English Korean Japanese Partner Portal Contact Us Location

Most Recent

  • Fasoo, Discovering, Classifying, Protecting and Tracing Your Data

    Watch and learn how the Fasoo data-centric suite can help your organization discover, classify, protect and trace your data.

    02/23/2017 Resources 02/23/2017
  • Fasoo Solution Overview

    Lead Digital Fasoo provides strategic intelligence for digital business in the areas of data security, application security, digital document management and productivity. Data Security Fasoo Data Security Framework > FSD for ECM > eBook DRM > Cloud Service > Application Security Static Code Analysis > SPARROW on Cloud > Digital Document Platform Intelligent Digital Document Platform > Productivity Ultimate Memo Service > Collaborative Service > top Data Security In this time in the digital era, data breaches are unstoppable because business data is freely distributed without any concern for internal/external corporate boundaries, through insider information disclosure and by APT attacks. Fasoo provides data-centric security to protect data as it travels both within the organizational perimeter and beyond by limiting access to sensitive data according to policies that cover both users and activities. Fasoo Data Security Framework Fasoo Data Security Framework helps organizations discover, classify and protect sensitive data so that you control who can access it, regardless of location. It discovers and classifies sensitive files automatically and encrypts them as you create them on the desktop, localize them from databases or download them from information systems. Dynamic security policies travel with the files and apply permission controls that grant or deny users the right to View, Edit, Copy, Paste, Print or Decrypt the files. If any unauthorized user got access to the file, they could not read the information inside. Policy Enforcement - Document Security Fasoo Enterprise DRM (Digital Rights Management) is an award winning persistent data security solution for protecting, controlling and tracing data throughout the enterprise – including data at rest, data in use, and data in motion – according to predefined policies based on user, group or role, or dynamically binding existing access control lists of information systems to enable file-level permissions at all times. Fasoo Enterprise DRM has been deployed to over 1,200 organization enterprise-wide, securing more than 2.5 million users. When sharing and collaborating internally, FSN allows you to secure, control and track sensitive documents created and used on endpoints. When sharing and collaborating, FSD allows you to secure, control and track sensitive ECM, ERP, groupware and other related documents beyond its controlled boundaries. When collaborating with partners and customers, FSE allows you to secure, control and track sensitive documents shared with external users. - Mobile Security When using personal devices for work, Fasoo Mobile Solution secures your data itself and controls access to your server for complete BYOD security. - Print Security When printing your files, Fasoo ePrint allows you reinforce print security and detect personal information in a document and through pull printing, block printing based on a predefined policy. - Screen Security When displaying your files on your screen, FSS prevents and deters security breaches through your screen. - Policy Optimization When monitoring and analyzing your data, Fasoo Usage Tracer allows you to monitor and analyze user/file activities, and optimize existing security policies. Data Discovery - Discovery and Classification of Unstructured Data Fasoo eData Manager is a data governance solution for discovering and classifying the constantly changing set of unstructured data based on its association with people and other characteristics, showing the data’s security vulnerability and dynamically applying security policies on a continuous basis. Risk Management - Analysis and Visualization of Risk Fasoo RiskView is a risk assessment solution for monitoring and analyzing users and their activities in using both protected and unprotected files, determining normal levels of activity, and using sophisticated data analysis techniques to discover deviations that may indicate security risks. FSD for ECM - Fasoo Secure Document for IBM ECM When extending security perimeter of your ECM, FSD for IBM ECM allows you to secure, control and track documents beyond controlled boundaries of IBM ECM. - Fasoo Secure Document for SharePoint When extending security perimeter of your ECM, FSD for SharePoint allows you to secure, control and track documents beyond controlled boundaries of SharePoint. eBook DRM When distributing eBook content, Fasoo eBook DRM protects the copyright of eBook contents and securely allows you to distribute them to your customers. Cloud Service Folder Cryptor offers a robust cloud security service that automatically encrypts files before they are uploaded into secure folders. top Application Security Application today build up the life of business, however, more than ever they are under constant attack. This is a new frontier for hackers. Rather than attacking perimeter security defenses, like firewalls and end point encryption applications, the hackers are getting developers to embed security vulnerabilities in their code. Fasoo provides a semantic-based static code analysis tool that can be deployed from the early stages of the SDLC (Software Development Life Cycle) to help identify and remediate software vulnerabilities. - Static Code Analysis SPARROW is a static code analysis tool that detects critical software vulnerabilities at the early stages of software development. SPARROW analyzes source code with a robust static analysis engine that uses a deep semantic method to find vulnerabilities, and provide analysis results that differentiates us from other tools. - Static Application Security Testing(SAST) SPARROW SAST (Static Application Security Testing) tool provides developers and security managers with the ability to accurately identify security vulnerabilities, remediate these flaws through code suggestions. - Static Code Analysis SPARROW QCE enables developers, quality testers and managers to analyze all possible paths of a program and identify quality defects in the very early stages of software development. SPARROW QCE provides accurate and efficient quality control for software development. - Cloud Service SPARROW on the Cloud cost effective application security testing cloud service that provides users with a source code analysis tool that detects potential security vulnerabilities in your software. top Digital Document Platform Every company faces constant challenges with managing the information that its employees generate. The ubiquity of devices and increasing availability of low cost storage encourage people to generate unprecedented numbers of copies of the files they create – many of which they don’t even realize they are creating. Fasoo has introduced Wrapsody, a new approach to content management. - Intelligent Digital Document Platform Wrapsody improves productivity with document sharing and collaboration through a digital document ID technology, which enables the same document to be automatically updated and synced. The Wrapsody platform can expand it’s flexibility through it’s core functions such as having full version control of their files (Spot Version Control) and always having the latest version of the file (On-Demand Sync) to cover document storage, management and distribution systems in addition to PC and mobile devices. The Wrapsody platform motivates document usage by users and document related work management for managers intelligently, through usage logs and analysis of the document content. top Productivity Fasoo provides cloud and mobile services that lets you secure, store data and manage different notes. - Ultimate Memo Service DigitalPage is an application that allows you to classify and manage different notes, schedules or business ideas by writing, tagging and linking pages on your mobile device. - Collaborative Service DigitalQuick is a cloud storage service for efficient collaboration that allows you to keep your documents up-to-date and manage updated history. .overviewWrap .tit1 {padding-left:35px; margin-bottom:10px; background:url('') 0 50% no-repeat; font-size:24px; font-weight:bold; letter-spacing:-2px; color:#444;} .overviewWrap .tit1.bul2 {background:url('') 0 50% no-repeat; } .overviewWrap .tit1.bul3 {background:url('') 0 50% no-repeat; } .overviewWrap .tit1.bul4 {background:url('') 0 50% no-repeat; } .overviewWrap .tit1.bul5 {background:url('') 0 50% no-repeat; } .overviewWrap .tit1 span {padding-left:4px; font-size:17px; font-weight:100; vertical-align:baseline; letter-spacing:0;} .overviewWrap .tit2 {position:relative; margin:0 0 8px; font-size:34px; font-weight:bold; letter-spacing:-0.05em; color:#000;} .overviewWrap {margin-top:20px; font-size:40px; color:#0782C1 !important;} .overviewWrap .tit2 a {text-decoration:none !important; } .overviewWrap .tit3 {margin:0 0 20px; padding-left:22px; background:url('') 0 50% no-repeat; font-size:23px; font-weight:bold; color:#000;} .overBlock {position:relative; padding-top:60px; border-top:1px solid #bfbfbf;} .overBlock {position:absolute; top:-1px; right:0; width:40px; height:40px; background:url('') no-repeat; text-indent:-999em;} /* .overBlock .focusIdx {position:absolute; top:-108px;} .overBlock .focusIdxSub {position:absolute; top:-128px; width:0; height:0; overflow:hidden; color:transparent;} */ .overviewTab {width:100%; margin:20px 0 0 0; padding:0; overflow:hidden;} .overviewTab li {list-style:none; float:left; margin-left:20px; margin-right:40px; margin-bottom:15px; text-align:center;} .overviewTab li a {height:36px; font-size:12px; font-weight:bold; color:#000 !important; text-decoration:none !important; line-height:33px; box-sizing:border-box;} .overviewTab li a:hover, .overviewTab li a:active, .overviewTab li a.current {border-bottom:3px solid #1f83b8; color:#0782C1 !important;} .overviewWrap .subCon {width:790px; max-weight:100%; margin-left:63px;} .overviewWrap .subCon > dl {margin:0 0 60px; padding-left:25px;} .overviewWrap .subCon dl dt a {vertical-align:-10px; margin-right:5px;} .overviewWrap .subCon dl dt a .blue {color:#0782C1 !important;} .overviewWrap .subCon dl dt a .green {color:#71b253 !important;} .overviewWrap .subCon dl dd {margin:0 0 20px;} .overviewWrap .subCon dl dl:first-child{margin-top:16px;} .overviewWrap .subCon dl dl {margin-bottom:2px; padding-left:70px; overflow:hidden;} .overviewWrap .subCon dl dl dt {float:left; width:78px; line-height:40px;} .overviewWrap .subCon dl dl dd {float:left; width:calc(100% - 78px); line-height:20px;} .overviewWrap .subCon dl dl dd:last-child {margin:0;} .overviewWrap .subCon .small {font-size: 0.6em; letter-spacing: -0.03em;} .overviewWrap .overDl {padding:0;margin:40px 0 70px;} .overviewWrap .overDl dt {position:relative; padding:0;margin:0 0 4px 0 ;} .overviewWrap .overDl dt a {vertical-align:middle;} .overviewWrap .overDl dt span {display:inline-block; padding-bottom:15px; margin-left:10px; vertical-align:bottom;} .overviewWrap .overDl dd {padding:0;margin:0 0 26px 0;} .overviewWrap .overDl2 {padding:0 0 0 80px;margin:32px 0 65px;} .overview_menu {position:relative; width:736px; height:478px; margin:40px auto 70px; background:url('') 0 25px no-repeat;} .overview_menu ul {list-style:none; padding:0; margin:0;} .overview_menu ul > li > a {position:absolute; font-size:17px; color:#555 !important; text-decoration:none !important; line-height:1.3em;} .overview_menu ul > li > a strong {font-size:25px; letter-spacing:-0.03em; line-height:1.2em;} .overview_menu > ul > li > a:after {display:inline-block; content:''; width:16px; height:20px; margin:0 0 3px 8px; background:url('images/bul_menu_1.png') no-repeat; vertical-align:bottom;} .overview_menu ul > li > ul {position:absolute; min-width:190px;} .overview_menu ul > li > ul a {position:static; display:block !important; font-size:12px; color:#444 !important; text-decoration:none !important; line-height:18px; text-align:left;} .overview_menu .menu1 > a {top:-3px; left:135px;} .overview_menu .menu1 > a strong {color:#1f83b8 !important;} .overview_menu .menu1 > a:after {background:url('images/bul_menu_1.png') no-repeat;} .overview_menu .menu2 > a {top:-3px; left:535px;} .overview_menu .menu2 > a strong {color:#003778 !important;} .overview_menu .menu2 > a:after {background:url('images/bul_menu_2.png') no-repeat;} .overview_menu .menu3 > a {top:342px; left:130px;} .overview_menu .menu3 > a strong {color:#99e01e !important;} .overview_menu .menu3 > a:after {background:url('images/bul_menu_3.png') no-repeat;} .overview_menu .menu5 > a {top:372px; left:540px;} .overview_menu .menu5 > a strong {color:#37255c !important;} .overview_menu .menu5 > a:after {background:url('images/bul_menu_5.png') no-repeat;} .overview_menu .sub1 {bottom:312px; left:0px;} .overview_menu .sub2 {bottom:312px; left:615px;} .overview_menu .sub3 {bottom:7px; left:60px;} .overview_menu .sub5 {bottom:7px; left:573px;} .overviewImg {margin-bottom:30px;} @media all and (max-width:850px){ .overview_menu {width:320px; height:210px; background:url('') 50% 15px no-repeat; background-size:320px 200px;} .overview_menu ul > li > a {width:80px; font-size:9px; color:#555 !important; line-height:1.3em;} .overview_menu ul > li > a strong {font-size:12px; letter-spacing:-0.5px; line-height:1.5em;} .overview_menu > ul > li > a:after {width:8px; height:10px; margin:0 0 2px 2px; background-size:8px 10px !important;} .overview_menu ul > li > ul {display:none;} .overview_menu .menu1 > a {top:0px; left:25px;} .overview_menu .menu2 > a {top:0px; left:228px;} .overview_menu .menu3 > a {top:150px; left:15px;} .overview_menu .menu5 > a {top:167px; left:248px;} .overBlock .focusIdx {position:absolute; top:-126px;} .overBlock .focusIdxSub {top:-136px;} .overviewTab {margin:10px 0;} .overviewTab li a {height:21px; line-height:18px;} } @media all and (max-width:780px){ .overviewWrap .subCon {margin-left:0;} } @media all and (max-width:450px){ .overBlock {padding-top:40px;} .overBlock {width:20px; height:20px; background-size:20px 20px;} .overviewWrap .tit1 {padding-left:18px; font-size:18px; background-position:0 6px !important; background-size:14px 14px !important;} .overviewWrap .tit2, .overviewWrap {font-size:20px;} .overviewWrap .tit3 {padding-left:13px; font-size:17px; background-size:6px 6px;} .overviewWrap .subCon dl dt a {vertical-align:-3px;} .main .wrap .column.right .container.article .articleView .articleText .overviewWrap .subCon dl dt a img {height:16px !important;} .overviewWrap .subCon > dl {padding-left:15px;} .overviewWrap .subCon dl dl {padding-left:20px; margin-bottom:30px;} .overviewWrap .subCon dl dl dt {width:50px;} .overviewWrap .subCon dl dl dd {width:calc(100% - 50px);} .overviewWrap .overview_1_1 {width:136px;} .overviewWrap .overview_2_1 {width:112px;} .overviewWrap .overview_2_2, .overviewWrap .overview_2_3 {width:87px;} .overviewWrap .overview_2_4 {width:125px;} .overviewWrap .overview_3_1 {width:149px;} .overviewWrap .overview_4_1 {width:148px;} .overviewWrap .overview_5_1, .overviewWrap .overview_5_2 {width:153px;} .overviewTab li, .overviewTab li:first-child, .overviewTab li:last-child {margin-bottom:8px;} .overviewTab li a {height:20px; line-height:17px;} .overviewWrap .overDl {margin-bottom:40px;} .overviewWrap .overDl dt span {padding-bottom:5px; font-size:12px;} .overviewWrap .overDl2 {padding-left:40px;} .overview_menu {width:290px; height:150px; margin:20px auto 30px; background-position:50% 8px; background-size:210px auto;} .overview_menu ul > li > a {width:100px; font-size:9px; color:#555 !important; line-height:1.3em;} .overview_menu ul > li > a strong {font-size:10px; letter-spacing:-0.5px; line-height:1.5em;} .overview_menu .menu1 > a {top:-8px; left:25px;} .overview_menu .menu2 > a {top:-8px; left:200px;} .overview_menu .menu3 > a {top:95px; left:18px;} .overview_menu .menu5 > a {top:100px; left:205px;} }

    04/20/2016 Products/Solutions 04/20/2016
  • Fasoo Inc. Names John Herring as CEO

    Fasoo Inc., announced that John Herring has been appointed CEO/President and a member of the company's Board of Directors. Mr. Herring will be responsible for leading the U.S. and international expansion of its parent company's data-centric enterprise solutions. We are very pleased Mr. Herring has joined in our vision to make Fasoo a global leader in data-centric enterprise solutions," Dr. Cho commented. "We have 300 employees dedicated to solutions for enterprise security, governance and productivity needs centered on data at rest, in transit and in use, anywhere and anytime. We look forward to expanding our award-winning solutions in the U.S. and international markets." To read more about this article, please click on the link below:

    02/09/2017 PR 02/09/2017
  • Extend and Reinforce Security to Share and Collaborate with IBM ECM Documents

    Organizations use IBM ECM to increase efficiency, improve control of information and reduce overall cost of information management. However, files are considered secure while they remain within a controlled boundary, but they cannot be controlled any more once they are legitimately downloaded to PCs. The downloaded documents can also be forwarded to unauthorized users, and thus can be read, saved and printed without restrictions. To avoid such issues, files should be persistently protected and continuously encrypted, whether in transit or in use throughout their entire lifecycle. Fasoo Secure Document for IBM ECM persistently protects your files downloaded from your ECM To persistently protect the files downloaded from IBM ECM, organizations need to extend the security of the repository to include files downloaded to end point devices. In addition, access to the downloaded files need to be dynamically enforced to reflect any changes on the repository ACL for ensuring continuous and consistent security. The integration of IBM ECM with Fasoo will extend IBM ECM security to content regardless of its location and provide enhanced access control for authorized users both inside and outside of the organization. Fasoo encrypts files downloaded from ECM repositories based on the users’ ECM permissions, or other metadata associated with them. The protected files maintain the security policy of the ECM system wherever they travel, and limit access privileges depending on users’ ECM permissions including View, Edit, Print and Screen Capture. All file activities are logged so an administrator has a full audit trail of the user, time and data of access and even the device they accessed the file on. FSD for IBM ECM is seamless and will provide the security you need when files containing sensitive information are downloaded from IBM ECM systems. "With increase in government regulations requiring that all customer documents and anything related to monetary transactions is controlled and audited, we needed to make sure that our files from our IBM ECM system were protected at all times. With these files containing very sensitive information such as personally identifiable information, it was paramount for us that we do everything in our power to prevent exposing this information. By integrating Fasoo Secure Document for IBM ECM, we didn’t have to worry about data breaches while sharing these files or not meeting government regulations.” -Bank IT Security Manager-

    02/03/2016 Products/Solutions 02/03/2016
  • Extend and Reinforce Security to Share and Collaborate with Microsoft SharePoint Documents

    An overview of Fasoo Secure Document for SharePoint. Many organizations use Microsoft SharePoint to increase efficiency, improve control of information and reduce overall cost of information management. However, files are considered secure while they remain within SharePoint libraries, but these files can be legitimately downloaded to desktops, laptops and even mobile devices by authorized users, where they can be easily copied and forwarded somewhere else because it no longer retains any security controls. The documents can also now be read, saved and printed by any user without restrictions, thus the risk of data loss increases dramatically. To avoid such issues, files should be persistently protected and continuously encrypted, whether in transit or in use throughout their entire lifecycle. Fasoo Secure Document (FSD) for Microsoft SharePoint persistently protects your files downloaded from your ECM To persistently protect the files downloaded from SharePoint, organizations need to extend the SharePoint permission levels to include the documents downloaded. In addition, access to the downloaded documents need to be dynamically enforced to reflect any changes in SharePoint permission levels for ensuring continuous and consistent security. ECM allows organizations to share information and collaborate easily with colleagues, business partners and customers. ECM alone cannot provide persistent protection throughout the document lifecycle, since there is no way to track user and file activities of documents after they are downloaded. Fasoo Secure Document or FSD ensures files remain secure no matter where they go after users download them from the ECM system. FSD for Microsoft SharePoint gives enterprise complete control of how their content is being used once it leaves their direct control. The integration of Microsoft SharePoint with Fasoo will extend Microsoft SharePoint security to content regardless of its location and provide enhanced access control for authorized user both inside and outside of the organization. Fasoo encrypts files downloaded from ECM repositories based on the users’ ECM permission levels, or other metadata associated with them. The protected files maintain the security policy of the ECM system wherever they travel, and limit access privileges depending on users’ ECM permission levels including View, Edit, Print and Screen Capture. All file activities are logged so an administrator has a full audit trail of the user, time and data of access and even the device they accessed the file. FSD for Microsoft SharePoint is seamless and will provide the security you need when files containing sensitive information are downloaded from Microsoft SharePoint systems.

    02/18/2015 Products/Solutions 02/18/2015
  • The Security Blueprint for Your Data

    An overview on Fasoo's Data Security Framework. The Fasoo data security framework consists of a three-tiered suite of solutions to strengthen information security. The Fasoo Enterprise DRM (FED) suite plays a pivotal role to enforce security policy on data among three layers of data protection. At the front-end, Fasoo eData Manager discovers and classifies the data, reapply policy to the data unprotected due to policy exceptions and exclusions. At the back-end, Fasoo RiskView enables organizations to manage risks holistically by collecting and analyzing logs of data usage and various sources that can be useful. This multi-layered approach enhances and completes an organization's security framework.

    02/25/2016 Products/Solutions 02/25/2016
  • Intelligent Digital Document Platform

    An overview on Wrapsody. Every company faces constant challenges with managing the information that its employees generate. The ubiquity of devices and increasing availability of low cost storage encourage people to generate unprecedented numbers of copies of the files they create - many of which they don't even realize they are creating. To manage all this information, several tools exist: email, content management systems, file servers, cloud storage, enterprise messaging, social networks and many others. All of these can be valuable but they have limitations. Multiple versions of files proliferate throughout an organization, often without means of tracking them. Email messages are sent with file attachments that are not tracked and sometimes not properly saved on employees' devices. Multiple people will revise documents in parallel, leading to conflicts and lost changes. This makes it difficult to monitor how documents and document templates are used over time. Wrapsody improves productivity with document sharing and collaboration through a digital document ID technology Fasoo has introduced Wrapsody to address these issues. Wrapsody is based on a file-centric approach: it links files with metadata to enable automated content synchronization and version control management beyond repositories that employees may use inconsistently. As a platform, Wrapsody can expand its core functions flexibly into existing server systems such as ECM, Groupware, and ERP, in addition to PCs and mobile devices. The Wrapsody platform encourages document usage by users and allows managers to intelligently administer document related work through usage logs and analysis of the document content. 브로슈어제품 소개서구축 사례--> "We had trouble locating documents and had to search for the latest versions on different PCs, in email, cloud storage or on flash drives. After using Wrapsody, we could work on the latest customer response documents easily regardless of file location. We got instant feedback from colleagues helping us develop an ideal response.” -Principal Consultant-

    05/04/2016 Products/Solutions 05/04/2016
  • Protect Scanned Data with Fasoo Enterprise DRM

    How many of you face challenges to protect customer personally identifiable information (PII) from exposure to unauthorized internal and external personnel? Fasoo Enterprise DRM (Digital Rights Management) protects PII (personally identifiable information) gathered from multi-function devices and limits file access to authorized users.

    08/09/2016 Resources 08/09/2016
  • Fasoo, A New Approach to Document Management

    Watch how intelligent document platform, Fasoo Wrapsody can help your organization share documents efficiently, save resources eliminating redundancies and provide security without compromising usability.

    11/28/2016 Resources 11/28/2016
  • Build Security into the Software with Sparrow SCE

    An overview of SPARROW SAST. SPARROW SAST detects security weaknesses in source code with its semantic based static program analysis engine History has proven that defects, bugs and flaws in software have consistently been the leading cause of security vulnerabilities. If developers can pinpoint this insecure code and correct it before deployment, the chances of these security vulnerabilities causing problems can be reduced or eliminated. SPARROW SAST (Static Application Security Testing) tool not only detects security vulnerabilities through the best static analysis engine based on semantic and syntactic methods, it also follows a strict set of compliance requirements and follows CWE, OWASP, CERT and other international standards. SPARROW SAST applies the best technology to the most optimal diagnostic tool Uses the latest semantic based static analysis tool Provides both semantic and syntactic engines to increase detection for security vulnerabilities and decrease or eliminate the number of defects, bugs and flaws in software Meets compliance requirements and detects fatal errors identified by international standards for coding SPARROW SAST can help you defend against threats of cyber terrorism Cyber-attacks typically target network weaknesses causing organizations to protect themselves with firewalls, intrusion prevention systems, and similar tools. Current cyber-attacks target weaknesses in the software organizations develop and use. It is difficult to stop malware related attacks after software has been developed. SPARROW SAST lets you virtually eliminate these attacks before the software is developed by detecting all security vulnerabilities in the source code. Meeting secure coding compliance requirements Most organizations and regulations now demand that developers follow secure coding compliance requirements for software development. This is in reaction to major incidents of cyber terrorism all over the world. SPARROW SCE can detect security vulnerabilities in your software and meet the compliance regulations and requirements before releasing the software. SPARROW SAST also detects some of the top weaknesses identified by international standard organizations such as the CWC/SANS Top 25, OWASP Top 10, and CERT. Fasoo helps developers reduce or eliminate these coding errors before they are deployed. CWE/SANS Top 25 Most Dangerous Software Errors GO CERT Secure Coding GO OWASP Top 10 GO Reduce the amount of detection time and lower the cost of security vulnerabilities According to NIST, if organizations detect and remove security weaknesses before completing development, they can reduce a maximum of 30 times of the expense compared to finding and removing security weaknesses after development. The use of a semantic-based static analysis tool, such as SPARROW SAST, is the only way to detect all of these security weaknesses within the source code before it is released. Establishes a practice of making security a priority in software development When SPARROW SAST is applied to secure coding, you create a safe and efficient software development environment. Checking source code for security vulnerabilities at an early stage of development improves all areas of security for an organization, since it will use defect and error free software. [Source:]

    02/23/2015 Products/Solutions 02/23/2015
  • Fasoo, Inc. Management

    Kyugon Cho Chairman, Board of Directors President, CEO of, Inc. Kyugon Cho is the Chairman of the Board of, Inc. and the Founder, President and CEO of, Inc., the parent company. He has more than 30 years of experience in information technology, software and the cybersecurity industry. has been established by his leadership in 2000 and has become a global leader in data security and application security. He has been leading the Korean cybersecurity industry and served as the chairman of the Korea Information Security Association (KISIA) in 2012 and 2013. Prior to, he worked for Samsung SDS, one of the largest systems integrator companies in Korea, where he initiated several new businesses in Knowledge Management, Public Key Infrastructure, Internet Banking and Systems Management. He also worked for Samsung Electronics before receiving his Ph.D., where he developed network solutions. He holds a Ph.D. in Computer Engineering from Rutgers University and a B.S. and a M.S. in Electrical Engineering from Seoul National University. His research interests have been machine learning and artificial intelligence since his doctoral study and evolved to the areas such as advanced analytics in cybersecurity and self-organizing content management along with his professional experiences. He also actively participates in social activities such as Enactus, an international nonprofit organization dedicated to inspiring students to improve the world through entrepreneurial action, as a board member of Enactus Korea. John Herring President and CEO of Fasoo, Inc. John Herring is President and CEO of Fasoo, Inc. responsible for international expansion of Fasoo’s business. He has successfully introduced innovative information technology solutions to enterprise and government markets over the past 25 years. John led four ventures from early start to market prominence, including public market listings and strategic M&A exits. He guided companies in geospatial imaging, text search and retrieval, wireless location, and information security applications. John recently served as CEO of an In-q-Tel portfolio company, the venture investment arm of the U.S. intelligence community, where he fast tracked new technology information solutions to protect U.S. security. John serves as Founder Emeritus of Corstone Capital, a Washington DC global diversified private equity firm he established in 1993. He served as an officer in the U.S. Navy on the staff of Admiral H.G. Rickover at Headquarters of the Navy’s Nuclear Propulsion Program. John earned an MBA in Finance and Investments from George Washington University, and a Bachelor of Science from The Citadel. William Blake Senior Vice President, CCO of Fasoo, Inc. Bill Blake is the Senior Vice President and CCO (Chief Customer Officer) of Fasoo, Inc. He has over 30 years of experience in business process re-engineering and IT system integration. Following a successful career with IBM, Bill built and managed a systems integration firm focused on document management within the banking, legal and government sectors, which was acquired by IKON Office Solutions in 1997. Bill was also the Vice President of Enterprise Consulting for IKON Office Solutions in Malvern, PA. Prior to working for Fasoo, he formed eDocument Sciences, LLC, which provided consulting services related to management and control of critical businesses information. He holds a B.S. in Business Administration from Canisius College. Ronald Arden Executive Vice President, COO of Fasoo, Inc. Ron Arden is the Executive Vice President and COO of Fasoo, Inc. He has 30 years of strategic planning, marketing, sales, business development, consulting and technical experience in the information technology industry. Ron has held executive, management and technical positions at numerous organizations, including Digital Equipment Corporation and Wang Laboratories. Ron was also the Director of National Solutions Support for IKON Office Solutions. Prior to working for Fasoo, he was the Vice President of Strategy and Marketing at eDocument Sciences, LLC where he focused on improving the way customers manage documents with document security, cloud and collaboration solutions. He holds a B.S. in Electrical Engineering from the University of New Hampshire, Inc. Management Hyeyeon Ahn COO, CMO, Senior Executive Vice President Hyeyeon Ahn is the COO, CMO, Executive Vice President and Head of the Business Strategy Division at Fasoo. She has more than 20 years of experience in the software industry including such companies as Samsung SDS and She also was awarded the 2014 ISLA Manager Professional for an Information Security Project Award, and previously has been recognized by the Women Information Technology & Science Association of Korea as well as Korea's Ministry of Information and Communication as one of the 100 experts on international IT standards She holds a B.S. and M.S. in Mathematics from Ewha Women’s University, and a Ph.D. in Computer Engineering from the University of Massachusetts. Seuk Soo Sung CTO, Senior Executive Vice President Seuk Soo Sung is the CTO, Senior Executive Vice President and Head of the Development Assurance Division at Fasoo. He oversees all aspects of product development, technology, and quality assurance. He has more than 20 years of experience in the software industry including ETRI (Korean Electronics & Telecommunications Institute), QNIX Computers and Microsoft Korea. During his time at Microsoft Korea, he led the efforts to meet the needs of customers by adding new features such as electronic payment, printing labels, research features and more to the Hangul Office 2007 system He holds a B.S. in Electronic Engineer from Kyungpook National University and M.S. in Computer Science from the Korea Advanced Institute of Science and Technology (KAIST). Jeesoo Lee-->Head of Consulting Business Division Hyeyeon Ahn is the Senior Executive Vice President and Head of the Consulting Business Division. She has more than 30 years of experience in the software industry including such companies as Samsung SDS and She also was awarded the Manager Professional for Information Security Project Award by the Asia-Pacific ISLA in 2014, and also was recognized by the Women Information Technology & Science Association of Korea as well as the Ministry of Information and Communication as one of the 100 experts on international IT standards She holds a Ph.D. in Computer Engineering from the University of Massachusetts and a B.S. and a M.S. in Mathematics from Ewha Women’s University. Seuk Soo Sung CTO Seuk Soo Sung is the Senior Executive Vice President, CTO and Head of the Research & Development Division. He oversees all aspects of product development and technology. He has more than 30 years of experience in the software industry including ETRI (Korean Electronics & Telecommunications Institute), QNIX Computers and Microsoft Korea. During his time at Microsoft Korea, he led the efforts to meet the needs of customers by adding new features such as electronic payment, printing labels, research features and more to Microsoft Office 2007. He holds a M.S. in Computer Science from the Korea Advanced Institute of Science and Technology (KAIST) and a B.S. in Electronic Engineering from Kyungpook National University. Jeesoo Lee CFO Jeesoo Lee is the Executive Director, CFO and Head of the Management Support Division. Her previous experiences were working at Samsung SDS in the Strategy Planning Team. Under her tenure at Fasoo, she most notably led the IPO process for Fasoo in Korea in October of 2013. She holds a M.S. from the Korea Advanced Institute of Science and Technology (KAIST) and a B.S. in Mathematical Education from Seoul National University. Jaeha Kim -->Head of Quality Assurance Division Jaeha Kim is the Executive Director and Head of the Quality Assurance Division. His previous experiences most notably are working at the Samsung Advanced Institute of Technology as well as a Senior Researcher at Samsung SDS. He was also the CEO of Partec 21, a B2B eMarketplace company. He has previously held positions as the vice-chairman for The Korean Council for e-Biz Businessmen and the Korea Association of Electronic Commerce. He has also served on the Policy Advisory Committee for the Ministry of Commerce, Industry and Energy and received the e-Biz achievement award in 2003. He holds a M.S. in Computer Engineering from the Korea Advanced Institute of Science and Technology (KAIST) and a B.S. in Electronic Engineering from Hanyang University. Kangman Lee -->Head of Global Sales Division Kangman Lee is the Executive Director responsible for global marketing at Fasoo. He has over 25 years’ experience in the software and high tech industry. He held various executive positions in TmaxSoft, the largest software vendor in Korea, where he was responsible for sales and marketing, strategic planning and overseas business development for the last 15 years. Prior to TmaxSoft, he worked for a Korean government agency titled KOTRA promoting Korea’s high tech products and inducing foreign direct investment in New York and Seoul. He also served as Chief Operating Officer for Intellian Systems. He wrote a book titled “Product Marketing for Software” in 2013 which had been referred to by many software marketers as a guidebook on marketing practices for software products in Korea. He received his Master’s degree in Business Administration with a concentration in marketing from the University of Iowa. Ducksang Yoon -->Head of Strategic Business Ducksang Yoon is the Executive Director and the Head of the Strategic Business. His previous experiences most notably were working at Samsung SDS, Secui and Lotte Data Communication. Prior to joining and Korea Telecom Data Systems (KT DS) as the Managing Director of Information Security Center. He recently was awarded with the Senior Information Security Professional Award by the Asia-Pacific ISLA in 2015 and awarded the Information Security Special Award by the Korea Association of Chief Information Security Officers in 2016. He is in process of receiving his Ph.D. in Information Security from Korea University and holds a B.S. in Natural Sciences and a M.S. in Information Security from Korea University. .wrap .main .column.right .container.article .articleView .articleText { max-width: 800px; } .wrap .main .column.right .container.article .articleView .articleText div h3 strong span { font-size: 20px !important; color: #1F84BA; } .wrap .main .column.right .container.article .articleView .articleText > .text_div { float: left; width: 30%; margin-top: 36px; } .wrap .main .column.right .container.article .articleView .articleText > p.intro { width: 66%; margin: 12px 0 24px 4%; float: left; } @media all and (max-width: 767px) { .wrap .main .column.right .container.article .articleView .articleText > .text_div { width: 96%; margin: 12px 2%; } .wrap .main .column.right .container.article .articleView .articleText > p.intro { width: 96%; margin: 12px 2%; } } .wrap .main .column.right .container.article .articleView .articleText { max-width: 800px; }

    10/26/2016 About Fasoo 10/26/2016
  • Application Security Testing Cloud Service

    An overview of SPARROW on Cloud. SPARROW on Cloud is a static code analysis application that detects critical software vulnerabilities at the early stages of software development. This service is an agile, flexible, reliable and cost effective solutions that allowing organizations to easily manage application security challenges. Unlike other SAST solutions, SPARROW on Cloud analyzes source code with a robust static analysis engine that uses a deep semantic method to find vulnerabilities that other SAST applications may have difficulty identifying. The solution is designed to enforce multiple policies dynamically to different projects or users/groups, and offers faster analysis speed (1M LOC per hour) with accuracy (OWASP benchmark score: 94.8). In addition, SPARROW on Cloud enables organizations to identify and fix issues by leveraging machine learning and automation features like: Intelligent Issue Clustering: SPARROW on Cloud categorizes similar issues in groups that will allow organizations to identify and correct issues efficiently. Active Suggestion: SPARROW on Cloud is not only identifying software vulnerabilities, but also has the ability to remediate code using automated code suggestions. Issue Classification: SPARROW on Cloud analyzes, ranks, and prioritizes high priority issues in an easy to read dashboard display. Advanced Issue Filtering: SPARROW on Cloud provides detailed filter options for the detected issues (e.g., source API, sink API, called method, etc.). To learn more and start using SPARROW on Cloud, click on the button below.

    01/10/2017 Products/Solutions 01/10/2017
  • Fasoo Wrapsody - Brochure

    Read more about how intelligent document platform, Fasoo Wrapsody can help your organization improve security, governance and productivity. Download the brochure to read more about Wrapsody.

    02/24/2017 Resources 02/24/2017
  • Fasoo Sparrow - Brochure

    Read more about how machine learning based SAST solution, Fasoo Sparrow can help your organization build security into the software. Download the brochure to learn more about Fasoo Sparrow.

    02/24/2017 Resources 02/24/2017
  • Fasoo Data Security Framework - Brochure

    Read more about how Fasoo Data Security Framework can help your organization enhance information security with data-centric security model with people-centric policies using data discovery, classification, protection, audit trail and behavioral analytic solutions. Download the brochure to learn more about Fasoo Data Security Framework.

    02/24/2017 Resources 02/24/2017
  • Data-centric Everything Fasoo Solutions - Brochure

    Read more about how data-centric everything Fasoo solutions can help your organization improve security, governance and productivity. Download the brochure to learn about Fasoo data-centric solutions.

    02/24/2017 Resources 02/24/2017
  • Fasoo, Data-centric Everything

    Watch how Fasoo data-centric security, governance and productivity solutions can help your organization to (i) enable intelligent digital document platform, (ii) discover, label and classify data, (iii) protect, control and trace information assets and (iv) analyze behaviors and re-act to potential risks.

    02/24/2017 Resources 02/24/2017
  • Fasoo, Build Security into the Software

    Watch how Static Application Security Testing (SAST) solution, Fasoo Sparrow, can help accurately identify security vulnerabilities and remediate these critical defects through a machine learning based solution.

    02/24/2017 Resources 02/24/2017
  • Fasoo, Reinventing Security and Productivity

    Watch Fasoo data-centric security, governance and productivity solutions that can converge conflicts of interest of different stakeholders, and deliver ideal strategies to high pay-off business processes.

    02/24/2017 Resources 02/24/2017
  • Persistent Data Security Solution for Any Business Environment

    An overview on Fasoo Enterprise DRM. How secure are your files? What would happen to your business if a file with sensitive information were to leave your organization? Can you afford not to have the best protection solutions? Fasoo Enterprise DRM (Digital Rights Management) protects the file itself to provide a more secure work environment. Fasoo Enterprise DRM is a file-based security solution that prevents the exposure of sensitive and confidential files by trusted insiders, business partners, customers and unauthorized people. Here is the problem with traditional content management systems: People can easily access sensitive business information from mobile, cloud or virtual environments. This allows us to communicate and collaborate more conveniently, but increases the risk of losing our trade secrets, classified documents and PII (Personally Identifiable Information) with just one click. Against these threats, file-based security such as information rights management is the best solution to protect you from information leaks. Documents are secure while they remain in a controlled boundary, like a content management system. DLP (Data Loss Prevention), firewalls, intrusion detection and intrusion prevention systems can protect information from outside attacks or potentially stop sensitive information from leaving an organization. These solutions can’t stop everything and increase the complexity of the network infrastructure. Authorized people inside your organization can send out sensitive information by mistake or deliberately. That information is no longer secure once it leaves your organization. Persistent File-based Security for Any Business Environment Fasoo Enterprise DRM protects, controls, and traces sensitive files containing intellectual property, trade secrets, PII, and more. It maintains file protection and prevents unintended information disclosure no matter where it is. In contrast with conventional security solutions, Fasoo Enterprise DRM protects information itself persistently whether it is stored, being used, being transmitted, or even after transmission, throughout the entire document lifecycle. This is the only complete and effective solution that protects you against unwanted information leaks from anyone. Fasoo Enterprise DRM uses an encryption in their solutions that is certified from Korea's National Intelligence Service (NIS), to protect and manage sensitive documents in any environment whether it is saved to a PC, downloaded from a server, printed, or sent by email. Fasoo Enterprise DRM is an essential security infrastructure component for every enterprise application system as mobile and cloud computing diversify and expand the enterprise IT environment. With Fasoo Enterprise DRM, organizations can safely share confidential documents internally and externally, freeing themselves of any concern about unintended information loss. Fasoo Enterprise DRM Key Facts Global leader in enterprise DRM First company in the world to commercialize DRM as a product World’s largest enterprise DRM customer base Fasoo is the only company that has developed and equipped their encryption module “Fasoo Crypto Framework” with a National Intelligence Service certified encryption technology Supports any environment where files are distributed Can be integrated with information systems such as ECM, ERP, PLM and more Extend security to mobile and cloud environments Deployed to more than 1,100 organizations, with over 2 million users around the world In 2014, Fasoo was awarded as a winner in the Security Products and Solutions for Enterprise (Large) category at Info Security Products Guide's Golbal Excellence Awards In 2011, Fasoo was awarded with the ‘2011 Global Digital Rights Management Competitive Strategy Innovation of the Year’ from global research and consulting company, Frost and Sullivan In 2010, Fasoo was referenced as one of the “Global Top 6 DRM Companies” in an Aberdeen Group Report In 2010, Fasoo was the only Asian company to be referred as one of the “Global Enterprise DRM Top 7 Vendors’ from world renowned global research & consulting company, Gartner.

    02/02/2016 Products/Solutions 02/02/2016
  • Download the Latest Ponemon Report on How Company Insiders Put High Value Information at Risk

    Fasoo partnered with the Ponemon Institute to present: "Risky Business: How Company Insiders Put High Value Information at Risk". About 640 IT security practitioners familiar with their organization's approach to protecting data, documents and files against cyberattacks were surveyed and found that: 56% say company insiders are the primary cause of data breaches 72% are not confident they can manage and control employee access to confidential files 70% do not know the location of confidential information 73% believe they lost confidential information in the past 12 months Some other highlights of this report are that Sales, C-level executives, Finance and Human Resources departments pose the greatest risk to high-value data, while 83% struggle with determining the approrpriate level of confidentiality documents and files should possess. .main .wrap .column.right .container.article .articleView .articleText ul.resourceItem { display: none; }

    06/13/2016 Resources 06/13/2016
  • About Fasoo, Digital Intelligence for Security and Productivity

    At Fasoo, our main goal is to provide you with more robust and scalable data and application security, as well as mobile security to liberate people and businesses from various risks and constraints in their digital life and business. Fasoo plans to deliver exceptional value through our software to our customers and gain credit by developing software of true value that is recognized all around the world. As a leader within the Digital Rights Management industry, we continue to challenge ourselves and expand into new business areas to provide you with high quality software. Fasoo has developed competitive products and DRM solutions to succeed in the constantly changing IT environment and promises to meet the challenges to provide you with the software you need to secure your data and tackle security threats and unwanted limitations in this environment. Our Vision Our vision provides us with the framework to guide every aspect of our business. By 2020, Fasoo aims to be a global top 100 software company, produce four global software products along with two global number one products, have Fasoo Enterprise DRM be part of every business application and have our source code analysis tool, SPARROW on every developer’s desktop. These are just some of the visions we aim to accomplish in order to achieve sustainable, quality growth.

    03/01/2016 About Fasoo 03/01/2016
  • Fasoo's Partners

    Fasoo has numerous business partnerships with companies all over the world. Fasoo’s partners include sales partners as well as technology partners. If you are interested in being a partner of Fasoo, please contact Partner Portal As a partner of Fasoo, you can register to gain access to our partner portal. The partner portal provides marketing materials, price lists and other relevant information to help you with achieving sales opportunities with your customers. If you have not already made an account, please select the button below and go to 'Create a Partner Account'. Then fill in the required information and the administrator will then authorize your access to the partner portal. Go To Partner Portal .partnerView { margin: 0 auto; max-width: 800px; } .partnerView ul { list-style: none; padding: 0 !important; } .partnerView ul li { float: left; margin: 0 12px 12px 0; list-style: none!important; } .partnerView h3 { clear: both; } .partnerView .btn2 { display: block; width: 200px; font-size: 12px; font-weight: bold; border: 1px solid #c9c9c9; background: #f9f9f9; text-align: center; height: 30px; line-height: 30px; text-decoration: none !important; margin: 0 auto 52px; } .partnerView .btn2 font { color: #222; }

    01/01/2016 About Fasoo 01/01/2016
  • Secure Your Files Shared with External Users

    An overview on Fasoo Secure Exchange. Business relationships require cooperation through partnerships, outsourcing, and collaboration with many different organizations. Sensitive files are shared outside of the company through email, cloud-based sharing services, FTP, and other portable media. The threat of unwanted information disclosure is real and the potential impact this makes on a company is devastating. The need for security measures for files shared with outside parties has become critical to an organization’s security plan. Fasoo Secure Exchange (FSE) lets you share your sensitive files securely through email, FTP, USB flash drives, the cloud and more When a file is shared externally, FSE ensures a secure exchange of information, which guarantees that files are shared with only the intended recipients. The sender can decide who can access sensitive files and what permissions they have for using them, such as View, Edit or Print. Persistent security remains in place and provides the sender with assurance that these files are secure. Even when files are unintentionally sent to the wrong parties, a sender can revoke future access to them. All actions are logged for future analysis providing peace of mind. “Our company has various business affiliates including construction, raw material, and steel. We have already implemented Fasoo’s solution at our subsidiaries to protect files created within our organization. When we receive orders from construction firms, we need to cooperate with our steel affiliate so it can deliver the necessary materials. We needed to protect our information when sharing between our affiliates because there is a high risk that sensitive information could be exposed to the wrong people. After applying the Fasoo security solution to files sent outside of the company, sharing and cooperation is more prevalent and secure between subsidiaries. Business efficiency has increased along with positive feedback from all affiliates.” -J Group Data Processing Team Leader-

    02/21/2016 Products/Solutions 02/21/2016
  • Manage Security Vulnerabilities Effectively

    An overview on SPARROW. SPARROW is a static code analysis tool that is performed without actually executing programs, detecting critical software vulnerabilities at the early stages of software development. SPARROW analyzes source code with a robust static analysis engine that uses a deep semantic method to find vulnerabilities that other tools can’t. It detects security vulnerabilities such as buffer overruns, SQL injection, cross-site scripting, information leakage, TOCTOU race condition and hardcoded password. It also detects run-time errors such as memory/resource leaks, null dereference, uninitialized variables, division by zero, use after free and integer overflow. People choose SPARROW because it uncovers critical and relevant vulnerabilities during the early stages of the Software Development Life Cycle (SDLC). SPARROW is popular with government agencies, corporations and anyone developing embedded software that requires a very high level of software quality. The Static Application Security Testing (SAST) version of SPARROW is also used by the government and financial industries which aim to eliminate all security weaknesses from their source code. Static Application Security Testing (SAST) tool with... ACTIVE SUGGESTION SPARROW can be deployed on both the development and testing phases in the SDLC. As an SAST tool, SPARROW provides developers and security/quality managers with the ability to accurately identify software vulnerabilities, remediate code using ACTIVE SUGGESTION, enforce project based rules for developers and customize policies according to project requirements. Currently no other solution has a similar feature as ACTIVE SUGGESTION, where you are provided code suggestions to easily fix the vulnerabilities in your software. Intelligent Alarm Clustering SPARROW's Intelligent Alarm Clustering groups related vulnerabilities in the source code with a unique ID. A developer can review results and address vulnerabilities faster and easier throughout the SDLC. Intelligent Alarm Clustering reduces review time because it reduces the number of alarms to review and also reduces fix time since these vulnerabilities are in clustered groups and can be remediated in order instead of going back and forth. Advanced Issue Filtering SPARROW provides Advanced Issue Filtering which analyzes the characteristics of issues and eliminates errors with have to analyze them over and over again, each time. Static analysis tool based on a deep semantic method with the best technology It is the semantic approach that allows SPARROW to follow all possible execution scenarios, to be more exhaustive than other tools, rather than focusing on discovering particular patterns. In addition to the semantic tools, SPARROW also utilizes syntactic tools to quickly find shallow bugs based on fixed patterns. SPARROW balances the depth of its bug detection coverage with a reasonable analysis cost. Development process linked to the highest academic research SPARROW is similar to other analysis tools which derived their research and product toolsets from prestigious universities like Stanford University and the University of Wisconsin. These tools have gained great respect and success in the marketplace for their technological research. SPARROW’s semantic based static analysis tool was developed based on a joint research program with the prestigious Seoul National University. With six years in research and another five years for commercialization, SPARROW has been proven not only technically but also on its marketability. Fasoo continues to work with Seoul National University to improve SPARROW and develop new programs to strengthen the overall source code analysis market. Active support for correcting flaws in source code SPARROW offers a web based user interface that links between source pages, helping the user quickly navigate source code to verify alarms. Prompt correction of the detected bug can be made through an error analysis report and detailed analysis guide. Related examples and information about each defect can be confirmed and explained through CWE, CERT, OWASP, HIS, HICPP, MISRA and more. CWE: A Community-Developed Dictionary of Software Weakness Types CERT: Computer Emergency Response Team for Internet Security Incidents OWASP: Open Web Application Security Project Flexible deployment and operation All on-going projects are managed on the server through the web-based integrated management system which provides helpful resources to configure a safe collaborative system and to operate efficiently for large-scale projects. No matter the development environment, organizations can use SPARROW without restriction on where the analysis engine is installed, whether on a server or on a user’s PC. [Award] Gold Winner in the Vulnerability Assessment, Remediation and Management category at the 2014 Info Security Products Guide's Global Excellence Awards [Certification] SGS TUV SAAR - Certified for products in accordance with ISO 26262 [Korean Patent] Memory Leak Detecting Apparatus and Method thereof (Patent No. 100965426)

    02/02/2016 Products/Solutions 02/02/2016
  • Protect Files Beyond the Boundaries of Content Repositories

    An oveview on Fasoo Secure Document. What happens when information leaves the repository? Information repositories are widely used to store and share data and documents. The security measures in these systems are insufficient to protect files outside of the repository. Once someone downloads files, they no longer retain any security controls. Organizations realize that investments in network security cannot prevent leaking of sensitive information by insiders, since they already have authorized access to that information. Fasoo Secure Document (FSD) persistently protects documents downloaded from information systems Fasoo ensures your documents remain secure no matter where they go after you download them. You are protected whether you use Microsoft SharePoint, IBM FileNet or any ECM, EDM, ERP or groupware system. To persistently protect the documents populated from central repositories, organizations need to extend the security of the repository to include files downloaded to end point devices. In addition, access to the downloaded files need to be dynamically enforced to reflect any changes on the repository ACL for ensuring continuous and consistent security. FSD integration with Microsoft SharePoint and IBM ECM is seamless and will provide the security you need when files containing sensitive information are downloaded from SharePoint or IBM ECM. “Our company shares sensitive research information and company assets stored in an information system and patent application system. Due to the sensitive nature of these files, it is extremely important that we prevent exposing this information to our competitors, as we will suffer heavy financial losses. We needed a security solution that could limit certain department’s access to specific files. For example, only allowing research departments access, and restricting access to the management support, planning, and other departments. With the addition of Fasoo’s solution we didn’t have to worry about information leaking and getting into the wrong hands.” -Research Institute IT Security Manager-

    02/10/2016 Products/Solutions 02/10/2016
  • Discover and Classify to Understand Your Data

    An overview on Fasoo eData Manager. For an effective and efficient data security, organizations must define the scope of data to protect. However, it is not easy to understand all the target documents since the volume, location, filename extension, number of copies or security sensitiveness of target files are continuously changing. To properly understand the target files to enforce data security, organizations must discover and all unstructured data residing in endpoint devices and repositories, and classify and protect the files according to its own data security strategies. Understand your own data to set up your own data security policy with Fasoo eData Manager Fasoo eData Manager is an enterprise classification and security policy management tool that is complementary to Fasoo Enterprise DRM as well as valuable by itself. It scans files throughout the enterprise to find content that is confidential or of high value. It can scan files located within folders and logical drives on PCs – that is, it can scan files on file servers, cloud storage servers, repositories, and anything else that can be mounted as a logical drive or shared folder. The files that Fasoo eData Manager scans are those that match templates which specify criteria for files to be scanned. These include: Storage devices (fixed or portable), folders, or individual files. Filename extensions (file types, e.g. Microsoft Word documents, Excel spreadsheets, PDF). Pattern matching within file names or file content, as defined by keywords or regular expression matches Fasoo Enterprise DRM document classes Users and user groups Scans can be set up to take place periodically, (i.e daily, weekly, etc.). Fasoo eData Manager displays statistics on file characteristics that it gathers from scans, which include: Files that are unprotected, protected by Fasoo Enterprise DRM, or protected by Fasoo eData Manager encryption. Files whose names or contents contain matches to regular expressions or keywords, such as PII. File extensions (types) of interest, such as Microsoft Excel spreadsheets or PDFs. Files that have been distributed throughout the organization. Day-to-day variations in these statistics. ""With Fasoo eData Manager, managers and security administrators now have an adequate decision making process, to determine and respond to risks related to sensitive documents. -CIO of Nuclear Power Plant -

    02/23/2016 Products/Solutions 02/23/2016
  • Fasoo's Customers

    Here are some of our customers who have deployed our solutions Enterprise DRM Customers SPARROW Customers

    01/01/2016 About Fasoo 01/01/2016
  • Download the Latest Insider Threat Report Sponsored by Fasoo

    Check out the latest insider threat report sponsored by Fasoo along with several other sponsors. Learn the hard facts on insider threats and what information security professionals are doing to prevent, detect and successfully remediate these threats. Highly publicized insider data thefts and security breaches highlight the increasing need for better security practices and solutions to reduce the risks posed by malicious insiders as well as unintentional insiders. This report is the result of comprehensive crowd-based research in partnership with the 300,000+ member Information Security Community on LinkedIn and Crowd Research Partners to gain more insight into the state of insider threats and solutions to prevent them. Some key survey findings are as follows: Seventy-four percent of organizations feel vulnerable to insider threats — a dramatic seven percentage point increase over last year’s survey. However, less than half of all organizations (42 percent) have the appropriate controls in place to prevent an insider attack. Inadvertent data breaches (71 percent) top the list of insider threats companies care most about. Negligent data (68 percent) and malicious data (61 percent) breaches come in a close second and third Privileged users, such as managers with access to sensitive information, pose the biggest insider threat to organizations (60 percent). This is followed by contractors and consultants (57 percent), and regular employees (51 percent). Fifty-six percent of security professionals say insider threats have become more frequent in the last 12 months. Forty-two percent of organizations expect a budget increase over the next year — a strong gain of eight percentage points from the previous year. Over 75 percent of organizations estimate insider breach remediation costs could reach $500,000. Twenty-five percent believe the cost exceeds $500,000 and can reach in the millions. To download the report, please click on the button below. .main .wrap .column.right .container.article .articleView .articleText ul.resourceItem { display: none; }

    08/08/2016 Resources 08/08/2016
  • Accurate and Efficient Quality Control for Software Development

    An overview of SPARROW QCE. SPARROW QCE uses a semantic based static program analysis tool to detect quality flaws in your software’s source code SPARROW QCE is necessary for software developers and quality assurance teams who want to reduce the cost of software errors. Detection of bugs in your source code that can produce critical quality defects must be analyzed and corrected before software development is completed. SPARROW QCE detects fatal quality defects during development with fewer false alarms. The process is less costly, more time efficient and a more rigorous analysis that provides you with quality and error free software. SPARROW QCE automatically analyzes your code and offers you a deep and accurate source code analysis at the early stages of program development without creating a separate test environment. SPARROW QCE can be used in various industries including government, financial services and any organization that builds embedded software to eliminate errors during development. SPARROW QCE is recognized by customers as a high quality tool for creating error free software. Who needs SPARROW

    02/03/2016 Products/Solutions 02/03/2016
  • Careers

    We're looking for the person who possesses both vision and talent to lead Fasoo's future Even a common idea can become a great idea when composed with the right team and company. Innovation can’t be done alone. We believe that through the right cooperative atmosphere those ideas will have no limit in how far they go as well as how successful they will be. Fasoo is waiting for you to help us build a better outlook collectively for the future of data and application security. Collective Creativity Being able to compromise based on good communication and consideration for others. Being able to aim higher and learn more. It’s not the time to stop learning, it’s time to continue to develop your knowledge to become an expert. Integrity and having a positive mindset are the base of our professionals. We are looking for people who believe that it is not just ‘my vision’, it is ‘our vision’. Through ‘Collective Creativity’, this is what makes up the core of the company mentality. This is what Fasoo is looking for.

    01/01/2016 About Fasoo 01/01/2016
  • Reinforce Print Security and Help Reduce Costs

    An overview on Fasoo ePrint. The average employee prints about 10,000 pages a year and 17% of them are pages the employee did not intend to print. This not only leads to high printing costs but also to data breaches from printing sensitive information. Fasoo ePrint provides you with a safe and efficient printing environment With protective measures and cost cutting capabilities, Fasoo ePrint provides an effective yet secure print management solution. If Fasoo ePrint detects sensitive information in a document, a predefined policy can block printing. It controls and traces printed documents on your existing MFPs, so you can continue to use your current output devices. When used with Fasoo Enterprise DRM solutions, it extends the security area and provides stronger protection for personal information maintained within companies. "It is not uncommon to print yearly salary information as part of our daily routine in HR. Since my office is far from the printer and I worry that someone may steal this sensitive information, I intentionally wait until after work to print these documents. There was a time when I printed this kind of information and by the time I got to the printer, the printout was gone. After Fasoo ePrint was introduced into my company, I was able to go to the printer anytime I wanted and safely retrieve my documents. After authorizing myself with my smartphone application, I could print my document and retrieve it while standing in front of the printer. This assures me that this printed information will not fall into the wrong hands.” -Electronics Company HR Manager-

    02/05/2016 Products/Solutions 02/05/2016
  • Secure Your Data on Mobile Platforms, Not Your Device

    An overview of Fasoo Mobile Solution. More and more employees are using personal devices for work, regardless of their organization's official BYOD policy. This is especially dangerous for businesses and their confidential data when considering that in 2013: 67% have admitted to using personal devices at work, regardless of the office's official BYOD policy $7 million worth of phones had been lost everyday around the world 50% of smartphone and tablet users have said that they don't password protect their devices. It's undeniable that more employees are going to use their mobile devices for work regardless of the policy, so the question is not whether you should allow BYOD, but how you can make sure that the data remains safe from exposure with BYOD. When allowing BYOD in your company, there are a number of security related questions that must be asked. Is the data on your mobile device safe the way it is? Is the connection between the server and mobile device secure? Is the access from your mobile device to server controlled? Is your mobile screen protected? Are you securely sharing files with others? Fasoo Mobile Solution secures the data itself and controls access to your server for complete BYOD security Some of the conventional mobile solutions such as MDM (Mobile Device Management), which manages, monitors and secures the mobile device, and MAM (Mobile Application Management), which manages all the applications and application data, are not enough to confidently answer yes to all the questions. MDM and MAM do address security by managing and controlling the device or the specific files at rest. However, once the device is unlocked and the data is in use, there may be no way to prevent the data from being leaked to the wrong hands. The only way to confidently answer 'yes' to all these security related questions is Mobile Data and Access Management (MDAM), the only complete BYOD security system. Since data keeps moving outside the device or application, the key is securing the data itself and controlling access to your server. Fasoo Mobile Solution extends secure file access to allow people to communicate and collaborate through smartphones and tablets. It provides businesses with the ability to persistently secure, control and trace sensitive files on mobile devices. It is the only solution to provide MDAM, which delivers protection for stored mobile and network data, server access control, mobile screen protection and secure sharing of files. In 2011, Fasoo was awarded with the '2011 Global Digital Rights Management Competitive Strategy Innovation of the Year' from global research and consulting company, Frost and Sullivan In 2010, Fasoo was referenced as one of the "Global Top 6 DRM Companies" in an Aberdeen Group Report In 2010, Fasoo was the only Asian company to be referred as one of the "Global Enterprise DRM Top 7 Vendors' from, world renowned global research & consulting company, Gartner

    02/04/2016 Products/Solutions 02/04/2016
  • Marketing Tighter Security

    It is hard to turn on the news today and not see headlines about high profile security breaches targeting credit card companies and other financial institutions. These attacks result in compromised account information and unhappy, unnerved, customers. Every organization, regardless of size, will be subject to a cyberattack, and the recovery period will be more trying than discovering the actual security breach. In addition to theft of data, customer trust is compromised and the company name may be forever tarnished. It is critical that all financial institutions, from small and community banks to large international banks, be one step ahead of today’s threat environment when protecting what matters most to their customers: personally identifiable information and account information. For more about this article, please click the link below:

    11/29/2016 PR 11/29/2016
  • Prevent and Deter Security Breaches Through Your Screen

    An oveview on Fasoo Secure Screen. Screen capture tools and the proliferation of high-quality digital cameras and smartphones make it easy for anyone to capture sensitive information displayed on a computer screen. With nothing preventing it, the likelihood of a major data breach from capturing this information on the screen is increasing. Some companies limit the possession of these devices or use different items to ensure that the camera lens are blocked, but it makes life inconvenient for employees. Fasoo Secure Screen protects sensitive information displayed on your screen To protect sensitive information displayed on screens being grabbed by screen capturing tools, hot keys and/or remote desktop/virtual desktop infrastructure applications, application-specific or document-specific screen capture control must be enforced. Fasoo Secure Screen blocks efforts to capture what is on the screen and provides specific information through a watermark that shows the screen’s location. Both of these security measures help to secure your screen from unwanted exposure to competitors and other unauthorized people. “Our hospital manages patients’ medical image records through EMR and PACS systems. They make it convenient for our doctors and nurses to treat patients, however the threat for exposure of MRI and x-ray images is a major concern for us because our employees can screen capture those images, or take photos of the screen with digital cameras or smartphones. After applying Fasoo’s secure screen solution to the hospital’s medical management system, restrictions on illegally exposing copies and distributing medical information can be deterred and prevented. With improvements to security of this new system, our employees have become more effective at their jobs.” -General Hospital B, Medical Data Processing Manager-

    02/20/2016 Products/Solutions 02/20/2016
  • Visualize Risk of Your Data to Prevent Insider Threats

    An overview on Fasoo RiskView. The risk of insider threats exists in any company in any sizes. Security solutions cannot always rule out the insider threats, even though it can help lessen the probability to some extent. This is largely because it is difficult to detect insider threats, since insiders have legitimate access to data with intimate knowledge of security controls and methods to bypass them. Fasoo RiskView helps to prevent insider threats that are real, but difficult to detect Fasoo RiskView is a tool for security administrators that monitor activity related to unstructured data and user activities with confidential data. It gathers information from Fasoo Usage Tracer (the log analysis utility for Fasoo Enterprise DRM) and Fasoo eData Manager. It has APIs that can be configured to import log data from other security technology components, including firewalls, DLP, databases, and even physical security systems (e.g., entry/exit data from keycard or biometric systems) and employee attendance records. Fasoo RiskView includes a decision making framework that security administrators as well as business managers can use to review suspicious activities and after relevant investigations, in order to decide whether or not to take action to address these concerns with potential insider threats. Fasoo RiskView applies sophisticated rule-based modeling to the data sources mentioned above, to establish normal patterns of behavior and flag suspicious activities that indicate enough risk to merit concern and potential intervention by business management. The types of activities that Fasoo RiskView tracks include: Event anomalies, such as logins with user IDs of former employees, a given user logging in from multiple locations simultaneously, or unauthorized users retaining an excessive numbers of files containing sensitive data. File based risks, such as unauthorized users’ attempts to decrypt classified files. User based risks, such as users decrypting files more frequently than usual, printing more files than usual after regular business hours, or sending files to external recipients more than usual. “To put it simply, Fasoo RiskView enabled us, especially security administrators and line of business managers, to discover risks of data theft or loss that are assumed to exist but are unknown.” -CISO of International Business Law Firm-

    02/23/2016 Products/Solutions 02/23/2016
  • Fasoo Support

    How can we help you? Fasoo provides a diverse range of support services to help you with Fasoo solutions and services wherever you are. Our experienced support staff and engineers deliver dependable and satisfactory service to meet your needs. We are here to help you. US Support (866) 311-6373 Global Support +82-2-300-9300 For further assistance please use our contact form here.

    03/22/2016 Support 03/22/2016
  • Extend File Based Security from Your PC to Your Mobile Device

    An overview on Fasoo Mobile Gateway. As enterprise mobility boosts the work efficiency by enabling "anywhere access" to business data, many organizations are allowing employees to access internal data on their corporate mobile devices. In a survey of nearly 2,100 IT employees in 2013, 93 percent use personal mobile devices for work. Mobile devices are becoming the tool of choice for many businesses as they offer a simpler user experience and easy access to information. Many organizations today are establishing BYOD programs that embrace employee-owned devices. Setting policies that separate business information from personal information is key to the security of sensitive files viewed on mobile devices. Not only are the risk of data leaks increasing since sensitive business information exists on lost mobile devices, but also because legitimate, unsupported apps, may unintentionally cause security risks for the company. Fasoo Mobile Gateway prevents data breaches while working on your mobile devices Fasoo Mobile Gateway extends secure file access to allow people to communicate and collaborate through smartphones and tablets. It provides businesses with the ability to persistently secure, control, and trace sensitive files on mobile devices. The information remains secure even if the device is lost or stolen. In conjunction with the Fasoo View and Fasoo View Plus apps, your information is securely extended from Fasoo DRM solutions on your PC to your mobile device. "Our company uses Fasoo’s PC and information system security solutions to prevent exposure of files with sensitive information to competitors. At the end of last year we were concerned with how to use these files safely and conveniently on mobile devices. After adding Fasoo’s mobile server to our existing DRM server, we could use those files securely and efficiently on our smartphones and tablets.” -Financial Securities Company C, Security Management Team Leader-

    02/04/2016 Products/Solutions 02/04/2016
  • Safely Protect Files that You've Saved to the Cloud

    An overview of Folder Cryptor. Are you personally using Dropbox and want to secure files that are uploaded into the cloud? Do you wish you could have your files automatically encrypted as they are uploaded into Dropbox folders? Is it important for you to have complete and secure management of your Dropbox folders? If yes, then with Folder Cryptor for Dropbox, a B2C service will safely secure personal contents in Dropbox. With the growing number of personal devices such as PC, smartphones, tablet PCs, the use of public cloud storage services such as Dropbox, Google Drive, Box and more to store and share personal information has dramatically increased. The widespread of users and many more utilizing other cloud storage services have made it a target for hackers to steal data that is stored and shared in the cloud. In addition, files shared to others can be leaked or be delivered to a third party by mistake or on purpose. The result can lead these sensitive files containing personal photographs, passwords and other confidential information to be exposed. Folder Cryptor automatically encrypts files before they are uploaded into secure folders With the launch of Folder Cryptor for Dropbox, Fasoo offers a robust security service in order for Dropbox users to safely store and share personal information within the cloud. Files uploaded into these secure folders through Folder Cryptor are automatically encrypted and are considered safe even when they are hacked and stolen. Also, because these files are encrypted throughout its entire lifecycle, users can safely and easily share these files with family, friends and coworkers. Folder Cryptor only requires your existing Dropbox authentication and Dropbox users can simply install Folder Cryptor on their PC (Windows/Mac) or mobile device (iOS/Android). Since users will be automatically connecting with their Dropbox account, their files will be secure with Folder Cryptor without management of user credentials. Folder Cryptor offers a free trial version where users can create up to three secure folders. For unlimited secure folders, including all features from the trial version, users can purchase Folder Cryptor Pro for only $2.99 (one-time payment). This service can be downloaded from as well as on your mobile device from Apple App Store or Google Play. Don’t worry and let Folder Cryptor take charge of the security. For more information on Folder Cryptor for Dropbox

    02/03/2016 Products/Solutions 02/03/2016
  • Secure Files Created and Used on Endpoints

    An overview on Fasoo Secure Node. Are you concerned about your files getting into the wrong hands? With conventional data security approaches, organizations may ensure documents are protected against external attacks but cannot when it comes to protecting them against insider threats. To protect documents against any malicious or careless users, documents must be protected and traced throughout the entire lifecycle, and the centralized security policy must travel with the docuemnts wherever they go, whether they are at rest, in use or in motion. Fasoo Secure Node (FSN) lets you secure sensitive files saved on your PC Even if files are lost or get into the wrong hands, unauthorized access is prevented and sensitive information is not exposed. Since files are automatically secured as they are saved, you can be assured that no one can access files leaked through any unauthorized disclosure to people inside or outside your organization. "Our internal Design team frequently creates CAD drawings and sends them to a third party for production. We take a laptop with the drawings to the production company and deliver them in person because we are afraid someone may leak these sensitive files to competitors. This helps prevent information from leaking, but there is still the issue of laptops being lost or stolen, and how to prevent someone else from accessing them. Now with Fasoo’s solution we are not concerned that sensitive CAD drawings will be lost or stolen and get into the wrong hands. Since the files are secured when saving them, we are confident about the security of our work, even if these files are exposed deliberately or by mistake to competitors.” -Heavy Industrial Machinery Corporation Design Leader-

    02/23/2016 Products/Solutions 02/23/2016
  • Classify and Manage Different Notes on Your Smartphone

    An overview on DigitalPage. With DigitalPage, on your smartphone, you are able to leave notes, schedules, or business ideas on page, anytime, anywhere. There is no need for Internet connection to access your pages. In order to organize yourself, you will be able to add names, phone numbers, photos, voice recordings or location as an “in-line tag”, and these tags are connected with apps with which you can do or what you want. It is also beneficial to link your pages that you would like to see together. DigitalPage then will recommend pages that you had linked together. You are free to add or remove these links among pages at any time. Enjoy a smart life with your intelligent lifelog by using DigitalPage. Find more information on DigitalPage

    02/18/2015 Products/Solutions 02/18/2015
  • Protect Copyright of Your eBook and Securely Distribute

    An oveview on Fasoo eBook DRM. Starting from simply digitalizing contents on paper, eBook is steadily becoming the core element in the digital content industry; eBook has successfully extended its applications to novels, cartoons, catalogues, children contents, digital textbook, and many others by adding audio, video and interactive features and maximizing the user experience. However, because eBook is mainly distributed through the online network, there is a high chance of copyright infringement to occur through illegal replication, and this issue must be solved primarily to ensure the prosperity of the eBook market. Fasoo eBook DRM is the core solution in the eBook business that protects the copyright of eBook contents and ensures the prosperity of the eBook market As a DRM (Digital Rights Management) solution that follows eBook standards by the IDPF and consists of encryption and rights management bases, Fasoo eBook DRM is the core solution in the eBook business that protects the copyright of eBook contents and allows various business types, such as content sales and rentals. Some of the key benefits of Fasoo eBook DRM are as the only DRM (Digital Rights Management) solution that follows standards and security conditions of IDPF EPUB 2/3, the international standard eBook format, Fasoo eBook DRM protects the copyright of not only text-based eBook but also interactive eBook containing various multi-media. For the enhancement of security, we raised the reliability through adopting the cryptographic algorithm and key standards that satisfy the security recommendation (SP800-131) of the National Institute of Standards and Technology (NIST). Various platform types are supported, such as Windows based PC, iOS/Android based smartphones, and eBook readers. Fasoo eBook DRM is useful in extending business models through cross selling, B2C and B2B because it can simultaneously support various policy types, such as sales and rentals, and allows cross-compatibility among eBook services. In addition, cross selling among eBook service providers is supported. EPUB DRM technique of Fasoo has been selected as the standard eBook technique of South Korea, and Fasoo also participates in EPUB DRM international standardization of IDPF. Fasoo eBook DRM was adopted into eBook service of Kyobo Book Centre, the number one eBook provider, and Naver, the number one Korean search portal. "As the No.1 eBook service provider in Korea, we tried to adopt the safest and most robust technology for our complex business model and to support various devices from PC to mobile devices. Already being the top offline bookstore in Korea, by implementing Fasoo eBook DRM we were able to also lead the online eBook industry in providing secure online digital contents to our customers."

    02/04/2015 Products/Solutions 02/04/2015
  • Upgrade Your Data Security Policy through Intelligent Log Analysis

    An overview of Fasoo Usage Tracer. Setting up a perfect data security policy is almost impossible. This is why exceptional policies are so often adopted to balance productivity against security in any sort of policy enforcement settings. There is only one way to address this issue which is by having a flexible security policy management framework, where security policies can be continuously assessed and optimized through feedback from a comprehensive data usage log analysis. Fasoo Usage Tracer centrally monitors usage logs for all Fasoo-protected documents Fasoo Usage Tracer provides a centralized location for organizations to monitor, assess and optimize data security policies enforced by Fasoo Enterprise DRM, a suite of persistent data protection and control solutions, through usage log analysis. Organizations that have multiple Fasoo data-centric solutions in place can collect and analyze all data usage logs from those solutions in a centralized location on a real time basis. Usage logs include user information, access rights, IP address, security classification, file name, time and date. Not only will this be the one stop location to manage all data/user activity logs but will also offer a more convenient management experience. Pattern-based usage monitoring allows security administrators to enforce a set of rules to detect and monitor unusual file usage behaviors of targeted users and groups. Administrators can opt to get notifications whenever any violations of the rules are detected. This solution provides the ratios of provisional license issuing logs to the total licenses issuing logs and compares them between groups and against industry benchmarks. For example, the ratio of individual user groups helps determine which groups need more privileges or abuse provisional or exceptional licenses. The log analysis helps security administrators assess the efficiency and effectiveness of existing security policies. The solution offers organizations with a decision making tool to proactively optimize data-security policies against data security challenges. "Now we can monitor all file usage activities that we have under Fasoo’s solutions, and get commendations to set certain permissions for certain users. This all helps us to continue to keep our data secure.” -Financial Services Firm Chief Security Officer-

    02/10/2016 Products/Solutions 02/10/2016
  • DigitalQuick, An Efficient Collaboration Service

    An overview of DigitalQuick. Do you have difficulty maintaining the version history of documents that you working with others? If so, you need to use DigitalQuick which is an efficient collaborative service that enables co-editing and version management through sharing documents. All version of the document created through DigitalQuick are stored in the cloud and supported by the version control system. All edits applied to the document are managed by the version control system, therefore you can always work with the latest version of the document. With DigitalQuick keep your documents up-to-date and mange updated history. When using DigitalQuick, you can pinpoint the people you want to share the documents with, so you can safely collaborate with them without worrying about security. As you collaborate on the documents with other people at the same time, you will be able to track all the changes that are made. In such a case, you can check the comments of the document which is generated after the document is modified. Do you need to continuously update and deliver (or distribute) a document you have created? That is not the case with DigitalQuick. DigitalQuick documents always come with a link that allows those that are allowed to access it download the latest version of the document. Hence, even if your colleagues or friends are not DigitalQuick users, they can follow the provided link to download the latest version of the document. Are you worried that your important documents are being leaked? A document created through DigitalQuick is automatically encrypted and can be accessed only by authorized users in the group. Therefore, just by creating a DigitalQuick document, you can prevent it from being leaked. Find more information on DigitalQuick

    02/18/2015 Products/Solutions 02/18/2015
  • Fasoo Reveals Its New Logo at Solution Day 2013

    Fasoo revealed its new logo on Thursday, August 29, 2013 at its annual main event, Solution Day 2013, in Seoul, Korea. With over 400 in attendance including media and partners, Fasoo also revealed some of its new upcoming solutions. This is the 7th annual Solution Day that Fasoo has hosted, and by far had a record breaking number of attendees who were eager to learn about what Fasoo’s new solutions. With the theme of ‘Innovative Strategy in Protecting Data & Software’ this Solution Day focused on changes and threats to the mobile and cloud environments, cyber terrorism and leaks of personally identifiable information (PII) throughout the presentations by CEO Dr. Kyugon Cho, CMO & COO Dr. Hye Yeon Ahn, CTO Seuk Soo Sung and other Fasoo senior management. Overall, Solution Day 2013 covered many areas by presenting solutions that cover how to deal with cyber terrorism, changes and threats to the mobile and cloud environments, as well as how to prevent leaks of PII. Solution Day was not all business. There were also giveaways and raffle prizes given at the end of the event. Although the weather was gloomy and rainy before the event started, the sun came out and Solution Day proved to be a successful event for all.

    09/25/2013 PR 09/25/2013
  • Fasoo USA Adds an East Coast Office Location

    Fasoo USA has a new office location in the East Coast! Located at East Brunswick, NJ, this area is a short distance away from New York City, a leading international center for many business industries, such as banking, commerce, media, etc., and home to many large corporations and organizations, including 42 Fortune 500 companies. Our new office is located at 197 State Route 18 South, East Brunswick, NJ, 08816. Check out the picture below to see what our new office looks like!

    06/23/2014 PR 06/23/2014
  • Fasoo CEO Joins Panel on Cybersecurity for the U.S. & South Korea

    Today at the Four Seasons Hotel in Seoul, South Korea, Fasoo CEO Dr. Kyugon Cho was part of a panel focusing on the “Changing Views on Cyber Security in Public and Private Sector”. Along with Fasoo, such executives from Palo Alto Networks, NIST (National Institute of Standards and Technology), Raytheon, Sentek Global and Tanium also joined in the panel discussion regarding cyber security in both countries. Dr. Cho, spoke about what has changed for the last 25 years in terms of cybersecurity, also security solutions so far, as well as security, now and in the future. He also answered panel questions directed at best practices, adopting data-centric security for intellectual property as well as how to capture government funding to modernize cyber security in the US. The cybersecurity forum, co-hosted by the Korea’s Ministry of Science, ICT and Future Planning and the Department of Commerce, exchanged information on priorities in their efforts to increase cybersecurity as well as hold business meetings between both sides. Led by Assistant Security of Commerce for Industry and Analysis Marcus Jadotte, the U.S. group was also represented by 14 American cybersecurity companies.

    05/19/2016 PR 05/19/2016
  • Fasoo is Now a Publicly Traded Company in South Korea (KOSDAQ)

    Data and software security leader, Fasoo, officially became a publicly traded company on the KOSDAQ on October 18, 2013 during a commencement ceremony at the Korean Exchange Headquarters exhibition hall in Seoul. Incorporated in June 2000, Fasoo has been successfully building its worldwide reputation as an enterprise DRM (Digital Rights Management) solution provider with industry leading solutions and services. Fasoo Enterprise DRM allows organizations to prevent unintended information disclosure or exposure, ensure a secure information-sharing environment, better manage workflows and simplify secure collaboration internally and externally. Fasoo has successfully retained its leadership in the enterprise DRM market by deploying solutions for more than 2,000 projects in an enterprise-wide level, securing more than 2 million users. Fasoo is seeing continuous improvement in its global market position, based on its unique technology, ongoing R&D and strategic approach to comprehensive product capabilities. Fasoo also has foresight to plan for future expansion through new business models including security coding solution and static code analysis (SPARROW), content platform solutions, PII protection solutions, mobile security solutions, cloud security services, etc. “Rather than short-term rapid growth, our plans are to steadily grow substantially and robustly the value of the company,” said Fasoo founder and CEO, Kyugon Cho, “Our investors expectations are as high as our own, and based on those expectations, we will constantly strive to be the leader in the global software market.” Last year, Fasoo experienced around $20 million USD in sales, with $4 million USD in operating profit and a net profit of about $4.3 million USD. Fasoo is expected to have a 20% increase in solid earnings and revenue growth this year.

    10/21/2013 PR 10/21/2013
  • Fasoo Announces that SPARROW is Now ISO 26262 Certified

    Fasoo’s source code analysis tool, SPARROW, on January 17, 2014 became ISO 26262 certified. It was only a day or two before that when they also received a CC certification (Common Criteria) in South Korea, which makes them the first CC certified source code analysis tool in Korea. SPARROW analyzes source code with a robust static analysis engine that uses a deep semantic method to find bugs that other tools can’t. It detects buffer overruns, memory leaks, double free errors and other bugs that are difficult to locate. People choose SPARROW because it uncovers critical and relevant bugs cost effectively and lets developers create high quality software the first time. ISO 26262 is functional safety standard for road vehicles. Functional safety features form an integral part of each product development phase, ranging from the specification, to design, implementation, integration, verification, validation, and production release. The standard ISO 26262 is an adaptation of the Functional Safety standard IEC 61508 for Automotive Electric/Electronic Systems. ISO 26262 defines functional safety for automotive equipment applicable throughout the lifecycle of all automotive electronic and electrical safety-related systems.

    01/29/2014 PR 01/29/2014