasoo Mobile Solution Fasoo Mobile Gateway Fasoo View/Fasoo View Plus Content Platform Fasoo eBook DRM Application Security Sparrow Sparrow SAST Sparrow QCE Sparrow on Cloud Digital Document Platform Wrapsody Cloud Service DigitalQuick Folder Cryptor DigitalPage Resources Brochures Videos Solutions Sheets Reports About Fasoo Overview Management Careers Locations Customers Partners PR Announcements Fasoo in the Media Support Support .smTitle_h2 { display: inline-block; margin: 0 0 18px; height: 36px; line-height: 35px; padding: 0 8px !important; background: #1f84ba; color: #fff !important; font-size: 15px !important; font-weight: bold; } .smTitle_h3 { color: #1f84ba; font-size: 16px; clear: both; font-weight: bold; margin: 0 0 18px !important; } .smTitle_h4 { color: #000 !important; font-weight: bold; font-size: 14px; clear: both; margin: 0 0 5px !important; } .smTitle_h4 a { text-decoration: none !important; color: #000 !important; } .dep4 { color: #444444; font-size: 14px; font-weight: normal; clear: both; display: block; margin: 0 0 0; } .dep4 a { color: #444444 !important; text-decoration: none !important; } .sm_ul { float: left; max-width: 300px; list-style: none !important; padding-right: 0 !important; margin: 0 0 16px !important; padding-left: 12px !important; } .sm_ul.pr80 { padding-right: 80px !important; } .sm_ul li { min-height: 18px; line-height: 18px; } .dep5 { color: #666; font-size: 13px; } .dep5 a { color: #555!important; text-decoration: none !important; } .fl { float: left; } .cb { clear: both; }

    Jan 01, 2016 About Fasoo Jan 01, 2016
  • Careers

    We're looking for the person who possesses both vision and talent to lead Fasoo's future Even a common idea can become a great idea when composed with the right team and company. Innovation can’t be done alone. We believe that through the right cooperative atmosphere those ideas will have no limit in how far they go as well as how successful they will be. Fasoo is waiting for you to help us build a better outlook collectively for the future of data and application security. Collective Creativity Being able to compromise based on good communication and consideration for others. Being able to aim higher and learn more. It’s not the time to stop learning, it’s time to continue to develop your knowledge to become an expert. Integrity and having a positive mindset are the base of our professionals. We are looking for people who believe that it is not just ‘my vision’, it is ‘our vision’. Through ‘Collective Creativity’, this is what makes up the core of the company mentality. This is what Fasoo is looking for.

    Jan 01, 2016 About Fasoo Jan 01, 2016
  • Fasoo Secure Screen (FSS) - Prevent and Deter Security Breaches Through Your Screen

    Screen capture tools and the proliferation of high-quality digital cameras and smartphones make it easy for anyone to capture sensitive information displayed on a computer screen. With nothing preventing it, the likelihood of a major data breach from capturing this information on the screen is increasing. Some companies limit the possession of these devices or use different items to ensure that the camera lens are blocked, but it makes life inconvenient for employees. Fasoo Secure Screen protects sensitive information displayed on your screen To protect sensitive information displayed on screens being grabbed by screen capturing tools, hot keys and/or remote desktop/virtual desktop infrastructure applications, application-specific or document-specific screen capture control must be enforced. Fasoo Secure Screen blocks efforts to capture what is on the screen and provides specific information through a watermark that shows the screen’s location. Both of these security measures help to secure your screen from unwanted exposure to competitors and other unauthorized people. “Our hospital manages patients’ medical image records through EMR and PACS systems. They make it convenient for our doctors and nurses to treat patients, however the threat for exposure of MRI and x-ray images is a major concern for us because our employees can screen capture those images, or take photos of the screen with digital cameras or smartphones. After applying Fasoo’s secure screen solution to the hospital’s medical management system, restrictions on illegally exposing copies and distributing medical information can be deterred and prevented. With improvements to security of this new system, our employees have become more effective at their jobs.” [General Hospital B, Medical Data Processing Manager]

    Feb 20, 2016 Products / Solutions Feb 20, 2016
  • Fasoo RiskView - Visualize Risk of Your Data to Prevent Insider Threats

    The risk of insider threats exists in any company in any sizes. Security solutions cannot always rule out the insider threats, even though it can help lessen the probability to some extent. This is largely because it is difficult to detect insider threats, since insiders have legitimate access to data with intimate knowledge of security controls and methods to bypass them. Fasoo RiskView helps to prevent insider threats that are real, but difficult to detect Fasoo RiskView is a tool for security administrators that monitor activity related to unstructured data and user activities with confidential data. It gathers information from Fasoo Usage Tracer (the log analysis utility for Fasoo Enterprise DRM) and Fasoo eData Manager. It has APIs that can be configured to import log data from other security technology components, including firewalls, DLP, databases, and even physical security systems (e.g., entry/exit data from keycard or biometric systems) and employee attendance records. Fasoo RiskView includes a decision making framework that security administrators as well as business managers can use to review suspicious activities and after relevant investigations, in order to decide whether or not to take action to address these concerns with potential insider threats. Fasoo RiskView applies sophisticated rule-based modeling to the data sources mentioned above, to establish normal patterns of behavior and flag suspicious activities that indicate enough risk to merit concern and potential intervention by business management. The types of activities that Fasoo RiskView tracks include: Event anomalies, such as logins with user IDs of former employees, a given user logging in from multiple locations simultaneously, or unauthorized users retaining an excessive numbers of files containing sensitive data. File based risks, such as unauthorized users’ attempts to decrypt classified files. User based risks, such as users decrypting files more frequently than usual, printing more files than usual after regular business hours, or sending files to external recipients more than usual. “To put it simply, Fasoo RiskView enabled us, especially security administrators and line of business managers, to discover risks of data theft or loss that are assumed to exist but are unknown.” [CISO of International Business Law Firm]

    Feb 23, 2016 Products / Solutions Feb 23, 2016
  • Sparrow QCE - Accurate and Efficient Quality Control for Software Development

    SPARROW QCE uses a semantic based static program analysis tool to detect quality flaws in your software’s source code SPARROW QCE is necessary for software developers and quality assurance teams who want to reduce the cost of software errors. Detection of bugs in your source code that can produce critical quality defects must be analyzed and corrected before software development is completed. SPARROW QCE detects fatal quality defects during development with fewer false alarms. The process is less costly, more time efficient and a more rigorous analysis that provides you with quality and error free software. SPARROW QCE automatically analyzes your code and offers you a deep and accurate source code analysis at the early stages of program development without creating a separate test environment. SPARROW QCE can be used in various industries including government, financial services and any organization that builds embedded software to eliminate errors during development. SPARROW QCE is recognized by customers as a high quality tool for creating error free software. Who needs SPARROW

    Feb 03, 2016 Products / Solutions Feb 03, 2016
  • DigitalPage - Classify and Manage Different Notes on Your Smartphone

    With DigitalPage, on your smartphone, you are able to leave notes, schedules, or business ideas on page, anytime, anywhere. There is no need for Internet connection to access your pages. In order to organize yourself, you will be able to add names, phone numbers, photos, voice recordings or location as an “in-line tag”, and these tags are connected with apps with which you can do or what you want. It is also beneficial to link your pages that you would like to see together. DigitalPage then will recommend pages that you had linked together. You are free to add or remove these links among pages at any time. Enjoy a smart life with your intelligent lifelog by using DigitalPage. Find more information on DigitalPage

    Feb 18, 2015 Products / Solutions Feb 18, 2015
  • Folder Cryptor - Safely Protect Files that You've Saved to the Cloud

    Are you personally using Dropbox and want to secure files that are uploaded into the cloud? Do you wish you could have your files automatically encrypted as they are uploaded into Dropbox folders? Is it important for you to have complete and secure management of your Dropbox folders? If yes, then with Folder Cryptor for Dropbox, a B2C service will safely secure personal contents in Dropbox. With the growing number of personal devices such as PC, smartphones, tablet PCs, the use of public cloud storage services such as Dropbox, Google Drive, Box and more to store and share personal information has dramatically increased. The widespread of users and many more utilizing other cloud storage services have made it a target for hackers to steal data that is stored and shared in the cloud. In addition, files shared to others can be leaked or be delivered to a third party by mistake or on purpose. The result can lead these sensitive files containing personal photographs, passwords and other confidential information to be exposed. Folder Cryptor automatically encrypts files before they are uploaded into secure folders With the launch of Folder Cryptor for Dropbox, Fasoo offers a robust security service in order for Dropbox users to safely store and share personal information within the cloud. Files uploaded into these secure folders through Folder Cryptor are automatically encrypted and are considered safe even when they are hacked and stolen. Also, because these files are encrypted throughout its entire lifecycle, users can safely and easily share these files with family, friends and coworkers. Folder Cryptor only requires your existing Dropbox authentication and Dropbox users can simply install Folder Cryptor on their PC (Windows/Mac) or mobile device (iOS/Android). Since users will be automatically connecting with their Dropbox account, their files will be secure with Folder Cryptor without management of user credentials. Folder Cryptor offers a free trial version where users can create up to three secure folders. For unlimited secure folders, including all features from the trial version, users can purchase Folder Cryptor Pro for only $2.99 (one-time payment). This service can be downloaded from as well as on your mobile device from Apple App Store or Google Play. Don’t worry and let Folder Cryptor take charge of the security. For more information on Folder Cryptor for Dropbox

    Feb 03, 2016 Products / Solutions Feb 03, 2016
  • Fasoo Secure Node (FSN) - Secure Files Created and Used on Endpoints

    Are you concerned about your files getting into the wrong hands? With conventional data security approaches, organizations may ensure documents are protected against external attacks but cannot when it comes to protecting them against insider threats. To protect documents against any malicious or careless users, documents must be protected and traced throughout the entire lifecycle, and the centralized security policy must travel with the docuemnts wherever they go, whether they are at rest, in use or in motion. Fasoo Secure Node (FSN) lets you secure sensitive files saved on your PC Even if files are lost or get into the wrong hands, unauthorized access is prevented and sensitive information is not exposed. Since files are automatically secured as they are saved, you can be assured that no one can access files leaked through any unauthorized disclosure to people inside or outside your organization. "Our internal Design team frequently creates CAD drawings and sends them to a third party for production. We take a laptop with the drawings to the production company and deliver them in person because we are afraid someone may leak these sensitive files to competitors. This helps prevent information from leaking, but there is still the issue of laptops being lost or stolen, and how to prevent someone else from accessing them. Now with Fasoo’s solution we are not concerned that sensitive CAD drawings will be lost or stolen and get into the wrong hands. Since the files are secured when saving them, we are confident about the security of our work, even if these files are exposed deliberately or by mistake to competitors.” -Heavy Industrial Machinery Corporation Design Leader-

    Feb 23, 2016 Products / Solutions Feb 23, 2016
  • Secure Your Data on Mobile Platforms, Not Your Device

    More and more employees are using personal devices for work, regardless of their organization's official BYOD policy. This is especially dangerous for businesses and their confidential data when considering that in 2013: 67% have admitted to using personal devices at work, regardless of the office's official BYOD policy $7 million worth of phones had been lost everyday around the world 50% of smartphone and tablet users have said that they don't password protect their devices. It's undeniable that more employees are going to use their mobile devices for work regardless of the policy, so the question is not whether you should allow BYOD, but how you can make sure that the data remains safe from exposure with BYOD. When allowing BYOD in your company, there are a number of security related questions that must be asked. Is the data on your mobile device safe the way it is? Is the connection between the server and mobile device secure? Is the access from your mobile device to server controlled? Is your mobile screen protected? Are you securely sharing files with others? Fasoo Mobile Solution secures the data itself and controls access to your server for complete BYOD security Some of the conventional mobile solutions such as MDM (Mobile Device Management), which manages, monitors and secures the mobile device, and MAM (Mobile Application Management), which manages all the applications and application data, are not enough to confidently answer yes to all the questions. MDM and MAM do address security by managing and controlling the device or the specific files at rest. However, once the device is unlocked and the data is in use, there may be no way to prevent the data from being leaked to the wrong hands. The only way to confidently answer 'yes' to all these security related questions is Mobile Data and Access Management (MDAM), the only complete BYOD security system. Since data keeps moving outside the device or application, the key is securing the data itself and controlling access to your server. Fasoo Mobile Solution extends secure file access to allow people to communicate and collaborate through smartphones and tablets. It provides businesses with the ability to persistently secure, control and trace sensitive files on mobile devices. It is the only solution to provide MDAM, which delivers protection for stored mobile and network data, server access control, mobile screen protection and secure sharing of files. In 2011, Fasoo was awarded with the '2011 Global Digital Rights Management Competitive Strategy Innovation of the Year' from global research and consulting company, Frost and Sullivan In 2010, Fasoo was referenced as one of the "Global Top 6 DRM Companies" in an Aberdeen Group Report In 2010, Fasoo was the only Asian company to be referred as one of the "Global Enterprise DRM Top 7 Vendors' from, world renowned global research & consulting company, Gartner

    Feb 04, 2016 Products / Solutions Feb 04, 2016
  • Fasoo eBook DRM - Protect Copyright of Your eBook and Securely Distribute

    Starting from simply digitalizing contents on paper, eBook is steadily becoming the core element in the digital content industry; eBook has successfully extended its applications to novels, cartoons, catalogues, children contents, digital textbook, and many others by adding audio, video and interactive features and maximizing the user experience. However, because eBook is mainly distributed through the online network, there is a high chance of copyright infringement to occur through illegal replication, and this issue must be solved primarily to ensure the prosperity of the eBook market. Fasoo eBook DRM is the core solution in the eBook business that protects the copyright of eBook contents and ensures the prosperity of the eBook market As a DRM (Digital Rights Management) solution that follows eBook standards by the IDPF and consists of encryption and rights management bases, Fasoo eBook DRM is the core solution in the eBook business that protects the copyright of eBook contents and allows various business types, such as content sales and rentals. Some of the key benefits of Fasoo eBook DRM are as the only DRM (Digital Rights Management) solution that follows standards and security conditions of IDPF EPUB 2/3, the international standard eBook format, Fasoo eBook DRM protects the copyright of not only text-based eBook but also interactive eBook containing various multi-media. For the enhancement of security, we raised the reliability through adopting the cryptographic algorithm and key standards that satisfy the security recommendation (SP800-131) of the National Institute of Standards and Technology (NIST). Various platform types are supported, such as Windows based PC, iOS/Android based smartphones, and eBook readers. Fasoo eBook DRM is useful in extending business models through cross selling, B2C and B2B because it can simultaneously support various policy types, such as sales and rentals, and allows cross-compatibility among eBook services. In addition, cross selling among eBook service providers is supported. EPUB DRM technique of Fasoo has been selected as the standard eBook technique of South Korea, and Fasoo also participates in EPUB DRM international standardization of IDPF. Fasoo eBook DRM was adopted into eBook service of Kyobo Book Centre, the number one eBook provider, and Naver, the number one Korean search portal. "As the No.1 eBook service provider in Korea, we tried to adopt the safest and most robust technology for our complex business model and to support various devices from PC to mobile devices. Already being the top offline bookstore in Korea, by implementing Fasoo eBook DRM we were able to also lead the online eBook industry in providing secure online digital contents to our customers."

    Feb 04, 2015 Products / Solutions Feb 04, 2015
  • Fasoo Mobile Gateway - Extend File Based Security from Your PC to Your Mobile Device

    As enterprise mobility boosts the work efficiency by enabling "anywhere access" to business data, many organizations are allowing employees to access internal data on their corporate mobile devices. In a survey of nearly 2,100 IT employees in 2013, 93 percent use personal mobile devices for work. Mobile devices are becoming the tool of choice for many businesses as they offer a simpler user experience and easy access to information. Many organizations today are establishing BYOD programs that embrace employee-owned devices. Setting policies that separate business information from personal information is key to the security of sensitive files viewed on mobile devices. Not only are the risk of data leaks increasing since sensitive business information exists on lost mobile devices, but also because legitimate, unsupported apps, may unintentionally cause security risks for the company. Fasoo Mobile Gateway prevents data breaches while working on your mobile devices Fasoo Mobile Gateway extends secure file access to allow people to communicate and collaborate through smartphones and tablets. It provides businesses with the ability to persistently secure, control, and trace sensitive files on mobile devices. The information remains secure even if the device is lost or stolen. In conjunction with the Fasoo View and Fasoo View Plus apps, your information is securely extended from Fasoo DRM solutions on your PC to your mobile device. "Our company uses Fasoo’s PC and information system security solutions to prevent exposure of files with sensitive information to competitors. At the end of last year we were concerned with how to use these files safely and conveniently on mobile devices. After adding Fasoo’s mobile server to our existing DRM server, we could use those files securely and efficiently on our smartphones and tablets.” [Financial Securities Company C, Security Management Team Leader]

    Feb 04, 2016 Products / Solutions Feb 04, 2016
  • Fasoo Usage Trace (FUT) - Upgrade Your Data Security Policy through Intelligent Log Analysis

    Setting up a perfect data security policy is almost impossible. This is why exceptional policies are so often adopted to balance productivity against security in any sort of policy enforcement settings. There is only one way to address this issue which is by having a flexible security policy management framework, where security policies can be continuously assessed and optimized through feedback from a comprehensive data usage log analysis. Fasoo Usage Tracer centrally monitors usage logs for all Fasoo-protected documents Fasoo Usage Tracer provides a centralized location for organizations to monitor, assess and optimize data security policies enforced by Fasoo Enterprise DRM, a suite of persistent data protection and control solutions, through usage log analysis. Organizations that have multiple Fasoo data-centric solutions in place can collect and analyze all data usage logs from those solutions in a centralized location on a real time basis. Usage logs include user information, access rights, IP address, security classification, file name, time and date. Not only will this be the one stop location to manage all data/user activity logs but will also offer a more convenient management experience. Pattern-based usage monitoring allows security administrators to enforce a set of rules to detect and monitor unusual file usage behaviors of targeted users and groups. Administrators can opt to get notifications whenever any violations of the rules are detected. This solution provides the ratios of provisional license issuing logs to the total licenses issuing logs and compares them between groups and against industry benchmarks. For example, the ratio of individual user groups helps determine which groups need more privileges or abuse provisional or exceptional licenses. The log analysis helps security administrators assess the efficiency and effectiveness of existing security policies. The solution offers organizations with a decision making tool to proactively optimize data-security policies against data security challenges. "Now we can monitor all file usage activities that we have under Fasoo’s solutions, and get commendations to set certain permissions for certain users. This all helps us to continue to keep our data secure.” [Financial Services Firm Chief Security Officer]

    Feb 10, 2016 Products / Solutions Feb 10, 2016
  • Fasoo Reveals Its New Logo at Solution Day 2013

    Fasoo revealed its new logo on Thursday, August 29, 2013 at its annual main event, Solution Day 2013, in Seoul, Korea. With over 400 in attendance including media and partners, Fasoo also revealed some of its new upcoming solutions. This is the 7th annual Solution Day that Fasoo has hosted, and by far had a record breaking number of attendees who were eager to learn about what Fasoo’s new solutions. With the theme of ‘Innovative Strategy in Protecting Data & Software’ this Solution Day focused on changes and threats to the mobile and cloud environments, cyber terrorism and leaks of personally identifiable information (PII) throughout the presentations by CEO Dr. Kyugon Cho, CMO & COO Dr. Hye Yeon Ahn, CTO Seuk Soo Sung and other Fasoo senior management. Overall, Solution Day 2013 covered many areas by presenting solutions that cover how to deal with cyber terrorism, changes and threats to the mobile and cloud environments, as well as how to prevent leaks of PII. Solution Day was not all business. There were also giveaways and raffle prizes given at the end of the event. Although the weather was gloomy and rainy before the event started, the sun came out and Solution Day proved to be a successful event for all.

    Sep 25, 2013 PR / Webtoon Sep 25, 2013
  • DigitalQuick - An Efficient Collaboration Service

    Do you have difficulty maintaining the version history of documents that you working with others? If so, you need to use DigitalQuick which is an efficient collaborative service that enables co-editing and version management through sharing documents. All version of the document created through DigitalQuick are stored in the cloud and supported by the version control system. All edits applied to the document are managed by the version control system, therefore you can always work with the latest version of the document. With DigitalQuick keep your documents up-to-date and mange updated history. When using DigitalQuick, you can pinpoint the people you want to share the documents with, so you can safely collaborate with them without worrying about security. As you collaborate on the documents with other people at the same time, you will be able to track all the changes that are made. In such a case, you can check the comments of the document which is generated after the document is modified. Do you need to continuously update and deliver (or distribute) a document you have created? That is not the case with DigitalQuick. DigitalQuick documents always come with a link that allows those that are allowed to access it download the latest version of the document. Hence, even if your colleagues or friends are not DigitalQuick users, they can follow the provided link to download the latest version of the document. Are you worried that your important documents are being leaked? A document created through DigitalQuick is automatically encrypted and can be accessed only by authorized users in the group. Therefore, just by creating a DigitalQuick document, you can prevent it from being leaked. Find more information on DigitalQuick

    Feb 18, 2015 Products / Solutions Feb 18, 2015