English Korean Japanese Partner Portal Contact Us Location

Most Recent

  • Fasoo Presents to the Ponemon RIM Council

    Bill Blake, President of Fasoo, Inc., joined Dr. Larry Ponemon in a presentation on July 20, 2016 to the Ponemon RIM Council of the findings from the recent Ponemon Institute survey “Risky Business: How Company Insiders Put High Value Information at Risk” sponsored by Fasoo. Both discussed numerous points highlighted in the survey including how to deal with careless acts by employees and contractors that can ultimately result in a data breach. The Ponemon RIM (Responsible Information Management) Council is a select group of privacy, security and information management leaders from multinational corporations who are champions within their various industries on issues involving privacy and data protection. Many of the members were very interested in the conversation about company insiders, since many security organizations focus more of their technology and human resource on fighting external threats to sensitive information. Companies in this study said the primary cause of data breaches was the careless employee (56 percent of respondents) followed by lost or stolen devices (37 percent of respondents) or system glitches (28 percent of respondents). In contrast, only 22 percent of respondents say external attackers or malicious/criminal insiders (17 percent of respondents) caused the breach. It is interesting that organizations believe they are more effective in preventing external attacks by hackers and third parties than careless employees or malicious or criminal insiders, yet the survey points to insiders as being the greater threat. This is in contrast to what many organizations view as the primary threat to their intellectual property and other high value information. While a lot of focus is on strengthening perimeter security to address external threats, clearly companies need to look internally to prevent accidental exposure of information through careless or malicious acts. Two key areas to remediate these issues are to create training programs that address the common and careless actions prevalent in most companies and take advantage of technologies that allow for self-securing data based on the value of the content rather than relying on employees to decide what is and what is not sensitive and high value information. Click here to download the full presentation used during the RIM Council meeting.

    07/29/2016 PR 07/29/2016
  • How Company Insiders Put High Value Information at Risk

    A presentation on the Ponemon Institue report sponsored by Fasoo, The purpose of this research, Risky Business: How Company Insiders Put High Value Information at Risk, is to understand what activities put business-critical information at risk in the workplace. We surveyed 637 IT and IT security practitioners who are familiar with their organization’s approach to securing confidential information contained in documents and files. All organizations represented in this research use document and file-level security tools. In the context of this study, high value information could be trade secrets, new product designs, merger and acquisition activity, confidential business and financial information, and employee information. The loss or theft of such information would be catastrophic for a company and affect its sustainability. To view the rest of this presenation about this report, please download the presentation.

    07/20/2016 Resources 07/20/2016
  • Download The Latest Ponemon Report on How Company Insiders Put High Value Information at Risk

    Fasoo partnered with the Ponemon Institute to present: "Risky Business: How Company Insiders Put High Value Information at Risk". About 640 IT security practitioners familiar with their organization's approach to protecting data, documents and files against cyberattacks were surveyed and found that: 56% say company insiders are the primary cause of data breaches 72% are not confident they can manage and control employee access to confidential files 70% do not know the location of confidential information 73% believe they lost confidential information in the past 12 months Some other highlights of this report are that Sales, C-level executives, Finance and Human Resources departments pose the greatest risk to high-value data, while 83% struggle with determining the approrpriate level of confidentiality documents and files should possess. .main .wrap .column.right .container.article .articleView .articleText ul.resourceItem { display: none; }

    06/13/2016 Resources 06/13/2016
  • Fasoo Solution Overview

    Lead Digital, Fasoo Fasoo provides strategic intelligence for digital business in the areas of data security, application security, digital content management and cloud services. Data Security In this time in the digital era, data breaches are unstoppable because business data is freely distributed without any concern for internal/external corporate boundaries, through insider information disclosure and by APT attacks. Fasoo provides data-centric security to protect data as it travels both within the organizational perimeter and beyond by limiting access to sensitive data according to policies that cover both users and activities. Fasoo Data Security Framework Fasoo Data Security Framework helps organizations discover, classify and protect sensitive data so that you control who can access it, regardless of location. It discovers and classifies sensitive files automatically and encrypts them as you create them on the desktop, localize them from databases or download them from information systems. Dynamic security policies travel with the files and apply permission controls that grant or deny users the right to View, Edit, Copy, Paste, Print or Decrypt the files. If any unauthorized user got access to the file, they could not read the information inside. You can analyze how users copy, move and access files over time. This allows you to prevent unauthorized activity, detect suspicious behavior patterns that suggest APTs and take action before it’s too late. Fasoo Enterprise DRM Fasoo Enterprise DRM (Digital Rights Management) is an award winning persistent data security solution for protecting, controlling and tracing data throughout the enterprise – including data at rest, data in use, and data in motion – according to predefined policies based on user, group or role, or dynamically binding existing access control lists of information systems to enable file-level permissions at all times. Fasoo Enterprise DRM has been deployed to over 1,200 organization enterprise-wide, securing more than 2.5 million users. Fasoo Secure Node (FSN) - ​​When sharing and collaborating internally, FSN allows you to secure, control and track sensitive documents created and used on endpoints. Fasoo Secure Document (FSD) - When sharing and collaborating, FSD allows you to secure, control and track sensitive ECM, ERP, groupware and other related documents beyond its controlled boundaries. Fasoo Secure Exchange (FSE) - When collaborating with partners and customers, FSE allows you to secure, control and track sensitive documents shared with external users. Fasoo Secure Print (FSP) - When printing your files, FSP allows you to trace printing activities and deter information leaks through printouts. Fasoo Secure Document for IBM ECM (FSD for IBM ECM) - When extending security perimeter of your ECM, FSD for IBM ECM allows you to secure, control and track documents beyond controlled boundaries of IBM ECM. Fasoo Secure Document for SharePoint (FSD for SharePoint) - When extending security perimeter of your ECM, FSD for SharePoint allows you to secure, control and track documents beyond controlled boundaries of SharePoint. Fasoo Secure Screen (FSS) - When displaying your files on your screen, FSS prevents and deters security breaches through your screen. Fasoo Usage Tracer - When monitoring and analyzing your data, Fasoo Usage Tracer allows you to monitor and analyze user/file activities, and optimize existing security policies. Fasoo Mobile Gateway - When sharing your files to your mobile device, Fasoo Mobile Gateway allows you to extend file based security from your PC to your mobile device. Fasoo View/Fasoo View Plus - When viewing Fasoo Enterprise DRM files on your mobile device, Fasoo View and Fasoo View Plus applications allows you to view and edit secure data on your mobile device. Fasoo eData Manager Fasoo eData Manager is a data governance solution for discovering and classifying the constantly changing set of unstructured data based on its association with people and other characteristics, showing the data’s security vulnerability and dynamically applying security policies on a continuous basis. Fasoo RiskView Fasoo RiskView is a risk assessment solution for monitoring and analyzing users and their activities in using both protected and unprotected files, determining normal levels of activity, and using sophisticated data analysis techniques to discover deviations that may indicate security risks. Printing Security Fasoo Secure Print (FSP) When printing your files, FSP allows you to trace printing activities and deter information leaks through printouts. Fasoo ePrint When printing your files, Fasoo ePrint allows you reinforce print security and detect personal information in a document and through pull printing, block printing based on a predefined policy. Mobile Security Fasoo Mobile Solution When using personal devices for work, Fasoo Mobile Solution secures your data itself and controls access to your server for complete BYOD security. Fasoo Mobile Gateway When sharing your files to your mobile device, Fasoo Mobile Gateway allows you to extend file based security from your PC to your mobile device. Fasoo View/Fasoo View Plus When viewing Fasoo Enterprise DRM files on your mobile device, Fasoo View and Fasoo View Plus applications allows you to view and edit secure data on your mobile device. Content Platform Fasoo eBook DRM When distributing eBook content, Fasoo eBook DRM protects the copyright of eBook contents and securely allows you to distribute them to your customers. Application Security Application today build up the life of business, however, more than ever they are under constant attack. This is a new frontier for hackers. Rather than attacking perimeter security defenses, like firewalls and end point encryption applications, the hackers are getting developers to embed security vulnerabilities in their code. Fasoo provides a semantic-based static code analysis tool that can be deployed from the early stages of the SDLC (Software Development Life Cycle) to help identify and remediate software vulnerabilities. SPARROW SPARROW is a static code analysis tool that detects critical software vulnerabilities at the early stages of software development. SPARROW analyzes source code with a robust static analysis engine that uses a deep semantic method to find vulnerabilities, and provide analysis results that differentiates us from other tools. SPARROW SAST SPARROW SAST (Static Application Security Testing) tool provides developers and security managers with the ability to accurately identify security vulnerabilities, remediate these flaws through code suggestions. SPARROW QCE SPARROW QCE enables developers, quality testers and managers to analyze all possible paths of a program and identify quality defects in the very early stages of software development. SPARROW QCE provides accurate and efficient quality control for software development. Digital Docuemnt Platform Every company faces constant challenges with managing the information that its employees generate. The ubiquity of devices and increasing availability of low cost storage encourage people to generate unprecedented numbers of copies of the files they create – many of which they don’t even realize they are creating. Fasoo has introduced Wrapsody, a new approach to content management. Wrapsody Wrapsody improves productivity with document sharing and collaboration through a digital document ID technology, which enables the same document to be automatically updated and synced. The Wrapsody platform can expand it’s flexibility through it’s core functions such as having full version control of their files (Spot Version Control) and always having the latest version of the file (On-Demand Sync) to cover document storage, management and distribution systems in addition to PC and mobile devices. The Wrapsody platform motivates document usage by users and document related work management for managers intelligently, through usage logs and analysis of the document content. Cloud Service Fasoo provides cloud and mobile services that lets you secure, store data and manage different notes. DigitalQuick DigitalQuick is a cloud storage service for efficient collaboration that allows you to keep your documents up-to-date and manage updated history. Folder Cryptor Folder Cryptor offers a robust cloud security service that automatically encrypts files before they are uploaded into secure folders. DigitalPage DigitalPage is an application that allows you to classify and manage different notes, schedules or business ideas by writing, tagging and linking pages on your mobile device.

    04/20/2016 Products/Solutions 04/20/2016
  • Security: Technology Makes Safeguarding Confidential Information Difficult

    Security: Technology Makes Safeguarding Confidential Information Difficult In this age of sharing and frequently used technologies like social collaboration and file sharing, we’ve managed to achieve greater openness and transparency, but we’ve also eroded our ability to secure information that is considered confidential. Managing secure information in organizations is hard. Ron Arden, COO at data security vendor Fasoo, said that “a lot of people don’t realize how much intellectual property or trade secrets is floating around the organization.” A study by the Ponemon Institute sponsored by Fasoo found the following... To read the rest of this blog post, please click on the link below.

    07/21/2016 PR 07/21/2016
  • Employees Are the Biggest Security Risk

    Employees Are the Biggest Security Risk Although a steady stream of news reports chronicles the activities of hackers, attackers, state actors and cyber-criminals who break into systems and steal or damage data, the greatest risk actually resides within an organization. A recently released Ponemon Institute and Fasoo study, "Risky Business: How Company Insiders Put High-Value Information at Risk," points out that the vast majority of organizations' executives are not confident in their ability to manage and control employee access to confidential documents and files. "What should be concerning to C-level executives and corporate boards is that most organizations have no idea where mission-critical information is located on the corporate network, who has access and what they are doing with that information," stated Bill Blake, president of security solutions firm Fasoo. Ponemon Institute surveyed 637 U.S. IT security practitioners familiar with their organization's approach to protecting data, documents and files against cyber-attacks. Some of the key findings are included here. To view the rest of the article from Baseline Magazine, please click on the link below.

    07/21/2016 PR 07/21/2016
  • The Security Blueprint for Your Data

    An overview on Fasoo's Data Security Framework. The Fasoo data security framework consists of a three-tiered suite of solutions to strengthen information security. The Fasoo Enterprise DRM (FED) suite plays a pivotal role to enforce security policy on data among three layers of data protection. At the front-end, Fasoo eData Manager discovers and classifies the data, reapply policy to the data unprotected due to policy exceptions and exclusions. At the back-end, Fasoo RiskView enables organizations to manage risks holistically by collecting and analyzing logs of data usage and various sources that can be useful. This multi-layered approach enhances and completes an organization's security framework.

    02/25/2016 Products/Solutions 02/25/2016
  • Persistent Data Security Solution for Any Business Environment

    An overview on Fasoo Enterprise DRM. How secure are your files? What would happen to your business if a file with sensitive information were to leave your organization? Can you afford not to have the best protection solutions? Fasoo Enterprise DRM (Digital Rights Management) protects the file itself to provide a more secure work environment. Fasoo Enterprise DRM is a file-based security solution that prevents the exposure of sensitive and confidential files by trusted insiders, business partners, customers and unauthorized people. Here is the problem with traditional content management systems: People can easily access sensitive business information from mobile, cloud or virtual environments. This allows us to communicate and collaborate more conveniently, but increases the risk of losing our trade secrets, classified documents and PII (Personally Identifiable Information) with just one click. Against these threats, file-based security such as information rights management is the best solution to protect you from information leaks. Documents are secure while they remain in a controlled boundary, like a content management system. DLP (Data Loss Prevention), firewalls, intrusion detection and intrusion prevention systems can protect information from outside attacks or potentially stop sensitive information from leaving an organization. These solutions can’t stop everything and increase the complexity of the network infrastructure. Authorized people inside your organization can send out sensitive information by mistake or deliberately. That information is no longer secure once it leaves your organization. Persistent File-based Security for Any Business Environment Fasoo Enterprise DRM protects, controls, and traces sensitive files containing intellectual property, trade secrets, PII, and more. It maintains file protection and prevents unintended information disclosure no matter where it is. In contrast with conventional security solutions, Fasoo Enterprise DRM protects information itself persistently whether it is stored, being used, being transmitted, or even after transmission, throughout the entire document lifecycle. This is the only complete and effective solution that protects you against unwanted information leaks from anyone. Fasoo Enterprise DRM uses an encryption in their solutions that is certified from Korea's National Intelligence Service (NIS), to protect and manage sensitive documents in any environment whether it is saved to a PC, downloaded from a server, printed, or sent by email. Fasoo Enterprise DRM is an essential security infrastructure component for every enterprise application system as mobile and cloud computing diversify and expand the enterprise IT environment. With Fasoo Enterprise DRM, organizations can safely share confidential documents internally and externally, freeing themselves of any concern about unintended information loss. Fasoo Enterprise DRM Key Facts Global leader in enterprise DRM First company in the world to commercialize DRM as a product World’s largest enterprise DRM customer base Fasoo is the only company that has developed and equipped their encryption module “Fasoo Crypto Framework” with a National Intelligence Service certified encryption technology Supports any environment where files are distributed Can be integrated with information systems such as ECM, ERP, PLM and more Extend security to mobile and cloud environments Deployed to more than 1,100 organizations, with over 2 million users around the world In 2014, Fasoo was awarded as a winner in the Security Products and Solutions for Enterprise (Large) category at Info Security Products Guide's Golbal Excellence Awards In 2011, Fasoo was awarded with the ‘2011 Global Digital Rights Management Competitive Strategy Innovation of the Year’ from global research and consulting company, Frost and Sullivan In 2010, Fasoo was referenced as one of the “Global Top 6 DRM Companies” in an Aberdeen Group Report In 2010, Fasoo was the only Asian company to be referred as one of the “Global Enterprise DRM Top 7 Vendors’ from world renowned global research & consulting company, Gartner.

    02/02/2016 Products/Solutions 02/02/2016
  • Location

    North America Headquarters 197 State Route 18 South, Suite 203N East Brunswick, NJ 08816 tel: (732) 955-2333 Global Headquarters 396 World Cup Buk-ro Mapo-gu, Seoul 121-795, South Korea tel: +82-2-300-9000 fax: +82-2-300-9400 --> Regional Office in Korea EWR Building, 10th Floor, 1330-8 Seocho-gu, Seoul 137-858, South Korea tel: +82-2-300-9190 fax: +82-2-300-9405 --> /* function initialize() { var mapDiv = document.getElementById('fmap1'); var map = new google.maps.Map(mapDiv, { center: new google.maps.LatLng(37.579702,126.890266), zoom: 18, mapTypeId: google.maps.MapTypeId.ROADMAP }); var content = '17th FL, Nuritkum Square Business'; var infowindow = new google.maps.InfoWindow({ content: content }); var marker = new google.maps.Marker({ map: map, position: map.getCenter(), draggable: true });, marker); } function initialize2() { var mapDiv = document.getElementById('fmap2'); var map = new google.maps.Map(mapDiv, { center: new google.maps.LatLng(37.492669,127.028346), zoom: 18, mapTypeId: google.maps.MapTypeId.ROADMAP }); var content = 'EWR Building 10th Floor'; var infowindow = new google.maps.InfoWindow({ content: content }); var marker = new google.maps.Marker({ map: map, position: map.getCenter(), draggable: true });, marker); } */ function initialize3() { var mapDiv = document.getElementById('fmap3'); var map = new google.maps.Map(mapDiv, { center: new google.maps.LatLng(40.469416,-74.408986), zoom: 18, mapTypeId: google.maps.MapTypeId.ROADMAP }); var content = 'Fasoo, Inc.'; var infowindow = new google.maps.InfoWindow({ content: content }); var marker = new google.maps.Marker({ map: map, position: map.getCenter(), draggable: true });, marker); } // google.maps.event.addDomListener(window, 'load', initialize); // google.maps.event.addDomListener(window, 'load', initialize2); google.maps.event.addDomListener(window, 'load', initialize3);

    01/01/2016 About Fasoo 01/01/2016
  • Digital Intelligence for Security and Productivity

    About Fasoo - Who are we? At Fasoo, our main goal is to provide you with more robust and scalable data and application security, as well as mobile security to liberate people and businesses from various risks and constraints in their digital life and business. Fasoo plans to deliver exceptional value through our software to our customers and gain credit by developing software of true value that is recognized all around the world. As a leader within the Digital Rights Management industry, we continue to challenge ourselves and expand into new business areas to provide you with high quality software. Fasoo has developed competitive products and DRM solutions to succeed in the constantly changing IT environment and promises to meet the challenges to provide you with the software you need to secure your data and tackle security threats and unwanted limitations in this environment. Our Vision Our vision provides us with the framework to guide every aspect of our business. By 2020, Fasoo aims to be a global top 100 software company, produce four global software products along with two global number one products, have Fasoo Enterprise DRM be part of every business application and have our source code analysis tool, SPARROW on every developer’s desktop. These are just some of the visions we aim to accomplish in order to achieve sustainable, quality growth.

    03/01/2016 About Fasoo 03/01/2016
  • Manage Security Vulnerabilities Effectively

    An overview on SPARROW. SPARROW is a static code analysis tool that is performed without actually executing programs, detecting critical software vulnerabilities at the early stages of software development. SPARROW analyzes source code with a robust static analysis engine that uses a deep semantic method to find vulnerabilities that other tools can’t. It detects security vulnerabilities such as buffer overruns, SQL injection, cross-site scripting, information leakage, TOCTOU race condition and hardcoded password. It also detects run-time errors such as memory/resource leaks, null dereference, uninitialized variables, division by zero, use after free and integer overflow. People choose SPARROW because it uncovers critical and relevant vulnerabilities during the early stages of the Software Development Life Cycle (SDLC). SPARROW is popular with government agencies, corporations and anyone developing embedded software that requires a very high level of software quality. The Static Application Security Testing (SAST) version of SPARROW is also used by the government and financial industries which aim to eliminate all security weaknesses from their source code. Static Application Security Testing (SAST) tool with... ACTIVE SUGGESTION SPARROW can be deployed on both the development and testing phases in the SDLC. As an SAST tool, SPARROW provides developers and security/quality managers with the ability to accurately identify software vulnerabilities, remediate code using ACTIVE SUGGESTION, enforce project based rules for developers and customize policies according to project requirements. Currently no other solution has a similar feature as ACTIVE SUGGESTION, where you are provided code suggestions to easily fix the vulnerabilities in your software. Intelligent Alarm Clustering SPARROW's Intelligent Alarm Clustering groups related vulnerabilities in the source code with a unique ID. A developer can review results and address vulnerabilities faster and easier throughout the SDLC. Intelligent Alarm Clustering reduces review time because it reduces the number of alarms to review and also reduces fix time since these vulnerabilities are in clustered groups and can be remediated in order instead of going back and forth. Advanced Issue Filtering SPARROW provides Avanced Issue Filtering which analyzes the characteristics of issues and eliminates errors with have to analyze them over and over again, each time. Static analysis tool based on a deep semantic method with the best technology It is the semantic approach that allows SPARROW to follow all possible execution scenarios, to be more exhaustive than other tools, rather than focusing on discovering particular patterns. In addition to the semantic tools, SPARROW also utilizes syntactic tools to quickly find shallow bugs based on fixed patterns. SPARROW balances the depth of its bug detection coverage with a reasonable analysis cost. Development process linked to the highest academic research SPARROW is similar to other analysis tools which derived their research and product toolsets from prestigious universities like Stanford University and the University of Wisconsin. These tools have gained great respect and success in the marketplace for their technological research. SPARROW’s semantic based static analysis tool was developed based on a joint research program with the prestigious Seoul National University. With six years in research and another five years for commercialization, SPARROW has been proven not only technically but also on its marketability. Fasoo continues to work with Seoul National University to improve SPARROW and develop new programs to strengthen the overall source code analysis market. Active support for correcting flaws in source code SPARROW offers a web based user interface that links between source pages, helping the user quickly navigate source code to verify alarms. Prompt correction of the detected bug can be made through an error analysis report and detailed analysis guide. Related examples and information about each defect can be confirmed and explained through CWE, CERT, OWASP, HIS, HICPP, MISRA and more. CWE: A Community-Developed Dictionary of Software Weakness Types CERT: Computer Emergency Response Team for Internet Security Incidents OWASP: Open Web Application Security Project Flexible deployment and operation All on-going projects are managed on the server through the web-based integrated management system which provides helpful resources to configure a safe collaborative system and to operate efficiently for large-scale projects. No matter the development environment, organizations can use SPARROW without restriction on where the analysis engine is installed, whether on a server or on a user’s PC. [Award] Gold Winner in the Vulnerability Assessment, Remediation and Management category at the 2014 Info Security Products Guide's Global Excellence Awards [Certification] SGS TUV SAAR - Certified for products in accordance with ISO 26262 [Korean Patent] Memory Leak Detecting Apparatus and Method thereof (Patent No. 100965426)

    02/02/2016 Products/Solutions 02/02/2016
  • Fasoo's Partners

    Fasoo has numerous business partnerships with companies all over the world. Fasoo’s partners include sales partners as well as technology partners. If you are interested in being a partner of Fasoo, please contact Partner Portal As a partner of Fasoo, you can register to gain access to our partner portal. The partner portal provides marketing materials, price lists and other relevant information to help you with achieving sales opportunities with your customers. If you have not already made an account, please select the button below and go to 'Create a Partner Account'. Then fill in the required information and the administrator will then authorize your access to the partner portal. Go To Partner Portal .partnerView { margin: 0 auto; max-width: 800px; } .partnerView ul { list-style: none; padding: 0 !important; } .partnerView ul li { float: left; margin: 0 12px 12px 0; list-style: none!important; } .partnerView h3 { clear: both; } .partnerView .btn2 { display: block; width: 200px; font-size: 12px; font-weight: bold; border: 1px solid #c9c9c9; background: #f9f9f9; text-align: center; height: 30px; line-height: 30px; text-decoration: none !important; margin: 0 auto 52px; } .partnerView .btn2 font { color: #222; }

    01/01/2016 About Fasoo 01/01/2016
  • Secure Your Files Shared with External Users

    An overview on Fasoo Secure Exchange. Business relationships require cooperation through partnerships, outsourcing, and collaboration with many different organizations. Sensitive files are shared outside of the company through email, cloud-based sharing services, FTP, and other portable media. The threat of unwanted information disclosure is real and the potential impact this makes on a company is devastating. The need for security measures for files shared with outside parties has become critical to an organization’s security plan. Fasoo Secure Exchange (FSE) lets you share your sensitive files securely through email, FTP, USB flash drives, the cloud and more When a file is shared externally, FSE ensures a secure exchange of information, which guarantees that files are shared with only the intended recipients. The sender can decide who can access sensitive files and what permissions they have for using them, such as View, Edit or Print. Persistent security remains in place and provides the sender with assurance that these files are secure. Even when files are unintentionally sent to the wrong parties, a sender can revoke future access to them. All actions are logged for future analysis providing peace of mind. “Our company has various business affiliates including construction, raw material, and steel. We have already implemented Fasoo’s solution at our subsidiaries to protect files created within our organization. When we receive orders from construction firms, we need to cooperate with our steel affiliate so it can deliver the necessary materials. We needed to protect our information when sharing between our affiliates because there is a high risk that sensitive information could be exposed to the wrong people. After applying the Fasoo security solution to files sent outside of the company, sharing and cooperation is more prevalent and secure between subsidiaries. Business efficiency has increased along with positive feedback from all affiliates.” -J Group Data Processing Team Leader-

    02/21/2016 Products/Solutions 02/21/2016
  • Intelligent Digital Document Platform

    An overview on Wrapsody. Every company faces constant challenges with managing the information that its employees generate. The ubiquity of devices and increasing availability of low cost storage encourage people to generate unprecedented numbers of copies of the files they create - many of which they don't even realize they are creating. To manage all this information, several tools exist: email, content management systems, file servers, cloud storage, enterprise messaging, social networks and many others. All of these can be valuable but they have limitations. Multiple versions of files proliferate throughout an organization, often without means of tracking them. Email messages are sent with file attachments that are not tracked and sometimes not properly saved on employees' devices. Multiple people will revise documents in parallel, leading to conflicts and lost changes. This makes it difficult to monitor how documents and document templates are used over time. Wrapsody improves productivity with document sharing and collaboration through a digital document ID technology Fasoo has introduced Wrapsody to address these issues. Wrapsody is based on a file-centric approach: it links files with metadata to enable automated content synchronization and version control management beyond repositories that employees may use inconsistently. As a platform, Wrapsody can expand its core functions flexibly into existing server systems such as ECM, Groupware, and ERP, in addition to PCs and mobile devices. The Wrapsody platform encourages document usage by users and allows managers to intelligently administer document related work through usage logs and analysis of the document content. 브로슈어제품 소개서구축 사례--> "We had trouble locating documents and had to search for the latest versions on different PCs, in email, cloud storage or on flash drives. After using Wrapsody, we could work on the latest customer response documents easily regardless of file location. We got instant feedback from colleagues helping us develop an ideal response.” -Principal Consultant- Try a 30-day FREE TRIAL today!

    05/04/2016 Products/Solutions 05/04/2016
  • Fasoo's Customers

    Here are some of our customers who have deployed our solutions Enterprise DRM Customers SPARROW Customers

    01/01/2016 About Fasoo 01/01/2016
  • Fasoo Support

    How can we help you? Fasoo provides a diverse range of support services to help you with Fasoo solutions and services wherever you are. Our experienced support staff and engineers deliver dependable and satisfactory service to meet your needs. We are here to help you. US Support (866) 311-6373 Global Support +82-2-300-9300 For further assistance please use our contact form here.

    03/22/2016 Support 03/22/2016
  • Visualize Risk of Your Data to Prevent Insider Threats

    An overview on Fasoo RiskView. The risk of insider threats exists in any company in any sizes. Security solutions cannot always rule out the insider threats, even though it can help lessen the probability to some extent. This is largely because it is difficult to detect insider threats, since insiders have legitimate access to data with intimate knowledge of security controls and methods to bypass them. Fasoo RiskView helps to prevent insider threats that are real, but difficult to detect Fasoo RiskView is a tool for security administrators that monitor activity related to unstructured data and user activities with confidential data. It gathers information from Fasoo Usage Tracer (the log analysis utility for Fasoo Enterprise DRM) and Fasoo eData Manager. It has APIs that can be configured to import log data from other security technology components, including firewalls, DLP, databases, and even physical security systems (e.g., entry/exit data from keycard or biometric systems) and employee attendance records. Fasoo RiskView includes a decision making framework that security administrators as well as business managers can use to review suspicious activities and after relevant investigations, in order to decide whether or not to take action to address these concerns with potential insider threats. Fasoo RiskView applies sophisticated rule-based modeling to the data sources mentioned above, to establish normal patterns of behavior and flag suspicious activities that indicate enough risk to merit concern and potential intervention by business management. The types of activities that Fasoo RiskView tracks include: Event anomalies, such as logins with user IDs of former employees, a given user logging in from multiple locations simultaneously, or unauthorized users retaining an excessive numbers of files containing sensitive data. File based risks, such as unauthorized users’ attempts to decrypt classified files. User based risks, such as users decrypting files more frequently than usual, printing more files than usual after regular business hours, or sending files to external recipients more than usual. “To put it simply, Fasoo RiskView enabled us, especially security administrators and line of business managers, to discover risks of data theft or loss that are assumed to exist but are unknown.” -CISO of International Business Law Firm-

    02/23/2016 Products/Solutions 02/23/2016
  • Discover and Classify to Understand Your Data

    An overview on Fasoo eDaa Manager. For an effective and efficient data security, organizations must define the scope of data to protect. However, it is not easy to understand all the target documents since the volume, location, filename extension, number of copies or security sensitiveness of target files are continuously changing. To properly understand the target files to enforce data security, organizations must discover and all unstructured data residing in endpoint devices and repositories, and classify and protect the files according to its own data security strategies. Understand your own data to set up your own data security policy with Fasoo eData Manager Fasoo eData Manager is an enterprise classification and security policy management tool that is complementary to Fasoo Enterprise DRM as well as valuable by itself. It scans files throughout the enterprise to find content that is confidential or of high value. It can scan files located within folders and logical drives on PCs – that is, it can scan files on file servers, cloud storage servers, repositories, and anything else that can be mounted as a logical drive or shared folder. The files that Fasoo eData Manager scans are those that match templates which specify criteria for files to be scanned. These include: Storage devices (fixed or portable), folders, or individual files. Filename extensions (file types, e.g. Microsoft Word documents, Excel spreadsheets, PDF). Pattern matching within file names or file content, as defined by keywords or regular expression matches Fasoo Enterprise DRM document classes Users and user groups Scans can be set up to take place periodically, (i.e daily, weekly, etc.). Fasoo eData Manager displays statistics on file characteristics that it gathers from scans, which include: Files that are unprotected, protected by Fasoo Enterprise DRM, or protected by Fasoo eData Manager encryption. Files whose names or contents contain matches to regular expressions or keywords, such as PII. File extensions (types) of interest, such as Microsoft Excel spreadsheets or PDFs. Files that have been distributed throughout the organization. Day-to-day variations in these statistics. ""With Fasoo eData Manager, managers and security administrators now have an adequate decision making process, to determine and respond to risks related to sensitive documents. -CIO of Nuclear Power Plant -

    02/23/2016 Products/Solutions 02/23/2016
  • Upgrade Your Data Security Policy through Intelligent Log Analysis

    An overview of Fasoo Usage Tracer. Setting up a perfect data security policy is almost impossible. This is why exceptional policies are so often adopted to balance productivity against security in any sort of policy enforcement settings. There is only one way to address this issue which is by having a flexible security policy management framework, where security policies can be continuously assessed and optimized through feedback from a comprehensive data usage log analysis. Fasoo Usage Tracer centrally monitors usage logs for all Fasoo-protected documents Fasoo Usage Tracer provides a centralized location for organizations to monitor, assess and optimize data security policies enforced by Fasoo Enterprise DRM, a suite of persistent data protection and control solutions, through usage log analysis. Organizations that have multiple Fasoo data-centric solutions in place can collect and analyze all data usage logs from those solutions in a centralized location on a real time basis. Usage logs include user information, access rights, IP address, security classification, file name, time and date. Not only will this be the one stop location to manage all data/user activity logs but will also offer a more convenient management experience. Pattern-based usage monitoring allows security administrators to enforce a set of rules to detect and monitor unusual file usage behaviors of targeted users and groups. Administrators can opt to get notifications whenever any violations of the rules are detected. This solution provides the ratios of provisional license issuing logs to the total licenses issuing logs and compares them between groups and against industry benchmarks. For example, the ratio of individual user groups helps determine which groups need more privileges or abuse provisional or exceptional licenses. The log analysis helps security administrators assess the efficiency and effectiveness of existing security policies. The solution offers organizations with a decision making tool to proactively optimize data-security policies against data security challenges. "Now we can monitor all file usage activities that we have under Fasoo’s solutions, and get commendations to set certain permissions for certain users. This all helps us to continue to keep our data secure.” -Financial Services Firm Chief Security Officer-

    02/10/2016 Products/Solutions 02/10/2016
  • Build Security into the Software

    An overview of SPARROW SAST. SPARROW SAST detects security weaknesses in source code with its semantic based static program analysis engine History has proven that defects, bugs and flaws in software have consistently been the leading cause of security vulnerabilities. If developers can pinpoint this insecure code and correct it before deployment, the chances of these security vulnerabilities causing problems can be reduced or eliminated. SPARROW SAST (Static Application Security Testing) tool not only detects security vulnerabilities through the best static analysis engine based on semantic and syntactic methods, it also follows a strict set of compliance requirements and follows CWE, OWASP, CERT and other international standards. SPARROW SAST applies the best technology to the most optimal diagnostic tool Uses the latest semantic based static analysis tool Provides both semantic and syntactic engines to increase detection for security vulnerabilities and decrease or eliminate the number of defects, bugs and flaws in software Meets compliance requirements and detects fatal errors identified by international standards for coding SPARROW SAST can help you defend against threats of cyber terrorism Cyber-attacks typically target network weaknesses causing organizations to protect themselves with firewalls, intrusion prevention systems, and similar tools. Current cyber-attacks target weaknesses in the software organizations develop and use. It is difficult to stop malware related attacks after software has been developed. SPARROW SAST lets you virtually eliminate these attacks before the software is developed by detecting all security vulnerabilities in the source code. Meeting secure coding compliance requirements Most organizations and regulations now demand that developers follow secure coding compliance requirements for software development. This is in reaction to major incidents of cyber terrorism all over the world. SPARROW SCE can detect security vulnerabilities in your software and meet the compliance regulations and requirements before releasing the software. SPARROW SAST also detects some of the top weaknesses identified by international standard organizations such as the CWC/SANS Top 25, OWASP Top 10, and CERT. Fasoo helps developers reduce or eliminate these coding errors before they are deployed. CWE/SANS Top 25 Most Dangerous Software Errors GO CERT Secure Coding GO OWASP Top 10 GO Reduce the amount of detection time and lower the cost of security vulnerabilities According to NIST, if organizations detect and remove security weaknesses before completing development, they can reduce a maximum of 30 times of the expense compared to finding and removing security weaknesses after development. The use of a semantic-based static analysis tool, such as SPARROW SAST, is the only way to detect all of these security weaknesses within the source code before it is released. Establishes a practice of making security a priority in software development When SPARROW SAST is applied to secure coding, you create a safe and efficient software development environment. Checking source code for security vulnerabilities at an early stage of development improves all areas of security for an organization, since it will use defect and error free software. [Source:]

    02/23/2015 Products/Solutions 02/23/2015
  • Management - Executives

    Hyeyeon Ahn--> COO, CMO, Senior Executive Vice President Hyeyeon Ahn is the COO, CMO, Executive Vice President and Head of the Business Strategy Division at Fasoo. She has more than 20 years of experience in the software industry including such companies as Samsung SDS and She also was awarded the 2014 ISLA Manager Professional for an Information Security Project Award, and previously has been recognized by the Women Information Technology & Science Association of Korea as well as Korea's Ministry of Information and Communication as one of the 100 experts on international IT standards She holds a B.S. and M.S. in Mathematics from Ewha Women’s University, and a Ph.D. in Computer Engineering from the University of Massachusetts. Seuk Soo Sung CTO, Senior Executive Vice President Seuk Soo Sung is the CTO, Senior Executive Vice President and Head of the Development Assurance Division at Fasoo. He oversees all aspects of product development, technology, and quality assurance. He has more than 20 years of experience in the software industry including ETRI (Korean Electronics & Telecommunications Institute), QNIX Computers and Microsoft Korea. During his time at Microsoft Korea, he led the efforts to meet the needs of customers by adding new features such as electronic payment, printing labels, research features and more to the Hangul Office 2007 system He holds a B.S. in Electronic Engineer from Kyungpook National University and M.S. in Computer Science from the Korea Advanced Institute of Science and Technology (KAIST). Jeesoo Lee--> CFO, Executive Director Jeesoo Lee is the CFO and Executive Director of the Management Support Division at Fasoo. Her previous experiences most notably are working at Samsung SDS in their Strategy Planning Team. Under her tenure at Fasoo, she has most notably led the process for Fasoo becoming a publicly traded company in Korea in October of 2013. She holds a B.S. in Mathematical Education from Seoul National University and M.S. from the Korea Advanced Institute of Science and Technology (KAIST). Jaeha Kim--> Executive Director Jaeha Kim is the Executive Director of the Enterprise Content Management Division at Fasoo. Most notably oversees Fasoo's Wrapsody solution. His previous experiences most notably are working at the Samsung Advanced Institute of Technology as well as a Senior Researcher at Samsung SDS. He was also the CEO of Partec 21, which is a B2B eMarketplace company. He has previously held positions as the vice-chairman for The Korean Council for e-Biz Businessmen as well as the Korea Association of Electronic Commerce. He has also served on the Policy Advisory Committee for the Ministry of Commerce, Industry and Energy and received the Ministry of Trade, Industry and Energy Korean e-Biz achievement award in 2003. He holds a B.S. in Electronic Engineering from Hanyang University and a M.S. in Computer Engineering from the Korean Advanced Institute of Science and Technology (KAIST). Kangman Lee--> Executive Director Kangman Lee is the executive director responsible for global marketing. He has over 25 years’ experience in the software and high tech industry. He held various executive positions in TmaxSoft, the largest software vendor in Korea, where he was responsible for sales and marketing, strategic planning and overseas business development for the last 15 years. Prior to TmaxSoft, he worked for a Korean government agency titled KOTRA promoting Korea’s high tech products and inducing foreign direct investment in New York and Seoul. He also served as Chief Operating Officer for Intellian Systems. He wrote a book titled “Product Marketing for Software” in 2013 which had been referred to by many software marketers as a guidebook on marketing practices for software products in Korea. Kangman received his Master’s degree in Business Administration with a concentration in marketing from the University of Iowa. Bongho Kang--> Managing Director Bongho Kang is the Managing Director of the National Sales Division. His previous experiences most notably are working at Doosan Information & Communications in their Interpia Sales Department, Korea Link, Sysweb as a General Manager of Sales and Cnetia also as their General Manger of Sales. He holds a B.S. in Computer Science and Engineering from Hanyang University. Jongsin Choi Managing Director Jongsin Choi is the Managing Director of the Cloud Service Division at Fasoo. He mostly oversees Fasoo's DigitalPage, DigitalQuick and Folder Cryptor services. His previous experiences most notably are Samsung C&T and Fasoo (2000~2002). He was also the CEO of Barunson Creative, which publishes and distributes console games. He holds a B.S. in Textile Engineering from Hanyang University. Ilsoo Jang Managing Director Ilsoo Jang is the Managing Director of the Program Analysis Division at Fasoo. He most notably oversees Fasoo's SPARROW solution. His previous experiences most notably are working at Hyundai Information Technology Co., Ltd in their Presales Team. He holds a M.S. in Financial Management from Sogang University. .wrap .main .column.right .container.article .articleView .articleText { max-width: 800px; } .wrap .main .column.right .container.article .articleView .articleText div h3 strong span { font-size: 20px !important; color: #1F84BA; } .wrap .main .column.right .container.article .articleView .articleText > .text_div { float: left; width: 30%; margin-top: 36px; } .wrap .main .column.right .container.article .articleView .articleText > p.intro { width: 66%; margin: 12px 0 24px 4%; float: left; } @media all and (max-width: 767px) { .wrap .main .column.right .container.article .articleView .articleText > .text_div { width: 96%; margin: 12px 2%; } .wrap .main .column.right .container.article .articleView .articleText > p.intro { width: 96%; margin: 12px 2%; } }

    01/02/2016 About Fasoo 01/02/2016
  • Privacy and Terms

    Last Modified: Feb 2016 This Privacy Policy provides our policies and procedures for collecting, using, and disclosing your information. Users can access Fasoo services (the "Services") through applications on devices, through APIs, and through third-parties. A "Device" is any computer used to access the Services, including without limitation a desktop, laptop, mobile phone, tablet, or other consumer electronic device. This Privacy Policy governs your access of the Services, regardless of how you access it, and by using our Services you consent to the collection, transfer, processing, storage, disclosure and other uses described in this Privacy Policy. All of the different forms of data, content, and information described below are collectively referred to as "information". The Information We Collect and Store We may collect and store the following information when running the Services: Information You Provide to Fasoo When you register an account, we collect some personal information, such as your name, and email address. You may also ask us to import your contacts by giving us access to your third party services (for example, your email account). You may also provide us with your contacts' email addresses when sharing folders or files with them. We may also receive Personal Information (for example, your email address) through other users, for example if they have tried to share something with you. Lastly, you will provide your password for use of the Services. Automatically Collected Information We automatically receive certain types of information when you interact with our Web pages, services and communications. For example, it is standard for your Web browser to automatically send information to every Web site you visit, including ours. That information includes your computer's IP address, access times, your browser type and language, and referring Web site addresses. We may also collect information about the type of operating system you use, your account activity, and files and pages accessed or used by you. Log Data When you use the Services, we automatically record information from your Device, its software, and your activity using the Services. This may include the Device's Internet Protocol ("IP") address, browser type, the web page visited before you came to our website, information you search for on our website, locale preferences, identification numbers associated with your Devices, your mobile carrier, date and time stamps associated with transactions, system configuration information, metadata concerning your Files, and other interactions with the Services. We collect IP addresses to audit the use of our service. Although we automatically record your IP address, the actual IP address will not be shown on our website; instead, the general location of where the IP address is located will be shown. In addition, we do not share your IP address to any third parties. Use of Personal Information In general, we use your personal information to process your requests or transactions, to provide you with information or services you request, to inform you about other information, events, promotions, products or services we think will be of interest to you, to facilitate your use of, and our administration and operation of, the Web site and services and to otherwise serve you and our users. For example, we may use your personal information: · to request feedback and to enable us to develop, customize and improve the Web site and our publications, products and services; · to conduct marketing analysis, to send you surveys or newsletters, to contact you about services, products, activities, special events or offers from Fasoo or our partners and for other marketing, informational, product development and promotional purposes; · to send you a welcoming email and to contact you about your use of the Web site and services; · to respond to your emails, submissions, comments, requests or complaints; · to perform after-sales services; · to anticipate and resolve problems with our service; · to respond to customer support inquiries, for assistance with our product and service development; · and to inform you of updates to products and services from Fasoo that better meet your needs; · to store contacts you enter or upload into your contacts list for your private use and viewing; · to send emails to users you invite (and contacts you invite to become users) to collaborate and access your files; · to enable you to communicate, collaborate, and share files with users you designate; · to contact you if you win a contest; and · for other purposes about which we notify you. Service Providers, Business Partners and Others We may use certain trusted third party companies and individuals to help us provide, analyze, and improve the Service (including but not limited to data storage, maintenance services, database management, web analytics, payment processing, and improvement of the Service's features). These third parties may have access to your information only for purposes of performing these tasks on our behalf and under obligations similar to those in this Privacy Policy. Our Site includes links to other Web sites whose privacy practices may differ from those of Fasoo. If you submit personal information to any of those sites, your information is governed by their privacy statements. We encourage you to carefully read the privacy statement of any Web site you visit. Disclosure Your personal Information may be disclosed as we believe to be necessary or appropriate in order to: (a) comply with a law, regulation or compulsory legal request; (b) respond to requests from public and government authorities; (c) protect our rights and property; (d) allow us to pursue available remedies or limit the damages that we may sustain. Changes to This Policy We may change this Policy from time to time. If we make any changes to this Policy, we will change the "last updated" date above. If there are material changes to this Policy, we will notify you more directly. We encourage you to check this Policy whenever you use our Web sites and services to understand how your personal information is used. Fasoo Terms of Service Thank you for your interest in Fasoo! Please read these terms of service carefully (“Terms”) before using the Services. These Terms govern and apply to your access to and use of Fasoo (“we” or “our”) websites and services (the “Services”). By accessing or using our Services, you agree to be bound by all of the terms and conditions described in these Terms. If you are using the Services on behalf of an organization, you are agreeing to these Terms for that organization and promising that you have the authority to binda that organization to these terms. If you do not agree to all of these terms and conditions, do not use our Services. Acceptable Use Policy/User Conduct You agree that you are responsible for your own conduct and all conduct under your account, and all Content that is encrypted or decrypted by anyone using your Account Information with the Service and for any consequences arising as a result thereof. You agree that you shall not copy, sell, transfer, distribute, publish, or assign your license to our services in any format to any third party. You agree to use the Services only for purposes that are legal, proper and in accordance with these Terms of Service and any Separate Agreements, and all applicable laws and regulations in the relevant legal jurisdictions. You further agree not to: a. Probe, harm, disrupt, or attack any system, network, or the Services. b. interfere with or disrupt the Services or servers or networks connected to the Services, or disobey any requirements, procedures, policies or regulations of networks connected or applicable to the Services. c. Modify, translate, adapt, edit, copy, decompile, disassemble, or reverse engineer any software used or provided by Fasoo. d. Use the Services to encrypt or otherwise disguise any material that contains virus, worms, corrupted files, or any other similar software to interfere with or disrupt any user, host, or network. e. Send any unsolicited or unauthorized advertising, promotional materials, “junk mail,” “spam,” “chain letters,” “pyramid schemes” or any other form of solicitation f. Stalk, harass, abuse or threaten another person or company, or take any action invasive to another's privacy (by sharing, for example, another's photograph, address, email, phone number or any other contact information) without permission from such other person g. Impersonate or misrepresent your identity with any person or entity h. Promote or provide products or services other than your own without appropriate authorization i. Use the Services to encrypt any Content that you do not have a right to transmit under any law or under contractual or fiduciary relationships (such as inside information, proprietary and confidential information learned or disclosed as part of employment relationships or under nondisclosure agreements) j. Take any action that would be in violation of Fasoo's copyright, trademark, any code of conduct or other guidelines which may be applicable to the Services. k. Publish or share unlawful materials. l. Violate the law in any way. Notice We may send you communications or data regarding the Services, including but not limited to (i) notices about your use of the Services, including any notices concerning violations of use, (ii) updates, and (iii) promotional information and materials regarding our products and services, via electronic mail, posting on the website, or other reliable method. Ownership Our Apps and Services are protected by copyright, trademark, and other laws of the United States and foreign countries. Except as expressly provided in these Terms, we (or our licensors) exclusively own all right, title and interest in and to the Apps and the Services, including all associated intellectual property rights. You may not remove, alter or obscure any copyright, trademark, service mark or other proprietary rights notices incorporated in or accompanying the Apps or the Services, including in any Content. You acknowledge and agree that any feedback, comments or suggestions you may provide regarding the Apps or the Services (“Feedback”) will be the sole and exclusive property of Fasoo and you hereby irrevocably assign to us all of your right, title and interest in and to all Feedback. Modifications We reserve the right at any time and at our sole discretion to modify or discontinue, temporarily or permanently, the Services or any part thereof (including Software), with or without notice. You agree that we shall not be liable to you or to any third party for any modification, suspension or discontinuance of any part of the Services. In connection with any modification of the Services, Fasoo may automatically download and install software updates from time to time with the intention of improving, enhancing, repairing and/or further developing the Services, and you agree to permit Fasoo to deliver these to you (and you to receive them) as part of your use of the Services. Modifications to this agreement We reserve the right at any time and at our sole discretion to change, modify or otherwise alter these terms of service at any time. If a revision, in our sole discretion, is material we will notify you (for example via email to the email address associated with your account). Other changes may be posted to our blog or terms page, so please check those pages regularly. By continuing to access or use the Services after revisions become effective, you agree to be bound by the revised Terms. If you do not agree to the new terms, please stop using the Services. YOU EXPRESSLY UNDERSTAND AND AGREE THAT: a. YOUR USE OF THE SERVICES IS AT YOUR OWN RISK. THE SERVICES ARE PROVIDED “AS IS” AND “AS AVAILABLE” BASIS. TO THE MAXIMUM EXTENT PERMITTED BY LAW, FASOO EXPRESSLY DISCLAIMS ALL WARRANTIES AND CONDITIONS OF ANY KIND, WHETHER EXPRESS OR IMPLIED, INCLUDING, BUT NOT LIMITED TO THE IMPLIED WARRANTIES AND CONDITIONS OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NON-INFRINGEMENT. b. FASOO DOES NOT WARRANT THAT (i) THE SERVICES WILL MEET ALL OF YOUR REQUIREMENTS; (ii) THE SERVICES WILL BE UNINTERRUPTED, TIMELY OR ERROR-FREE; OR (iii) ERRORS IN THE SOFTWARE WILL BE CORRECTED. c. ANY CONFIDENTIAL DOCUMENTS THAT ARE DECRYPTED IS DONE AT YOUR OWN DISCRETION AND RISK AND THAT YOU WILL BE SOLELY RESPONSIBLE FOR ANY LOSS OR THEFT OF CONFIDENTIAL DOCUMENTS. d. NO ADVICE OR INFORMATION, WHETHER ORAL OR WRITTEN, OBTAINED BY YOU FROM FASOO OR THROUGH OR FROM THE SERVICES SHALL CREATE ANY WARRANTY NOT EXPRESSLY STATED IN THESE TERMS OF SERVICE. Limitations of Liability YOU EXPRESSLY UNDERSTAND AND AGREE THAT FASOO, ITS PARENT, SUBSIDIARIES, AFFILIATES AND LICENSORS, AND OUR AND THEIR RESPECTIVE OFFICERS, EMPLOYEES, AGENTS, SHALL NOT BE LIABLE TO YOU FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, CONSEQUENTIAL OR EXEMPLARY DAMAGES, INCLUDING BUT NOT LIMITED TO, DAMAGES FOR LOSS OF PROFITS, GOODWILL, USE, DATA, COVER OR OTHER INTANGIBLE LOSSES (EVEN IF FASOO HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES) RESULTING FROM: (i) THE USE OR THE INABILITY TO USE THE SERVICES; (ii) THE COST OF PROCUREMENT OF SUBSTITUTE GOODS AND SERVICES RESULTING FROM ANY GOODS, DATA, INFORMATION OR SERVICES PURCHASED OR OBTAINED OR MESSAGES RECEIVED OR TRANSACTIONS ENTERED INTO THROUGH OR FROM THE SERVICES; (iii) UNAUTHORIZED ACCESS TO OR THE LOSS, CORRUPTION OR ALTERATION OF YOUR TRANSMISSIONS, CONTENT OR DATA; (iv) STATEMENTS OR CONDUCT OF ANY THIRD PARTY ON OR USING THE SERVICES; (v) FASOO'S ACTIONS OR OMISSIONS IN RELIANCE UPON YOUR ACCOUNT INFORMATION AND ANY CHANGES THERETO OR NOTICES RECEIVED THEREFROM; (vi) YOUR FAILURE TO PROTECT THE CONFIDENTIALITY OF ANY PASSWORDS OR ACCESS RIGHTS TO YOUR ACCOUNT INFORMATION; (vii) THE ACTS OR OMISSIONS OF ANY THIRD PARTY USING THE SERVICES; (viii) ANY ADVERTISING CONTENT OR YOUR PURCHASE OR USE OF ANY ADVERTISED PRODUCT OR SERVICE; (ix) THE TERMINATION OF YOUR ACCOUNT IN ACCORDANCE WITH THE TERMS OF THESE TERMS OF SERVICE; OR (x) ANY OTHER MATTER RELATING TO THE SERVICES. NOTHING IN THIS AGREEMENT IS INTENDED TO EXCLUDE OR LIMIT ANY CONDITION, WARRANTY, RIGHT OR LIABILITY WHICH MAY NOT BE LAWFULLY EXCLUDED OR LIMITED. SOME JURISDICTIONS DO NOT ALLOW THE EXCLUSION OF CERTAIN WARRANTIES OR CONDITIONS OR THE LIMITATION OR EXCLUSION OF LIABILITY FOR LOSS OR DAMAGE CAUSED BY NEGLIGENCE, BREACH OF CONTRACT OR BREACH OF IMPLIED TERMS, OR INCIDENTAL OR CONSEQUENTIAL DAMAGES. ACCORDINGLY, ONLY THOSE LIMITATIONS IN SECTIONS DISCLAIMER OF WARRANTIES AND LIMITATIONS OF LIABILITY WHICH ARE LAWFUL IN YOUR JURISDICTION (IF ANY) WILL APPLY TO YOU AND OUR LIABILITY WILL BE LIMITED TO THE MAXIMUM EXTENT PERMITTED BY LAW. Indemnification You agree to indemnify and hold Fasoo, its parent, subsidiaries, affiliates, officers, agents, employees, advertisers and partners harmless from and against any and all claims, liabilities, damages (actual and consequential), losses and expenses (including legal and other professional fees) arising from or in any way related to any third party claims relating to your use of any of the Services, any violation of these Terms of Service or any other actions connected with your use of the Services (including all actions taken under your account). In the event of such claim, we will provide notice of the claim, suit or action to the contact information we have for the account, provided that any failure to deliver such notice to you shall not eliminate or reduce your indemnification obligation hereunder. Termination You may discontinue your use of the Services at any time, for any or no reason and with or without notice. We also reserve the right to suspend or end the Services at any time, with or without cause, and with or without notice. For example, we may suspend or terminate your use if you are not complying with these Terms, or use the Services in any way that would cause us legal liability or disrupt others' use of the Services. If we suspend or terminate your use, we will try to let you know in advance and help you retrieve data, though there may be some cases (for example, repeatedly or flagrantly violating these Terms, a court order, or danger to other users) where we may suspend immediately. General Terms These Terms of Service constitute the entire agreement between you and Fasoo and governs your use of the Services, except, and then only to the extent that you have entered into a Separate Agreement. These Terms of Service, as in effect from time to time, supersedes any prior agreements or earlier versions of these Terms of Service between you and Fasoo for the use of the Services. If, through accessing or using the Services, you utilize or obtain any product or service from a third party, you may additionally be subject to such third party's terms and conditions applicable thereto, and these Terms of Service shall not affect your legal relationship with such third party. These Terms of Service and the relationship between you and Fasoo shall be governed by the laws of the Republic of Korea without regard to its conflict of law provisions. You and Fasoo agree to submit to the personal and exclusive jurisdiction of the courts located in Seoul, Korea. Notwithstanding this, you agree that Fasoo shall still be allowed to apply for injunctive remedies (or an equivalent type of urgent legal relief) in any applicable jurisdiction. You are also responsible for complying with all local laws, rules and regulations.

    01/01/2016 About Fasoo 01/01/2016
  • Site Map

    Products/Solutions Data Security Fasoo Data Security Framework Fasoo Enterprise DRM Fasoo Secure Node (FSN) Fasoo Secure Document (FSD) Fasoo Secure Exchange (FSE) Fasoo Secure Print (FSP) Fasoo Secure Document for IBM ECM Fasoo Secure Document for SharePoint Fasoo Secure Screen (FSS) Fasoo Usage Tracer Fasoo Mobile Gateway Fasoo View/Fasoo View Plus Data Discovery Fasoo eData Manager Risk Management Fasoo RiskView Print Security Fasoo Secure Print (FSP) Fasoo ePrint Mobile Security Fasoo Mobile Solution Fasoo Mobile Gateway Fasoo View/Fasoo View Plus Content Platform Fasoo eBook DRM Application Security SPARROW SPARROW SAST SPARROW QCE Digital Document Platform Wrapsody Cloud Service DigitalQuick Folder Cryptor DigitalPage Resources Brochures Videos Solutions Sheets Reports About Fasoo Overview CEO Fasoo North America Executives Careers Locations Customers Partners PR Announcements Fasoo in the Media Support Support .smTitle_h2 { display: inline-block; margin: 0 0 12px; height: 36px; line-height: 36px; padding: 0 8px; background: #f0a400; color: #fff; font-size: 15px; font-weight: bold; } .smTitle_h3 { color: #f0a400; font-size: 14px; padding: 0 0 0 18px !important; clear: both; font-weight: bold; margin: 0 0 18px !important; } .smTitle_h4 { padding: 0 0 0 40px !important; color: #2d93d5 !important; font-weight: bold; font-size: 14px; clear: both; margin: 0 0 5px !important; } .smTitle_h4 a { text-decoration: none !important; } .dep4 { color: #444444; font-size: 14px; font-weight: bold; clear: both; display: block; padding: 0 0 0 58px; margin: 0 0 0; } .dep4 a { color: #444444 !important; text-decoration: none !important; } .sm_ul { float: left; max-width: 300px; list-style: none !important; padding-right: 0 !important; margin: 0 0 16px !important; padding-left: 78px !important; } .sm_ul li { min-height: 18px; line-height: 18px; } .dep5 { color: #666; font-size: 13px; } .dep5 a { color: #555!important; text-decoration: none !important; } .fl { float: left; } .cb { clear: both; }

    01/01/2016 About Fasoo 01/01/2016
  • Protect Files Beyond the Boundaries of Content Repositories

    An oveview on Fasoo Secure Document. What happens when information leaves the repository? Information repositories are widely used to store and share data and documents. The security measures in these systems are insufficient to protect files outside of the repository. Once someone downloads files, they no longer retain any security controls. Organizations realize that investments in network security cannot prevent leaking of sensitive information by insiders, since they already have authorized access to that information. Fasoo Secure Document (FSD) persistently protects documents downloaded from information systems Fasoo ensures your documents remain secure no matter where they go after you download them. You are protected whether you use Microsoft SharePoint, IBM FileNet or any ECM, EDM, ERP or groupware system. To persistently protect the documents populated from central repositories, organizations need to extend the security of the repository to include files downloaded to end point devices. In addition, access to the downloaded files need to be dynamically enforced to reflect any changes on the repository ACL for ensuring continuous and consistent security. FSD integration with Microsoft SharePoint and IBM ECM is seamless and will provide the security you need when files containing sensitive information are downloaded from SharePoint or IBM ECM. “Our company shares sensitive research information and company assets stored in an information system and patent application system. Due to the sensitive nature of these files, it is extremely important that we prevent exposing this information to our competitors, as we will suffer heavy financial losses. We needed a security solution that could limit certain department’s access to specific files. For example, only allowing research departments access, and restricting access to the management support, planning, and other departments. With the addition of Fasoo’s solution we didn’t have to worry about information leaking and getting into the wrong hands.” -Research Institute IT Security Manager-

    02/10/2016 About Fasoo 02/10/2016
  • Management - Fasoo North America

    William Blake President of Fasoo, Inc. Bill Blake is the President and CCO of Fasoo, Inc. He has over 30 years of experience in business process re-engineering and IT system integration. Prior to working for Fasoo, he formed eDocument Sciences, LLC, which provided consulting services related to management and control of critical businesses information. Following a successful career with IBM, Bill built and managed a systems integration firm focused on document management within the banking, legal and government sectors. IKON Office Solutions acquired his company in 1997 as a part of its efforts to meet growing demand for comprehensive document lifecycle solutions. Bill was Vice President of Enterprise Consulting for IKON Office Solutions in Malvern, PA. During his tenure with IKON, Bill developed a formal methodology for the analysis and design of complex document management applications focused on identifying inefficiencies and improving workflows that reduce operating costs, while also targeting improved customer retention and overall productivity. He holds a B.S. in Business Administration from Canisius College. Ronald Arden Executive Vice President, COO of Fasoo, Inc. Ron Arden is the Executive Vice President and COO of Fasoo, Inc. He has 30 years of strategic planning, marketing, sales, business development, consulting and technical experience in the information technology industry. Prior to working for Fasoo, he was Vice President of Strategy and Marketing at eDocument Sciences, LLC where he drove document security, cloud and collaboration strategies and solutions. Prior to eDocument Sciences, Ron was Director of National Solutions Support for IKON Office Solutions where he developed, implemented and managed IKON’s channel program for its software and solutions partners. He also developed and launched repeatable solutions, which was a key to refocusing the company toward services. Ron has held executive, management and technical positions at numerous organizations, including IKON Office Solutions, Digital Equipment Corporation and Wang Laboratories. Throughout his career, Ron has participated in industry forums, speaking engagements and written articles for industry publications. He holds a B.S. in Electrical Engineering from the University of New Hampshire. TJ Kwon Vice President, CTO of Fasoo, Inc. Dr. TJ Taekjin Kwon is the Vice President and CTO of Fasoo, Inc. He has over 25 years of research and developmental experience in the field of computer networks and wireless systems. Prior to joining Fasoo, Dr. Kwon worked as a Senior Research Scientist in Applied Communication Sciences, formerly known as Telcordia Technologies and Bell Communication Research (Bellcore). He is the author of several high-impact publications which have been actively referenced in over 800 technical journals and conference papers. His publications include 7 US patents and a journal paper published in the proceedings of IEEE. Dr. Kwon has served as president of KOCSEA (Korean-American Computer Scientists and Engineers Association) and as executive committee member and Technical Group Director of KSEA (Korean-American Scientists and Engineers Association). He holds a B.S. (with Honors) and M.S. from Seoul National University. He also holds a Ph.D. in Computer Science from the University of California at Los Angeles. .wrap .main .column.right .container.article .articleView .articleText { max-width: 800px; }

    01/02/2016 About Fasoo 01/02/2016
  • Prevent and Deter Security Breaches Through Your Screen

    An oveview on Fasoo Secure Screen. Screen capture tools and the proliferation of high-quality digital cameras and smartphones make it easy for anyone to capture sensitive information displayed on a computer screen. With nothing preventing it, the likelihood of a major data breach from capturing this information on the screen is increasing. Some companies limit the possession of these devices or use different items to ensure that the camera lens are blocked, but it makes life inconvenient for employees. Fasoo Secure Screen protects sensitive information displayed on your screen To protect sensitive information displayed on screens being grabbed by screen capturing tools, hot keys and/or remote desktop/virtual desktop infrastructure applications, application-specific or document-specific screen capture control must be enforced. Fasoo Secure Screen blocks efforts to capture what is on the screen and provides specific information through a watermark that shows the screen’s location. Both of these security measures help to secure your screen from unwanted exposure to competitors and other unauthorized people. “Our hospital manages patients’ medical image records through EMR and PACS systems. They make it convenient for our doctors and nurses to treat patients, however the threat for exposure of MRI and x-ray images is a major concern for us because our employees can screen capture those images, or take photos of the screen with digital cameras or smartphones. After applying Fasoo’s secure screen solution to the hospital’s medical management system, restrictions on illegally exposing copies and distributing medical information can be deterred and prevented. With improvements to security of this new system, our employees have become more effective at their jobs.” -General Hospital B, Medical Data Processing Manager-

    02/20/2016 About Fasoo 02/20/2016
  • Careers

    We're looking for the person who possesses both vision and talent to lead Fasoo's future Even a common idea can become a great idea when composed with the right team and company. Innovation can’t be done alone. We believe that through the right cooperative atmosphere those ideas will have no limit in how far they go as well as how successful they will be. Fasoo is waiting for you to help us build a better outlook collectively for the future of data and application security. Collective Creativity Being able to compromise based on good communication and consideration for others. Being able to aim higher and learn more. It’s not the time to stop learning, it’s time to continue to develop your knowledge to become an expert. Integrity and having a positive mindset are the base of our professionals. We are looking for people who believe that it is not just ‘my vision’, it is ‘our vision’. Through ‘Collective Creativity’, this is what makes up the core of the company mentality. This is what Fasoo is looking for.

    01/01/2016 About Fasoo 01/01/2016
  • Deter Information Leaks from Printed Files

    An overview on Fasoo Secure Print. Printouts often become the source of information leaks. Prints of sensitive document are easily left unclaimed or unattended at printers, and this may lead into information breaches. To prevent this, the print information needs to be centrally recorded, so that the printed information can be traced as needed. Selectively adding the user information and the custom phrases to the prints of sensitive documents is also effective in alerting users’ awareness on security. Fasoo Secure Print (FSP) adds a watermark and the ability to trace information disclosure through printouts Fasoo increases the security of printing by helping to deter leaks of sensitive information from printouts. Each secure printout contains a watermark that can reveal the source of the printed document and can even capture an image of the actual printout for reference when auditing the source of a leak. Not only will this raise awareness of printing sensitive information, but can also reduce unnecessary expenses for excessive and unwarranted printing. "As part of the planning team at a steel firm, we print a lot of architectural CAD drawings to discuss and share ideas during internal meetings until the final design is developed. Although we collect all the printed materials after our meetings, we are still nervous that some of these printouts will be leaked to the client before it is finalized, or that these printouts are accidently lost and end up in the wrong hands. After integrating the Fasoo printing solution, we can now track who prints specific files, which increases attention on security of these printouts. We have also decreased unnecessary printing. All in all, this has deterred the chance of information being leaked intentionally or accidently by one of our employees.” -Steel Firm Planning Team Manager-

    01/04/2016 About Fasoo 01/04/2016
  • Secure Files Created and Used on Endpoints

    An overview on Fasoo Secure Node. Are you concerned about your files getting into the wrong hands? With conventional data security approaches, organizations may ensure documents are protected against external attacks but cannot when it comes to protecting them against insider threats. To protect documents against any malicious or careless users, documents must be protected and traced throughout the entire lifecycle, and the centralized security policy must travel with the docuemnts wherever they go, whether they are at rest, in use or in motion. Fasoo Secure Node (FSN) lets you secure sensitive files saved on your PC Even if files are lost or get into the wrong hands, unauthorized access is prevented and sensitive information is not exposed. Since files are automatically secured as they are saved, you can be assured that no one can access files leaked through any unauthorized disclosure to people inside or outside your organization. "Our internal Design team frequently creates CAD drawings and sends them to a third party for production. We take a laptop with the drawings to the production company and deliver them in person because we are afraid someone may leak these sensitive files to competitors. This helps prevent information from leaking, but there is still the issue of laptops being lost or stolen, and how to prevent someone else from accessing them. Now with Fasoo’s solution we are not concerned that sensitive CAD drawings will be lost or stolen and get into the wrong hands. Since the files are secured when saving them, we are confident about the security of our work, even if these files are exposed deliberately or by mistake to competitors.” -Heavy Industrial Machinery Corporation Design Leader-

    02/23/2016 About Fasoo 02/23/2016
  • Accurate and Efficient Quality Control for Software Development

    An overview of SPARROW QCE. SPARROW QCE uses a semantic based static program analysis tool to detect quality flaws in your software’s source code SPARROW QCE is necessary for software developers and quality assurance teams who want to reduce the cost of software errors. Detection of bugs in your source code that can produce critical quality defects must be analyzed and corrected before software development is completed. SPARROW QCE detects fatal quality defects during development with fewer false alarms. The process is less costly, more time efficient and a more rigorous analysis that provides you with quality and error free software. SPARROW QCE automatically analyzes your code and offers you a deep and accurate source code analysis at the early stages of program development without creating a separate test environment. SPARROW QCE can be used in various industries including government, financial services and any organization that builds embedded software to eliminate errors during development. SPARROW QCE is recognized by customers as a high quality tool for creating error free software. Who needs SPARROW

    02/03/2016 About Fasoo 02/03/2016
  • Protect Copyright of Your eBook and Securely Distribute

    An oveview on Fasoo eBook DRM. Starting from simply digitalizing contents on paper, eBook is steadily becoming the core element in the digital content industry; eBook has successfully extended its applications to novels, cartoons, catalogues, children contents, digital textbook, and many others by adding audio, video and interactive features and maximizing the user experience. However, because eBook is mainly distributed through the online network, there is a high chance of copyright infringement to occur through illegal replication, and this issue must be solved primarily to ensure the prosperity of the eBook market. Fasoo eBook DRM is the core solution in the eBook business that protects the copyright of eBook contents and ensures the prosperity of the eBook market As a DRM (Digital Rights Management) solution that follows eBook standards by the IDPF and consists of encryption and rights management bases, Fasoo eBook DRM is the core solution in the eBook business that protects the copyright of eBook contents and allows various business types, such as content sales and rentals. Some of the key benefits of Fasoo eBook DRM are as the only DRM (Digital Rights Management) solution that follows standards and security conditions of IDPF EPUB 2/3, the international standard eBook format, Fasoo eBook DRM protects the copyright of not only text-based eBook but also interactive eBook containing various multi-media. For the enhancement of security, we raised the reliability through adopting the cryptographic algorithm and key standards that satisfy the security recommendation (SP800-131) of the National Institute of Standards and Technology (NIST). Various platform types are supported, such as Windows based PC, iOS/Android based smartphones, and eBook readers. Fasoo eBook DRM is useful in extending business models through cross selling, B2C and B2B because it can simultaneously support various policy types, such as sales and rentals, and allows cross-compatibility among eBook services. In addition, cross selling among eBook service providers is supported. EPUB DRM technique of Fasoo has been selected as the standard eBook technique of South Korea, and Fasoo also participates in EPUB DRM international standardization of IDPF. Fasoo eBook DRM was adopted into eBook service of Kyobo Book Centre, the number one eBook provider, and Naver, the number one Korean search portal. "As the No.1 eBook service provider in Korea, we tried to adopt the safest and most robust technology for our complex business model and to support various devices from PC to mobile devices. Already being the top offline bookstore in Korea, by implementing Fasoo eBook DRM we were able to also lead the online eBook industry in providing secure online digital contents to our customers."

    02/04/2015 About Fasoo 02/04/2015
  • Extend File Based Security from Your PC to Your Mobile Device

    An overview on Fasoo Mobile Gateway. As enterprise mobility boosts the work efficiency by enabling "anywhere access" to business data, many organizations are allowing employees to access internal data on their corporate mobile devices. In a survey of nearly 2,100 IT employees in 2013, 93 percent use personal mobile devices for work. Mobile devices are becoming the tool of choice for many businesses as they offer a simpler user experience and easy access to information. Many organizations today are establishing BYOD programs that embrace employee-owned devices. Setting policies that separate business information from personal information is key to the security of sensitive files viewed on mobile devices. Not only are the risk of data leaks increasing since sensitive business information exists on lost mobile devices, but also because legitimate, unsupported apps, may unintentionally cause security risks for the company. Fasoo Mobile Gateway prevents data breaches while working on your mobile devices Fasoo Mobile Gateway extends secure file access to allow people to communicate and collaborate through smartphones and tablets. It provides businesses with the ability to persistently secure, control, and trace sensitive files on mobile devices. The information remains secure even if the device is lost or stolen. In conjunction with the Fasoo View and Fasoo View Plus apps, your information is securely extended from Fasoo DRM solutions on your PC to your mobile device. "Our company uses Fasoo’s PC and information system security solutions to prevent exposure of files with sensitive information to competitors. At the end of last year we were concerned with how to use these files safely and conveniently on mobile devices. After adding Fasoo’s mobile server to our existing DRM server, we could use those files securely and efficiently on our smartphones and tablets.” -Financial Securities Company C, Security Management Team Leader-

    02/04/2016 About Fasoo 02/04/2016
  • Extend and Reinforce Security to Share and Collaborate with IBM ECM Documents

    Organizations use IBM ECM to increase efficiency, improve control of information and reduce overall cost of information management. However, files are considered secure while they remain within a controlled boundary, but they cannot be controlled any more once they are legitimately downloaded to PCs. The downloaded documents can also be forwarded to unauthorized users, and thus can be read, saved and printed without restrictions. To avoid such issues, files should be persistently protected and continuously encrypted, whether in transit or in use throughout their entire lifecycle. Fasoo Secure Document for IBM ECM persistently protects your files downloaded from your ECM To persistently protect the files downloaded from IBM ECM, organizations need to extend the security of the repository to include files downloaded to end point devices. In addition, access to the downloaded files need to be dynamically enforced to reflect any changes on the repository ACL for ensuring continuous and consistent security. The integration of IBM ECM with Fasoo will extend IBM ECM security to content regardless of its location and provide enhanced access control for authorized users both inside and outside of the organization. Fasoo encrypts files downloaded from ECM repositories based on the users’ ECM permissions, or other metadata associated with them. The protected files maintain the security policy of the ECM system wherever they travel, and limit access privileges depending on users’ ECM permissions including View, Edit, Print and Screen Capture. All file activities are logged so an administrator has a full audit trail of the user, time and data of access and even the device they accessed the file on. FSD for IBM ECM is seamless and will provide the security you need when files containing sensitive information are downloaded from IBM ECM systems. "With increase in government regulations requiring that all customer documents and anything related to monetary transactions is controlled and audited, we needed to make sure that our files from our IBM ECM system were protected at all times. With these files containing very sensitive information such as personally identifiable information, it was paramount for us that we do everything in our power to prevent exposing this information. By integrating Fasoo Secure Document for IBM ECM, we didn’t have to worry about data breaches while sharing these files or not meeting government regulations.” -Bank IT Security Manager-

    02/03/2016 About Fasoo 02/03/2016
  • Reinforce Print Security and Help Reduce Costs

    An overview on Fasoo ePrint. The average employee prints about 10,000 pages a year and 17% of them are pages the employee did not intend to print. This not only leads to high printing costs but also to data breaches from printing sensitive information. Fasoo ePrint provides you with a safe and efficient printing environment With protective measures and cost cutting capabilities, Fasoo ePrint provides an effective yet secure print management solution. If Fasoo ePrint detects sensitive information in a document, a predefined policy can block printing. It controls and traces printed documents on your existing MFPs, so you can continue to use your current output devices. When used with Fasoo Enterprise DRM solutions, it extends the security area and provides stronger protection for personal information maintained within companies. "It is not uncommon to print yearly salary information as part of our daily routine in HR. Since my office is far from the printer and I worry that someone may steal this sensitive information, I intentionally wait until after work to print these documents. There was a time when I printed this kind of information and by the time I got to the printer, the printout was gone. After Fasoo ePrint was introduced into my company, I was able to go to the printer anytime I wanted and safely retrieve my documents. After authorizing myself with my smartphone application, I could print my document and retrieve it while standing in front of the printer. This assures me that this printed information will not fall into the wrong hands.” -Electronics Company HR Manager-

    02/05/2016 About Fasoo 02/05/2016
  • Classify and Manage Different Notes on Your Smartphone

    An overview on DigitalPage. With DigitalPage, on your smartphone, you are able to leave notes, schedules, or business ideas on page, anytime, anywhere. There is no need for Internet connection to access your pages. In order to organize yourself, you will be able to add names, phone numbers, photos, voice recordings or location as an “in-line tag”, and these tags are connected with apps with which you can do or what you want. It is also beneficial to link your pages that you would like to see together. DigitalPage then will recommend pages that you had linked together. You are free to add or remove these links among pages at any time. Enjoy a smart life with your intelligent lifelog by using DigitalPage. Find more information on DigitalPage

    02/18/2015 About Fasoo 02/18/2015
  • Extend and Reinforce Security to Share and Collaborate with Microsoft SharePoint Documents

    An overview of Fasoo Secure Document for SharePoint. Many organizations use Microsoft SharePoint to increase efficiency, improve control of information and reduce overall cost of information management. However, files are considered secure while they remain within SharePoint libraries, but these files can be legitimately downloaded to desktops, laptops and even mobile devices by authorized users, where they can be easily copied and forwarded somewhere else because it no longer retains any security controls. The documents can also now be read, saved and printed by any user without restrictions, thus the risk of data loss increases dramatically. To avoid such issues, files should be persistently protected and continuously encrypted, whether in transit or in use throughout their entire lifecycle. Fasoo Secure Document (FSD) for Microsoft SharePoint persistently protects your files downloaded from your ECM To persistently protect the files downloaded from SharePoint, organizations need to extend the SharePoint permission levels to include the documents downloaded. In addition, access to the downloaded documents need to be dynamically enforced to reflect any changes in SharePoint permission levels for ensuring continuous and consistent security. ECM allows organizations to share information and collaborate easily with colleagues, business partners and customers. ECM alone cannot provide persistent protection throughout the document lifecycle, since there is no way to track user and file activities of documents after they are downloaded. Fasoo Secure Document or FSD ensures files remain secure no matter where they go after users download them from the ECM system. FSD for Microsoft SharePoint gives enterprise complete control of how their content is being used once it leaves their direct control. The integration of Microsoft SharePoint with Fasoo will extend Microsoft SharePoint security to content regardless of its location and provide enhanced access control for authorized user both inside and outside of the organization. Fasoo encrypts files downloaded from ECM repositories based on the users’ ECM permission levels, or other metadata associated with them. The protected files maintain the security policy of the ECM system wherever they travel, and limit access privileges depending on users’ ECM permission levels including View, Edit, Print and Screen Capture. All file activities are logged so an administrator has a full audit trail of the user, time and data of access and even the device they accessed the file. FSD for Microsoft SharePoint is seamless and will provide the security you need when files containing sensitive information are downloaded from Microsoft SharePoint systems.

    02/18/2015 About Fasoo 02/18/2015