English Korean Japanese Partner Portal Contact Us Location

Most Recent

  • Marketing Tighter Security

    It is hard to turn on the news today and not see headlines about high profile security breaches targeting credit card companies and other financial institutions. These attacks result in compromised account information and unhappy, unnerved, customers. Every organization, regardless of size, will be subject to a cyberattack, and the recovery period will be more trying than discovering the actual security breach. In addition to theft of data, customer trust is compromised and the company name may be forever tarnished. It is critical that all financial institutions, from small and community banks to large international banks, be one step ahead of today’s threat environment when protecting what matters most to their customers: personally identifiable information and account information. For more about this article, please click the link below:

    11/29/2016 PR 11/29/2016
  • A New Approach to Document Management

    Organizations today still have a variety of issues and challenges managing documents. Many documents still remain unmanaged. Redundant copies can be found easily on servers and PCs. A lot of emails, messages and calls are exchanged just to find the right version of a file. Wrapsody is an enterprise grade platform that manages and integrates all your documents no matter where they are. Wrapsody is a performance enhancement solution that helps you to share documents efficiently, save resources eliminating redundancies and focus on your job. Wrapsody is a document security solution by design that prevents document breaches from the origin without compromising usability.

    11/28/2016 Resources 11/28/2016
  • Fasoo Solution Overview

    Lead Digital Fasoo provides strategic intelligence for digital business in the areas of data security, application security, digital document management and productivity. Data Security Fasoo Data Security Framework > FSD for ECM > eBook DRM > Cloud Service > Application Security Static Code Analysis > SPARROW on Cloud > Digital Document Platform Intelligent Digital Document Platform > Productivity Ultimate Memo Service > Collaborative Service > top Data Security Fasoo Data Security Framework FSD for ECM eBook DRM Cloud Service In this time in the digital era, data breaches are unstoppable because business data is freely distributed without any concern for internal/external corporate boundaries, through insider information disclosure and by APT attacks. Fasoo provides data-centric security to protect data as it travels both within the organizational perimeter and beyond by limiting access to sensitive data according to policies that cover both users and activities. .Fasoo Data Security Framework Fasoo Data Security Framework helps organizations discover, classify and protect sensitive data so that you control who can access it, regardless of location. It discovers and classifies sensitive files automatically and encrypts them as you create them on the desktop, localize them from databases or download them from information systems. Dynamic security policies travel with the files and apply permission controls that grant or deny users the right to View, Edit, Copy, Paste, Print or Decrypt the files. If any unauthorized user got access to the file, they could not read the information inside. Policy Enforcement - Document Security Fasoo Enterprise DRM (Digital Rights Management) is an award winning persistent data security solution for protecting, controlling and tracing data throughout the enterprise – including data at rest, data in use, and data in motion – according to predefined policies based on user, group or role, or dynamically binding existing access control lists of information systems to enable file-level permissions at all times. Fasoo Enterprise DRM has been deployed to over 1,200 organization enterprise-wide, securing more than 2.5 million users. When sharing and collaborating internally, FSN allows you to secure, control and track sensitive documents created and used on endpoints. When sharing and collaborating, FSD allows you to secure, control and track sensitive ECM, ERP, groupware and other related documents beyond its controlled boundaries. When collaborating with partners and customers, FSE allows you to secure, control and track sensitive documents shared with external users. - Mobile Security When using personal devices for work, Fasoo Mobile Solution secures your data itself and controls access to your server for complete BYOD security. - Print Security When printing your files, Fasoo ePrint allows you reinforce print security and detect personal information in a document and through pull printing, block printing based on a predefined policy. - Screen Security When displaying your files on your screen, FSS prevents and deters security breaches through your screen. - Policy Optimization When monitoring and analyzing your data, Fasoo Usage Tracer allows you to monitor and analyze user/file activities, and optimize existing security policies. Data Discovery - Discovery and Classification of Unstructured Data Fasoo eData Manager is a data governance solution for discovering and classifying the constantly changing set of unstructured data based on its association with people and other characteristics, showing the data’s security vulnerability and dynamically applying security policies on a continuous basis. Risk Management - Analysis and Visualization of Risk Fasoo RiskView is a risk assessment solution for monitoring and analyzing users and their activities in using both protected and unprotected files, determining normal levels of activity, and using sophisticated data analysis techniques to discover deviations that may indicate security risks. .FSD for ECM - Fasoo Secure Document for IBM ECM When extending security perimeter of your ECM, FSD for IBM ECM allows you to secure, control and track documents beyond controlled boundaries of IBM ECM. - Fasoo Secure Document for SharePoint When extending security perimeter of your ECM, FSD for SharePoint allows you to secure, control and track documents beyond controlled boundaries of SharePoint. .eBook DRM When distributing eBook content, Fasoo eBook DRM protects the copyright of eBook contents and securely allows you to distribute them to your customers. .Cloud Service Folder Cryptor offers a robust cloud security service that automatically encrypts files before they are uploaded into secure folders. top Application Security Application today build up the life of business, however, more than ever they are under constant attack. This is a new frontier for hackers. Rather than attacking perimeter security defenses, like firewalls and end point encryption applications, the hackers are getting developers to embed security vulnerabilities in their code. Fasoo provides a semantic-based static code analysis tool that can be deployed from the early stages of the SDLC (Software Development Life Cycle) to help identify and remediate software vulnerabilities. - Static Code Analysis SPARROW is a static code analysis tool that detects critical software vulnerabilities at the early stages of software development. SPARROW analyzes source code with a robust static analysis engine that uses a deep semantic method to find vulnerabilities, and provide analysis results that differentiates us from other tools. - Static Application Security Testing(SAST) SPARROW SAST (Static Application Security Testing) tool provides developers and security managers with the ability to accurately identify security vulnerabilities, remediate these flaws through code suggestions. - Static Code Analysis SPARROW QCE enables developers, quality testers and managers to analyze all possible paths of a program and identify quality defects in the very early stages of software development. SPARROW QCE provides accurate and efficient quality control for software development. - Cloud Service SPARROW on the Cloud cost effective application security testing cloud service that provides users with a source code analysis tool that detects potential security vulnerabilities in your software. top Digital Document Platform Every company faces constant challenges with managing the information that its employees generate. The ubiquity of devices and increasing availability of low cost storage encourage people to generate unprecedented numbers of copies of the files they create – many of which they don’t even realize they are creating. Fasoo has introduced Wrapsody, a new approach to content management. - Intelligent Digital Document Platform Wrapsody improves productivity with document sharing and collaboration through a digital document ID technology, which enables the same document to be automatically updated and synced. The Wrapsody platform can expand it’s flexibility through it’s core functions such as having full version control of their files (Spot Version Control) and always having the latest version of the file (On-Demand Sync) to cover document storage, management and distribution systems in addition to PC and mobile devices. The Wrapsody platform motivates document usage by users and document related work management for managers intelligently, through usage logs and analysis of the document content. top Productivity Fasoo provides cloud and mobile services that lets you secure, store data and manage different notes. - Ultimate Memo Service DigitalPage is an application that allows you to classify and manage different notes, schedules or business ideas by writing, tagging and linking pages on your mobile device. - Collaborative Service DigitalQuick is a cloud storage service for efficient collaboration that allows you to keep your documents up-to-date and manage updated history. .overviewWrap .tit1 {padding-left:35px; margin-bottom:10px; background:url('') 0 50% no-repeat; font-size:24px; font-weight:bold; letter-spacing:-2px; color:#444;} .overviewWrap .tit1.bul2 {background:url('') 0 50% no-repeat; } .overviewWrap .tit1.bul3 {background:url('') 0 50% no-repeat; } .overviewWrap .tit1.bul4 {background:url('') 0 50% no-repeat; } .overviewWrap .tit1.bul5 {background:url('') 0 50% no-repeat; } .overviewWrap .tit1 span {padding-left:4px; font-size:17px; font-weight:100; vertical-align:baseline; letter-spacing:0;} .overviewWrap .tit2 {position:relative; margin:0 0 8px; font-size:34px; font-weight:bold; letter-spacing:-0.05em; color:#000;} .overviewWrap {margin-top:20px; font-size:40px; color:#0782C1 !important;} .overviewWrap .tit2 a {text-decoration:none !important; } .overviewWrap .tit3 {margin:0 0 20px; padding-left:22px; background:url('') 0 50% no-repeat; font-size:23px; font-weight:bold; color:#000;} .overBlock {position:relative; padding-top:60px; border-top:1px solid #bfbfbf;} .overBlock {position:absolute; top:-1px; right:0; width:40px; height:40px; background:url('') no-repeat; text-indent:-999em;} .overBlock .focusIdx {position:absolute; top:-108px;} .overBlock .focusIdxSub {position:absolute; top:-128px; width:0; height:0; overflow:hidden; color:transparent;} .overviewTab {width:100%; margin:20px 0 0 0; padding:0; overflow:hidden;} .overviewTab li {list-style:none; float:left; margin-left:20px; margin-right:40px; margin-bottom:15px; text-align:center;} .overviewTab li a {height:36px; font-size:12px; font-weight:bold; color:#000 !important; text-decoration:none !important; line-height:33px; box-sizing:border-box;} .overviewTab li a:hover, .overviewTab li a:active, .overviewTab li a.current {border-bottom:3px solid #1f83b8; color:#0782C1 !important;} .overviewWrap .subCon {width:790px; max-weight:100%; margin-left:63px;} .overviewWrap .subCon > dl {margin:0 0 60px; padding-left:25px;} .overviewWrap .subCon dl dt a {vertical-align:-10px; margin-right:5px;} .overviewWrap .subCon dl dt a .blue {color:#0782C1 !important;} .overviewWrap .subCon dl dt a .green {color:#71b253 !important;} .overviewWrap .subCon dl dd {margin:0 0 20px;} .overviewWrap .subCon dl dl:first-child{margin-top:16px;} .overviewWrap .subCon dl dl {margin-bottom:2px; padding-left:70px; overflow:hidden;} .overviewWrap .subCon dl dl dt {float:left; width:78px; line-height:40px;} .overviewWrap .subCon dl dl dd {float:left; width:calc(100% - 78px); line-height:20px;} .overviewWrap .subCon dl dl dd:last-child {margin:0;} .overviewWrap .subCon .small {font-size: 0.6em; letter-spacing: -0.03em;} .overviewWrap .overDl {padding:0;margin:40px 0 70px;} .overviewWrap .overDl dt {position:relative; padding:0;margin:0 0 4px 0 ;} .overviewWrap .overDl dt a {vertical-align:middle;} .overviewWrap .overDl dt span {display:inline-block; padding-bottom:15px; margin-left:10px; vertical-align:bottom;} .overviewWrap .overDl dd {padding:0;margin:0 0 26px 0;} .overviewWrap .overDl2 {padding:0 0 0 80px;margin:32px 0 65px;} .overview_menu {position:relative; width:736px; height:478px; margin:40px auto 70px; background:url('') 0 25px no-repeat;} .overview_menu ul {list-style:none; padding:0; margin:0;} .overview_menu ul > li > a {position:absolute; font-size:17px; color:#555 !important; text-decoration:none !important; line-height:1.3em;} .overview_menu ul > li > a strong {font-size:25px; letter-spacing:-0.03em; line-height:1.2em;} .overview_menu > ul > li > a:after {display:inline-block; content:''; width:16px; height:20px; margin:0 0 3px 8px; background:url('images/bul_menu_1.png') no-repeat; vertical-align:bottom;} .overview_menu ul > li > ul {position:absolute; min-width:190px;} .overview_menu ul > li > ul a {position:static; display:block !important; font-size:12px; color:#444 !important; text-decoration:none !important; line-height:18px; text-align:left;} .overview_menu .menu1 > a {top:-3px; left:135px;} .overview_menu .menu1 > a strong {color:#1f83b8 !important;} .overview_menu .menu1 > a:after {background:url('images/bul_menu_1.png') no-repeat;} .overview_menu .menu2 > a {top:-3px; left:535px;} .overview_menu .menu2 > a strong {color:#003778 !important;} .overview_menu .menu2 > a:after {background:url('images/bul_menu_2.png') no-repeat;} .overview_menu .menu3 > a {top:342px; left:130px;} .overview_menu .menu3 > a strong {color:#99e01e !important;} .overview_menu .menu3 > a:after {background:url('images/bul_menu_3.png') no-repeat;} .overview_menu .menu5 > a {top:372px; left:540px;} .overview_menu .menu5 > a strong {color:#37255c !important;} .overview_menu .menu5 > a:after {background:url('images/bul_menu_5.png') no-repeat;} .overview_menu .sub1 {bottom:312px; left:0px;} .overview_menu .sub2 {bottom:312px; left:615px;} .overview_menu .sub3 {bottom:7px; left:60px;} .overview_menu .sub5 {bottom:7px; left:573px;} .overviewImg {margin-bottom:30px;} @media all and (max-width:850px){ .overview_menu {width:320px; height:210px; background:url('') 50% 15px no-repeat; background-size:320px 200px;} .overview_menu ul > li > a {width:80px; font-size:9px; color:#555 !important; line-height:1.3em;} .overview_menu ul > li > a strong {font-size:12px; letter-spacing:-0.5px; line-height:1.5em;} .overview_menu > ul > li > a:after {width:8px; height:10px; margin:0 0 2px 2px; background-size:8px 10px !important;} .overview_menu ul > li > ul {display:none;} .overview_menu .menu1 > a {top:0px; left:25px;} .overview_menu .menu2 > a {top:0px; left:228px;} .overview_menu .menu3 > a {top:150px; left:15px;} .overview_menu .menu5 > a {top:167px; left:248px;} .overBlock .focusIdx {position:absolute; top:-126px;} .overBlock .focusIdxSub {top:-136px;} .overviewTab {margin:10px 0;} .overviewTab li a {height:21px; line-height:18px;} } @media all and (max-width:780px){ .overviewWrap .subCon {margin-left:0;} } @media all and (max-width:450px){ .overBlock {padding-top:40px;} .overBlock {width:20px; height:20px; background-size:20px 20px;} .overviewWrap .tit1 {padding-left:18px; font-size:18px; background-position:0 6px !important; background-size:14px 14px !important;} .overviewWrap .tit2, .overviewWrap {font-size:20px;} .overviewWrap .tit3 {padding-left:13px; font-size:17px; background-size:6px 6px;} .overviewWrap .subCon dl dt a {vertical-align:-3px;} .main .wrap .column.right .container.article .articleView .articleText .overviewWrap .subCon dl dt a img {height:16px !important;} .overviewWrap .subCon > dl {padding-left:15px;} .overviewWrap .subCon dl dl {padding-left:20px; margin-bottom:30px;} .overviewWrap .subCon dl dl dt {width:50px;} .overviewWrap .subCon dl dl dd {width:calc(100% - 50px);} .overviewWrap .overview_1_1 {width:136px;} .overviewWrap .overview_2_1 {width:112px;} .overviewWrap .overview_2_2, .overviewWrap .overview_2_3 {width:87px;} .overviewWrap .overview_2_4 {width:125px;} .overviewWrap .overview_3_1 {width:149px;} .overviewWrap .overview_4_1 {width:148px;} .overviewWrap .overview_5_1, .overviewWrap .overview_5_2 {width:153px;} .overviewTab li, .overviewTab li:first-child, .overviewTab li:last-child {margin-bottom:8px;} .overviewTab li a {height:20px; line-height:17px;} .overviewWrap .overDl {margin-bottom:40px;} .overviewWrap .overDl dt span {padding-bottom:5px; font-size:12px;} .overviewWrap .overDl2 {padding-left:40px;} .overview_menu {width:290px; height:150px; margin:20px auto 30px; background-position:50% 8px; background-size:210px auto;} .overview_menu ul > li > a {width:100px; font-size:9px; color:#555 !important; line-height:1.3em;} .overview_menu ul > li > a strong {font-size:10px; letter-spacing:-0.5px; line-height:1.5em;} .overview_menu .menu1 > a {top:-8px; left:25px;} .overview_menu .menu2 > a {top:-8px; left:200px;} .overview_menu .menu3 > a {top:95px; left:18px;} .overview_menu .menu5 > a {top:100px; left:205px;} }

    04/20/2016 Products/Solutions 04/20/2016
  • Taking a Data-Centric Approach to Today’s Security Landscape

    Taking a Data-Centric Approach to Today’s Security Landscape Today’s security landscape continues to evolve, as yesterday’s security protocols are simply not up to par with the advanced threats that organizations are facing on a regular basis. Even the most amateur cybercriminal can carry out an attack with the result being the acquisition of an organizations’ high valued information, leaving an expensive remediation path in its midst. So, just how prepared are you? To read more about this article from IPWatchdog, please click on the link below:

    11/15/2016 PR 11/15/2016
  • Protect Scanned Data with Fasoo Enterprise DRM

    How many of you face challenges to protect customer personally identifiable information (PII) from exposure to unauthorized internal and external personnel? Fasoo Enterprise DRM (Digital Rights Management) protects PII (personally identifiable information) gathered from multi-function devices and limits file access to authorized users. Some of the benefits provided by this solution are streamline business process and reduce risk of data breaches, protect all customer PII from unauthorized access and meet strict security requirements to protect customer data at rest, in motion and in use.

    08/09/2016 Resources 08/09/2016
  • New Way to Share, Secure and Manage Your Documents

    Fasoo has introduced Wrapsody, a new approach to content management, to address these issues. Wrapsody is based on a file-centric approach: it links files with metadata to enable automated content synchronization and version control management beyond repositories, and to identify files wherever they reside rather than only being available within repositories that employees may use inconsistently. Wrapsody ensures that all authorized users always have access to the latest versions of files. It puts sophisticated control over versioning, metadata tags, and workflows directly into the hands of users in addition to administrators. It provides an enterprise-wide view of document usage and modification history that helps companies to understand how information flows throughout their organizations. This white paper describes Wrapsody, its features, functions, and technical specifications. It also discusses how Wrapsody differs from and complements other information management technologies, and presents typical use cases that other solutions don’t address. To read the rest of this article, please click on the attachment above. For further information or a free trial, please go to

    10/15/2016 Resources 10/15/2016
  • Work Smart with Wrapsody

    Work Smart with Wrapsody Experience a new way to share, secure and manage documents with Wrapsody. Wrapsody helps to locate documents quickly through different approaches, offers document usage in real time and provides intelligent analytics about people's performance related to documents. With each Wrapsody document carrying a unique document ID and version number, providing APIs to interconnect all documents that reside in the silos of document management systems and collecting real usage log of documents no matter where they are, this intelligent digital document platform provides everything you need in the world today. More and better collaboration, increasing your digital assets and document security by design all provide the necessities to meet the challenges we face today in document management.

    10/25/2016 Resources 10/25/2016
  • It's Time to Take Action, Safeguard Devices and Protect Personal Information

    Fight Cybercrime During National Cyber Security Awareness Month: It's Time to Take Action, Safeguard Devices and Protect Personal Information The National Cyber Security Alliance reminds consumers and businesses to learn about preventing and recovering from tech support scams, identity theft, ransomware attacks and a variety of other cyber threats. Closing the Threat Gap: Executive Perspectives on the Cybersecurity Landscape, Wednesday, Oct. 26, 3:30-6:00 p.m. (EDT), Stevens Institute of Technology, Hoboken, NJ: Fasoo is partnering with NCSA, the New Jersey Technology Council and the Stevens Institute of Technology to host an event featuring keynote speakers Dr. Larry Ponemon, chairman of the Ponemon Institute, and Mark Lobel, U.S. and global practice leader in PricewaterhouseCoopers' Cyber Security and Privacy Practice. The keynotes will be followed by a panel discussion monitored by Dr. Paul Rohmeyer, associate professor of information security management and risk assessment. Learn more and register here. To read the rest of the article from PR Newswire, please select the link below:

    10/17/2016 PR 10/17/2016
  • Intelligent Digital Document Platform

    An overview on Wrapsody. Every company faces constant challenges with managing the information that its employees generate. The ubiquity of devices and increasing availability of low cost storage encourage people to generate unprecedented numbers of copies of the files they create - many of which they don't even realize they are creating. To manage all this information, several tools exist: email, content management systems, file servers, cloud storage, enterprise messaging, social networks and many others. All of these can be valuable but they have limitations. Multiple versions of files proliferate throughout an organization, often without means of tracking them. Email messages are sent with file attachments that are not tracked and sometimes not properly saved on employees' devices. Multiple people will revise documents in parallel, leading to conflicts and lost changes. This makes it difficult to monitor how documents and document templates are used over time. Wrapsody improves productivity with document sharing and collaboration through a digital document ID technology Fasoo has introduced Wrapsody to address these issues. Wrapsody is based on a file-centric approach: it links files with metadata to enable automated content synchronization and version control management beyond repositories that employees may use inconsistently. As a platform, Wrapsody can expand its core functions flexibly into existing server systems such as ECM, Groupware, and ERP, in addition to PCs and mobile devices. The Wrapsody platform encourages document usage by users and allows managers to intelligently administer document related work through usage logs and analysis of the document content. 브로슈어제품 소개서구축 사례--> "We had trouble locating documents and had to search for the latest versions on different PCs, in email, cloud storage or on flash drives. After using Wrapsody, we could work on the latest customer response documents easily regardless of file location. We got instant feedback from colleagues helping us develop an ideal response.” -Principal Consultant- Try a 30-day FREE TRIAL today!

    05/04/2016 Products/Solutions 05/04/2016
  • Wrapsody Brochure

    Wrapsody is an enterprise grade platform that manages and integrates all your documents no matter where they are.

    05/09/2016 Resources 05/09/2016
  • Wrapsody Use Cases

    These number of real life use cases explain how Wrapsody can provide a new way to share, secure and manage documents. Work smart with Wrapsody, the intelligent digital document platform.

    05/20/2016 Resources 05/20/2016
  • The Security Blueprint for Your Data

    An overview on Fasoo's Data Security Framework. The Fasoo data security framework consists of a three-tiered suite of solutions to strengthen information security. The Fasoo Enterprise DRM (FED) suite plays a pivotal role to enforce security policy on data among three layers of data protection. At the front-end, Fasoo eData Manager discovers and classifies the data, reapply policy to the data unprotected due to policy exceptions and exclusions. At the back-end, Fasoo RiskView enables organizations to manage risks holistically by collecting and analyzing logs of data usage and various sources that can be useful. This multi-layered approach enhances and completes an organization's security framework.

    02/25/2016 Products/Solutions 02/25/2016
  • Persistent Data Security Solution for Any Business Environment

    An overview on Fasoo Enterprise DRM. How secure are your files? What would happen to your business if a file with sensitive information were to leave your organization? Can you afford not to have the best protection solutions? Fasoo Enterprise DRM (Digital Rights Management) protects the file itself to provide a more secure work environment. Fasoo Enterprise DRM is a file-based security solution that prevents the exposure of sensitive and confidential files by trusted insiders, business partners, customers and unauthorized people. Here is the problem with traditional content management systems: People can easily access sensitive business information from mobile, cloud or virtual environments. This allows us to communicate and collaborate more conveniently, but increases the risk of losing our trade secrets, classified documents and PII (Personally Identifiable Information) with just one click. Against these threats, file-based security such as information rights management is the best solution to protect you from information leaks. Documents are secure while they remain in a controlled boundary, like a content management system. DLP (Data Loss Prevention), firewalls, intrusion detection and intrusion prevention systems can protect information from outside attacks or potentially stop sensitive information from leaving an organization. These solutions can’t stop everything and increase the complexity of the network infrastructure. Authorized people inside your organization can send out sensitive information by mistake or deliberately. That information is no longer secure once it leaves your organization. Persistent File-based Security for Any Business Environment Fasoo Enterprise DRM protects, controls, and traces sensitive files containing intellectual property, trade secrets, PII, and more. It maintains file protection and prevents unintended information disclosure no matter where it is. In contrast with conventional security solutions, Fasoo Enterprise DRM protects information itself persistently whether it is stored, being used, being transmitted, or even after transmission, throughout the entire document lifecycle. This is the only complete and effective solution that protects you against unwanted information leaks from anyone. Fasoo Enterprise DRM uses an encryption in their solutions that is certified from Korea's National Intelligence Service (NIS), to protect and manage sensitive documents in any environment whether it is saved to a PC, downloaded from a server, printed, or sent by email. Fasoo Enterprise DRM is an essential security infrastructure component for every enterprise application system as mobile and cloud computing diversify and expand the enterprise IT environment. With Fasoo Enterprise DRM, organizations can safely share confidential documents internally and externally, freeing themselves of any concern about unintended information loss. Fasoo Enterprise DRM Key Facts Global leader in enterprise DRM First company in the world to commercialize DRM as a product World’s largest enterprise DRM customer base Fasoo is the only company that has developed and equipped their encryption module “Fasoo Crypto Framework” with a National Intelligence Service certified encryption technology Supports any environment where files are distributed Can be integrated with information systems such as ECM, ERP, PLM and more Extend security to mobile and cloud environments Deployed to more than 1,100 organizations, with over 2 million users around the world In 2014, Fasoo was awarded as a winner in the Security Products and Solutions for Enterprise (Large) category at Info Security Products Guide's Golbal Excellence Awards In 2011, Fasoo was awarded with the ‘2011 Global Digital Rights Management Competitive Strategy Innovation of the Year’ from global research and consulting company, Frost and Sullivan In 2010, Fasoo was referenced as one of the “Global Top 6 DRM Companies” in an Aberdeen Group Report In 2010, Fasoo was the only Asian company to be referred as one of the “Global Enterprise DRM Top 7 Vendors’ from world renowned global research & consulting company, Gartner.

    02/02/2016 Products/Solutions 02/02/2016
  • Build Security into the Software

    An overview of SPARROW SAST. SPARROW SAST detects security weaknesses in source code with its semantic based static program analysis engine History has proven that defects, bugs and flaws in software have consistently been the leading cause of security vulnerabilities. If developers can pinpoint this insecure code and correct it before deployment, the chances of these security vulnerabilities causing problems can be reduced or eliminated. SPARROW SAST (Static Application Security Testing) tool not only detects security vulnerabilities through the best static analysis engine based on semantic and syntactic methods, it also follows a strict set of compliance requirements and follows CWE, OWASP, CERT and other international standards. SPARROW SAST applies the best technology to the most optimal diagnostic tool Uses the latest semantic based static analysis tool Provides both semantic and syntactic engines to increase detection for security vulnerabilities and decrease or eliminate the number of defects, bugs and flaws in software Meets compliance requirements and detects fatal errors identified by international standards for coding SPARROW SAST can help you defend against threats of cyber terrorism Cyber-attacks typically target network weaknesses causing organizations to protect themselves with firewalls, intrusion prevention systems, and similar tools. Current cyber-attacks target weaknesses in the software organizations develop and use. It is difficult to stop malware related attacks after software has been developed. SPARROW SAST lets you virtually eliminate these attacks before the software is developed by detecting all security vulnerabilities in the source code. Meeting secure coding compliance requirements Most organizations and regulations now demand that developers follow secure coding compliance requirements for software development. This is in reaction to major incidents of cyber terrorism all over the world. SPARROW SCE can detect security vulnerabilities in your software and meet the compliance regulations and requirements before releasing the software. SPARROW SAST also detects some of the top weaknesses identified by international standard organizations such as the CWC/SANS Top 25, OWASP Top 10, and CERT. Fasoo helps developers reduce or eliminate these coding errors before they are deployed. CWE/SANS Top 25 Most Dangerous Software Errors GO CERT Secure Coding GO OWASP Top 10 GO Reduce the amount of detection time and lower the cost of security vulnerabilities According to NIST, if organizations detect and remove security weaknesses before completing development, they can reduce a maximum of 30 times of the expense compared to finding and removing security weaknesses after development. The use of a semantic-based static analysis tool, such as SPARROW SAST, is the only way to detect all of these security weaknesses within the source code before it is released. Establishes a practice of making security a priority in software development When SPARROW SAST is applied to secure coding, you create a safe and efficient software development environment. Checking source code for security vulnerabilities at an early stage of development improves all areas of security for an organization, since it will use defect and error free software. [Source:]

    02/23/2015 Products/Solutions 02/23/2015
  • Digital Intelligence for Security and Productivity

    About Fasoo - Who are we? At Fasoo, our main goal is to provide you with more robust and scalable data and application security, as well as mobile security to liberate people and businesses from various risks and constraints in their digital life and business. Fasoo plans to deliver exceptional value through our software to our customers and gain credit by developing software of true value that is recognized all around the world. As a leader within the Digital Rights Management industry, we continue to challenge ourselves and expand into new business areas to provide you with high quality software. Fasoo has developed competitive products and DRM solutions to succeed in the constantly changing IT environment and promises to meet the challenges to provide you with the software you need to secure your data and tackle security threats and unwanted limitations in this environment. Our Vision Our vision provides us with the framework to guide every aspect of our business. By 2020, Fasoo aims to be a global top 100 software company, produce four global software products along with two global number one products, have Fasoo Enterprise DRM be part of every business application and have our source code analysis tool, SPARROW on every developer’s desktop. These are just some of the visions we aim to accomplish in order to achieve sustainable, quality growth.

    03/01/2016 About Fasoo 03/01/2016
  • Download the Latest Ponemon Report on How Company Insiders Put High Value Information at Risk

    Fasoo partnered with the Ponemon Institute to present: "Risky Business: How Company Insiders Put High Value Information at Risk". About 640 IT security practitioners familiar with their organization's approach to protecting data, documents and files against cyberattacks were surveyed and found that: 56% say company insiders are the primary cause of data breaches 72% are not confident they can manage and control employee access to confidential files 70% do not know the location of confidential information 73% believe they lost confidential information in the past 12 months Some other highlights of this report are that Sales, C-level executives, Finance and Human Resources departments pose the greatest risk to high-value data, while 83% struggle with determining the approrpriate level of confidentiality documents and files should possess. .main .wrap .column.right .container.article .articleView .articleText ul.resourceItem { display: none; }

    06/13/2016 Resources 06/13/2016
  • Fasoo's Partners

    Fasoo has numerous business partnerships with companies all over the world. Fasoo’s partners include sales partners as well as technology partners. If you are interested in being a partner of Fasoo, please contact Partner Portal As a partner of Fasoo, you can register to gain access to our partner portal. The partner portal provides marketing materials, price lists and other relevant information to help you with achieving sales opportunities with your customers. If you have not already made an account, please select the button below and go to 'Create a Partner Account'. Then fill in the required information and the administrator will then authorize your access to the partner portal. Go To Partner Portal .partnerView { margin: 0 auto; max-width: 800px; } .partnerView ul { list-style: none; padding: 0 !important; } .partnerView ul li { float: left; margin: 0 12px 12px 0; list-style: none!important; } .partnerView h3 { clear: both; } .partnerView .btn2 { display: block; width: 200px; font-size: 12px; font-weight: bold; border: 1px solid #c9c9c9; background: #f9f9f9; text-align: center; height: 30px; line-height: 30px; text-decoration: none !important; margin: 0 auto 52px; } .partnerView .btn2 font { color: #222; }

    01/01/2016 About Fasoo 01/01/2016
  • Manage Security Vulnerabilities Effectively

    An overview on SPARROW. SPARROW is a static code analysis tool that is performed without actually executing programs, detecting critical software vulnerabilities at the early stages of software development. SPARROW analyzes source code with a robust static analysis engine that uses a deep semantic method to find vulnerabilities that other tools can’t. It detects security vulnerabilities such as buffer overruns, SQL injection, cross-site scripting, information leakage, TOCTOU race condition and hardcoded password. It also detects run-time errors such as memory/resource leaks, null dereference, uninitialized variables, division by zero, use after free and integer overflow. People choose SPARROW because it uncovers critical and relevant vulnerabilities during the early stages of the Software Development Life Cycle (SDLC). SPARROW is popular with government agencies, corporations and anyone developing embedded software that requires a very high level of software quality. The Static Application Security Testing (SAST) version of SPARROW is also used by the government and financial industries which aim to eliminate all security weaknesses from their source code. Static Application Security Testing (SAST) tool with... ACTIVE SUGGESTION SPARROW can be deployed on both the development and testing phases in the SDLC. As an SAST tool, SPARROW provides developers and security/quality managers with the ability to accurately identify software vulnerabilities, remediate code using ACTIVE SUGGESTION, enforce project based rules for developers and customize policies according to project requirements. Currently no other solution has a similar feature as ACTIVE SUGGESTION, where you are provided code suggestions to easily fix the vulnerabilities in your software. Intelligent Alarm Clustering SPARROW's Intelligent Alarm Clustering groups related vulnerabilities in the source code with a unique ID. A developer can review results and address vulnerabilities faster and easier throughout the SDLC. Intelligent Alarm Clustering reduces review time because it reduces the number of alarms to review and also reduces fix time since these vulnerabilities are in clustered groups and can be remediated in order instead of going back and forth. Advanced Issue Filtering SPARROW provides Avanced Issue Filtering which analyzes the characteristics of issues and eliminates errors with have to analyze them over and over again, each time. Static analysis tool based on a deep semantic method with the best technology It is the semantic approach that allows SPARROW to follow all possible execution scenarios, to be more exhaustive than other tools, rather than focusing on discovering particular patterns. In addition to the semantic tools, SPARROW also utilizes syntactic tools to quickly find shallow bugs based on fixed patterns. SPARROW balances the depth of its bug detection coverage with a reasonable analysis cost. Development process linked to the highest academic research SPARROW is similar to other analysis tools which derived their research and product toolsets from prestigious universities like Stanford University and the University of Wisconsin. These tools have gained great respect and success in the marketplace for their technological research. SPARROW’s semantic based static analysis tool was developed based on a joint research program with the prestigious Seoul National University. With six years in research and another five years for commercialization, SPARROW has been proven not only technically but also on its marketability. Fasoo continues to work with Seoul National University to improve SPARROW and develop new programs to strengthen the overall source code analysis market. Active support for correcting flaws in source code SPARROW offers a web based user interface that links between source pages, helping the user quickly navigate source code to verify alarms. Prompt correction of the detected bug can be made through an error analysis report and detailed analysis guide. Related examples and information about each defect can be confirmed and explained through CWE, CERT, OWASP, HIS, HICPP, MISRA and more. CWE: A Community-Developed Dictionary of Software Weakness Types CERT: Computer Emergency Response Team for Internet Security Incidents OWASP: Open Web Application Security Project Flexible deployment and operation All on-going projects are managed on the server through the web-based integrated management system which provides helpful resources to configure a safe collaborative system and to operate efficiently for large-scale projects. No matter the development environment, organizations can use SPARROW without restriction on where the analysis engine is installed, whether on a server or on a user’s PC. [Award] Gold Winner in the Vulnerability Assessment, Remediation and Management category at the 2014 Info Security Products Guide's Global Excellence Awards [Certification] SGS TUV SAAR - Certified for products in accordance with ISO 26262 [Korean Patent] Memory Leak Detecting Apparatus and Method thereof (Patent No. 100965426)

    02/02/2016 Products/Solutions 02/02/2016
  • Secure Your Files Shared with External Users

    An overview on Fasoo Secure Exchange. Business relationships require cooperation through partnerships, outsourcing, and collaboration with many different organizations. Sensitive files are shared outside of the company through email, cloud-based sharing services, FTP, and other portable media. The threat of unwanted information disclosure is real and the potential impact this makes on a company is devastating. The need for security measures for files shared with outside parties has become critical to an organization’s security plan. Fasoo Secure Exchange (FSE) lets you share your sensitive files securely through email, FTP, USB flash drives, the cloud and more When a file is shared externally, FSE ensures a secure exchange of information, which guarantees that files are shared with only the intended recipients. The sender can decide who can access sensitive files and what permissions they have for using them, such as View, Edit or Print. Persistent security remains in place and provides the sender with assurance that these files are secure. Even when files are unintentionally sent to the wrong parties, a sender can revoke future access to them. All actions are logged for future analysis providing peace of mind. “Our company has various business affiliates including construction, raw material, and steel. We have already implemented Fasoo’s solution at our subsidiaries to protect files created within our organization. When we receive orders from construction firms, we need to cooperate with our steel affiliate so it can deliver the necessary materials. We needed to protect our information when sharing between our affiliates because there is a high risk that sensitive information could be exposed to the wrong people. After applying the Fasoo security solution to files sent outside of the company, sharing and cooperation is more prevalent and secure between subsidiaries. Business efficiency has increased along with positive feedback from all affiliates.” -J Group Data Processing Team Leader-

    02/21/2016 Products/Solutions 02/21/2016
  • Careers

    We're looking for the person who possesses both vision and talent to lead Fasoo's future Even a common idea can become a great idea when composed with the right team and company. Innovation can’t be done alone. We believe that through the right cooperative atmosphere those ideas will have no limit in how far they go as well as how successful they will be. Fasoo is waiting for you to help us build a better outlook collectively for the future of data and application security. Collective Creativity Being able to compromise based on good communication and consideration for others. Being able to aim higher and learn more. It’s not the time to stop learning, it’s time to continue to develop your knowledge to become an expert. Integrity and having a positive mindset are the base of our professionals. We are looking for people who believe that it is not just ‘my vision’, it is ‘our vision’. Through ‘Collective Creativity’, this is what makes up the core of the company mentality. This is what Fasoo is looking for.

    01/01/2016 About Fasoo 01/01/2016
  • Accurate and Efficient Quality Control for Software Development

    An overview of SPARROW QCE. SPARROW QCE uses a semantic based static program analysis tool to detect quality flaws in your software’s source code SPARROW QCE is necessary for software developers and quality assurance teams who want to reduce the cost of software errors. Detection of bugs in your source code that can produce critical quality defects must be analyzed and corrected before software development is completed. SPARROW QCE detects fatal quality defects during development with fewer false alarms. The process is less costly, more time efficient and a more rigorous analysis that provides you with quality and error free software. SPARROW QCE automatically analyzes your code and offers you a deep and accurate source code analysis at the early stages of program development without creating a separate test environment. SPARROW QCE can be used in various industries including government, financial services and any organization that builds embedded software to eliminate errors during development. SPARROW QCE is recognized by customers as a high quality tool for creating error free software. Who needs SPARROW

    02/03/2016 Products/Solutions 02/03/2016
  • Safely Protect Files that You've Saved to the Cloud

    An overview of Folder Cryptor. Are you personally using Dropbox and want to secure files that are uploaded into the cloud? Do you wish you could have your files automatically encrypted as they are uploaded into Dropbox folders? Is it important for you to have complete and secure management of your Dropbox folders? If yes, then with Folder Cryptor for Dropbox, a B2C service will safely secure personal contents in Dropbox. With the growing number of personal devices such as PC, smartphones, tablet PCs, the use of public cloud storage services such as Dropbox, Google Drive, Box and more to store and share personal information has dramatically increased. The widespread of users and many more utilizing other cloud storage services have made it a target for hackers to steal data that is stored and shared in the cloud. In addition, files shared to others can be leaked or be delivered to a third party by mistake or on purpose. The result can lead these sensitive files containing personal photographs, passwords and other confidential information to be exposed. Folder Cryptor automatically encrypts files before they are uploaded into secure folders With the launch of Folder Cryptor for Dropbox, Fasoo offers a robust security service in order for Dropbox users to safely store and share personal information within the cloud. Files uploaded into these secure folders through Folder Cryptor are automatically encrypted and are considered safe even when they are hacked and stolen. Also, because these files are encrypted throughout its entire lifecycle, users can safely and easily share these files with family, friends and coworkers. Folder Cryptor only requires your existing Dropbox authentication and Dropbox users can simply install Folder Cryptor on their PC (Windows/Mac) or mobile device (iOS/Android). Since users will be automatically connecting with their Dropbox account, their files will be secure with Folder Cryptor without management of user credentials. Folder Cryptor offers a free trial version where users can create up to three secure folders. For unlimited secure folders, including all features from the trial version, users can purchase Folder Cryptor Pro for only $2.99 (one-time payment). This service can be downloaded from as well as on your mobile device from Apple App Store or Google Play. Don’t worry and let Folder Cryptor take charge of the security. For more information on Folder Cryptor for Dropbox

    02/03/2016 Products/Solutions 02/03/2016
  • Discover and Classify to Understand Your Data

    An overview on Fasoo eData Manager. For an effective and efficient data security, organizations must define the scope of data to protect. However, it is not easy to understand all the target documents since the volume, location, filename extension, number of copies or security sensitiveness of target files are continuously changing. To properly understand the target files to enforce data security, organizations must discover and all unstructured data residing in endpoint devices and repositories, and classify and protect the files according to its own data security strategies. Understand your own data to set up your own data security policy with Fasoo eData Manager Fasoo eData Manager is an enterprise classification and security policy management tool that is complementary to Fasoo Enterprise DRM as well as valuable by itself. It scans files throughout the enterprise to find content that is confidential or of high value. It can scan files located within folders and logical drives on PCs – that is, it can scan files on file servers, cloud storage servers, repositories, and anything else that can be mounted as a logical drive or shared folder. The files that Fasoo eData Manager scans are those that match templates which specify criteria for files to be scanned. These include: Storage devices (fixed or portable), folders, or individual files. Filename extensions (file types, e.g. Microsoft Word documents, Excel spreadsheets, PDF). Pattern matching within file names or file content, as defined by keywords or regular expression matches Fasoo Enterprise DRM document classes Users and user groups Scans can be set up to take place periodically, (i.e daily, weekly, etc.). Fasoo eData Manager displays statistics on file characteristics that it gathers from scans, which include: Files that are unprotected, protected by Fasoo Enterprise DRM, or protected by Fasoo eData Manager encryption. Files whose names or contents contain matches to regular expressions or keywords, such as PII. File extensions (types) of interest, such as Microsoft Excel spreadsheets or PDFs. Files that have been distributed throughout the organization. Day-to-day variations in these statistics. ""With Fasoo eData Manager, managers and security administrators now have an adequate decision making process, to determine and respond to risks related to sensitive documents. -CIO of Nuclear Power Plant -

    02/23/2016 Products/Solutions 02/23/2016
  • Download the Latest Insider Threat Report Sponsored by Fasoo

    Check out the latest insider threat report sponsored by Fasoo along with several other sponsors. Learn the hard facts on insider threats and what information security professionals are doing to prevent, detect and successfully remediate these threats. Highly publicized insider data thefts and security breaches highlight the increasing need for better security practices and solutions to reduce the risks posed by malicious insiders as well as unintentional insiders. This report is the result of comprehensive crowd-based research in partnership with the 300,000+ member Information Security Community on LinkedIn and Crowd Research Partners to gain more insight into the state of insider threats and solutions to prevent them. Some key survey findings are as follows: Seventy-four percent of organizations feel vulnerable to insider threats — a dramatic seven percentage point increase over last year’s survey. However, less than half of all organizations (42 percent) have the appropriate controls in place to prevent an insider attack. Inadvertent data breaches (71 percent) top the list of insider threats companies care most about. Negligent data (68 percent) and malicious data (61 percent) breaches come in a close second and third Privileged users, such as managers with access to sensitive information, pose the biggest insider threat to organizations (60 percent). This is followed by contractors and consultants (57 percent), and regular employees (51 percent). Fifty-six percent of security professionals say insider threats have become more frequent in the last 12 months. Forty-two percent of organizations expect a budget increase over the next year — a strong gain of eight percentage points from the previous year. Over 75 percent of organizations estimate insider breach remediation costs could reach $500,000. Twenty-five percent believe the cost exceeds $500,000 and can reach in the millions. To download the report, please click on the button below. .main .wrap .column.right .container.article .articleView .articleText ul.resourceItem { display: none; }

    08/08/2016 Resources 08/08/2016
  • Fasoo Support

    How can we help you? Fasoo provides a diverse range of support services to help you with Fasoo solutions and services wherever you are. Our experienced support staff and engineers deliver dependable and satisfactory service to meet your needs. We are here to help you. US Support (866) 311-6373 Global Support +82-2-300-9300 For further assistance please use our contact form here.

    03/22/2016 Support 03/22/2016
  • Visit Our Booth #701 at the Gartner Symposium ITxpo 2016

    Invitation to the Fasoo booth #701 at the Gartner Symposium ITxpo from October 16 - 20, 2016 in Orlando, to experience a whole new way to share, secure and manage your documents with Wrapsody, your next Intelligent Digital Document Platform. To unsubscribe from receiving future mailings from Fasoo, please click here.

    10/04/2016 PR 10/04/2016
  • Extend and Reinforce Security to Share and Collaborate with IBM ECM Documents

    Organizations use IBM ECM to increase efficiency, improve control of information and reduce overall cost of information management. However, files are considered secure while they remain within a controlled boundary, but they cannot be controlled any more once they are legitimately downloaded to PCs. The downloaded documents can also be forwarded to unauthorized users, and thus can be read, saved and printed without restrictions. To avoid such issues, files should be persistently protected and continuously encrypted, whether in transit or in use throughout their entire lifecycle. Fasoo Secure Document for IBM ECM persistently protects your files downloaded from your ECM To persistently protect the files downloaded from IBM ECM, organizations need to extend the security of the repository to include files downloaded to end point devices. In addition, access to the downloaded files need to be dynamically enforced to reflect any changes on the repository ACL for ensuring continuous and consistent security. The integration of IBM ECM with Fasoo will extend IBM ECM security to content regardless of its location and provide enhanced access control for authorized users both inside and outside of the organization. Fasoo encrypts files downloaded from ECM repositories based on the users’ ECM permissions, or other metadata associated with them. The protected files maintain the security policy of the ECM system wherever they travel, and limit access privileges depending on users’ ECM permissions including View, Edit, Print and Screen Capture. All file activities are logged so an administrator has a full audit trail of the user, time and data of access and even the device they accessed the file on. FSD for IBM ECM is seamless and will provide the security you need when files containing sensitive information are downloaded from IBM ECM systems. "With increase in government regulations requiring that all customer documents and anything related to monetary transactions is controlled and audited, we needed to make sure that our files from our IBM ECM system were protected at all times. With these files containing very sensitive information such as personally identifiable information, it was paramount for us that we do everything in our power to prevent exposing this information. By integrating Fasoo Secure Document for IBM ECM, we didn’t have to worry about data breaches while sharing these files or not meeting government regulations.” -Bank IT Security Manager-

    02/03/2016 Products/Solutions 02/03/2016
  • Protect Files Beyond the Boundaries of Content Repositories

    An oveview on Fasoo Secure Document. What happens when information leaves the repository? Information repositories are widely used to store and share data and documents. The security measures in these systems are insufficient to protect files outside of the repository. Once someone downloads files, they no longer retain any security controls. Organizations realize that investments in network security cannot prevent leaking of sensitive information by insiders, since they already have authorized access to that information. Fasoo Secure Document (FSD) persistently protects documents downloaded from information systems Fasoo ensures your documents remain secure no matter where they go after you download them. You are protected whether you use Microsoft SharePoint, IBM FileNet or any ECM, EDM, ERP or groupware system. To persistently protect the documents populated from central repositories, organizations need to extend the security of the repository to include files downloaded to end point devices. In addition, access to the downloaded files need to be dynamically enforced to reflect any changes on the repository ACL for ensuring continuous and consistent security. FSD integration with Microsoft SharePoint and IBM ECM is seamless and will provide the security you need when files containing sensitive information are downloaded from SharePoint or IBM ECM. “Our company shares sensitive research information and company assets stored in an information system and patent application system. Due to the sensitive nature of these files, it is extremely important that we prevent exposing this information to our competitors, as we will suffer heavy financial losses. We needed a security solution that could limit certain department’s access to specific files. For example, only allowing research departments access, and restricting access to the management support, planning, and other departments. With the addition of Fasoo’s solution we didn’t have to worry about information leaking and getting into the wrong hands.” -Research Institute IT Security Manager-

    02/10/2016 Products/Solutions 02/10/2016
  • Fasoo's Customers

    Here are some of our customers who have deployed our solutions Enterprise DRM Customers SPARROW Customers

    01/01/2016 Products/Solutions 01/01/2016
  • Prevent and Deter Security Breaches Through Your Screen

    An oveview on Fasoo Secure Screen. Screen capture tools and the proliferation of high-quality digital cameras and smartphones make it easy for anyone to capture sensitive information displayed on a computer screen. With nothing preventing it, the likelihood of a major data breach from capturing this information on the screen is increasing. Some companies limit the possession of these devices or use different items to ensure that the camera lens are blocked, but it makes life inconvenient for employees. Fasoo Secure Screen protects sensitive information displayed on your screen To protect sensitive information displayed on screens being grabbed by screen capturing tools, hot keys and/or remote desktop/virtual desktop infrastructure applications, application-specific or document-specific screen capture control must be enforced. Fasoo Secure Screen blocks efforts to capture what is on the screen and provides specific information through a watermark that shows the screen’s location. Both of these security measures help to secure your screen from unwanted exposure to competitors and other unauthorized people. “Our hospital manages patients’ medical image records through EMR and PACS systems. They make it convenient for our doctors and nurses to treat patients, however the threat for exposure of MRI and x-ray images is a major concern for us because our employees can screen capture those images, or take photos of the screen with digital cameras or smartphones. After applying Fasoo’s secure screen solution to the hospital’s medical management system, restrictions on illegally exposing copies and distributing medical information can be deterred and prevented. With improvements to security of this new system, our employees have become more effective at their jobs.” -General Hospital B, Medical Data Processing Manager-

    02/20/2016 Products/Solutions 02/20/2016
  • Visualize Risk of Your Data to Prevent Insider Threats

    An overview on Fasoo RiskView. The risk of insider threats exists in any company in any sizes. Security solutions cannot always rule out the insider threats, even though it can help lessen the probability to some extent. This is largely because it is difficult to detect insider threats, since insiders have legitimate access to data with intimate knowledge of security controls and methods to bypass them. Fasoo RiskView helps to prevent insider threats that are real, but difficult to detect Fasoo RiskView is a tool for security administrators that monitor activity related to unstructured data and user activities with confidential data. It gathers information from Fasoo Usage Tracer (the log analysis utility for Fasoo Enterprise DRM) and Fasoo eData Manager. It has APIs that can be configured to import log data from other security technology components, including firewalls, DLP, databases, and even physical security systems (e.g., entry/exit data from keycard or biometric systems) and employee attendance records. Fasoo RiskView includes a decision making framework that security administrators as well as business managers can use to review suspicious activities and after relevant investigations, in order to decide whether or not to take action to address these concerns with potential insider threats. Fasoo RiskView applies sophisticated rule-based modeling to the data sources mentioned above, to establish normal patterns of behavior and flag suspicious activities that indicate enough risk to merit concern and potential intervention by business management. The types of activities that Fasoo RiskView tracks include: Event anomalies, such as logins with user IDs of former employees, a given user logging in from multiple locations simultaneously, or unauthorized users retaining an excessive numbers of files containing sensitive data. File based risks, such as unauthorized users’ attempts to decrypt classified files. User based risks, such as users decrypting files more frequently than usual, printing more files than usual after regular business hours, or sending files to external recipients more than usual. “To put it simply, Fasoo RiskView enabled us, especially security administrators and line of business managers, to discover risks of data theft or loss that are assumed to exist but are unknown.” -CISO of International Business Law Firm-

    02/23/2016 Products/Solutions 02/23/2016
  • Deter Information Leaks from Printed Files

    An overview on Fasoo Secure Print. Printouts often become the source of information leaks. Prints of sensitive document are easily left unclaimed or unattended at printers, and this may lead into information breaches. To prevent this, the print information needs to be centrally recorded, so that the printed information can be traced as needed. Selectively adding the user information and the custom phrases to the prints of sensitive documents is also effective in alerting users’ awareness on security. Fasoo Secure Print (FSP) adds a watermark and the ability to trace information disclosure through printouts Fasoo increases the security of printing by helping to deter leaks of sensitive information from printouts. Each secure printout contains a watermark that can reveal the source of the printed document and can even capture an image of the actual printout for reference when auditing the source of a leak. Not only will this raise awareness of printing sensitive information, but can also reduce unnecessary expenses for excessive and unwarranted printing. "As part of the planning team at a steel firm, we print a lot of architectural CAD drawings to discuss and share ideas during internal meetings until the final design is developed. Although we collect all the printed materials after our meetings, we are still nervous that some of these printouts will be leaked to the client before it is finalized, or that these printouts are accidently lost and end up in the wrong hands. After integrating the Fasoo printing solution, we can now track who prints specific files, which increases attention on security of these printouts. We have also decreased unnecessary printing. All in all, this has deterred the chance of information being leaked intentionally or accidently by one of our employees.” -Steel Firm Planning Team Manager-

    01/04/2016 Products/Solutions 01/04/2016
  • Reinforce Print Security and Help Reduce Costs

    An overview on Fasoo ePrint. The average employee prints about 10,000 pages a year and 17% of them are pages the employee did not intend to print. This not only leads to high printing costs but also to data breaches from printing sensitive information. Fasoo ePrint provides you with a safe and efficient printing environment With protective measures and cost cutting capabilities, Fasoo ePrint provides an effective yet secure print management solution. If Fasoo ePrint detects sensitive information in a document, a predefined policy can block printing. It controls and traces printed documents on your existing MFPs, so you can continue to use your current output devices. When used with Fasoo Enterprise DRM solutions, it extends the security area and provides stronger protection for personal information maintained within companies. "It is not uncommon to print yearly salary information as part of our daily routine in HR. Since my office is far from the printer and I worry that someone may steal this sensitive information, I intentionally wait until after work to print these documents. There was a time when I printed this kind of information and by the time I got to the printer, the printout was gone. After Fasoo ePrint was introduced into my company, I was able to go to the printer anytime I wanted and safely retrieve my documents. After authorizing myself with my smartphone application, I could print my document and retrieve it while standing in front of the printer. This assures me that this printed information will not fall into the wrong hands.” -Electronics Company HR Manager-

    02/05/2016 Products/Solutions 02/05/2016
  • Extend File Based Security from Your PC to Your Mobile Device

    An overview on Fasoo Mobile Gateway. As enterprise mobility boosts the work efficiency by enabling "anywhere access" to business data, many organizations are allowing employees to access internal data on their corporate mobile devices. In a survey of nearly 2,100 IT employees in 2013, 93 percent use personal mobile devices for work. Mobile devices are becoming the tool of choice for many businesses as they offer a simpler user experience and easy access to information. Many organizations today are establishing BYOD programs that embrace employee-owned devices. Setting policies that separate business information from personal information is key to the security of sensitive files viewed on mobile devices. Not only are the risk of data leaks increasing since sensitive business information exists on lost mobile devices, but also because legitimate, unsupported apps, may unintentionally cause security risks for the company. Fasoo Mobile Gateway prevents data breaches while working on your mobile devices Fasoo Mobile Gateway extends secure file access to allow people to communicate and collaborate through smartphones and tablets. It provides businesses with the ability to persistently secure, control, and trace sensitive files on mobile devices. The information remains secure even if the device is lost or stolen. In conjunction with the Fasoo View and Fasoo View Plus apps, your information is securely extended from Fasoo DRM solutions on your PC to your mobile device. "Our company uses Fasoo’s PC and information system security solutions to prevent exposure of files with sensitive information to competitors. At the end of last year we were concerned with how to use these files safely and conveniently on mobile devices. After adding Fasoo’s mobile server to our existing DRM server, we could use those files securely and efficiently on our smartphones and tablets.” -Financial Securities Company C, Security Management Team Leader-

    02/04/2016 Products/Solutions 02/04/2016
  • Secure Files Created and Used on Endpoints

    An overview on Fasoo Secure Node. Are you concerned about your files getting into the wrong hands? With conventional data security approaches, organizations may ensure documents are protected against external attacks but cannot when it comes to protecting them against insider threats. To protect documents against any malicious or careless users, documents must be protected and traced throughout the entire lifecycle, and the centralized security policy must travel with the docuemnts wherever they go, whether they are at rest, in use or in motion. Fasoo Secure Node (FSN) lets you secure sensitive files saved on your PC Even if files are lost or get into the wrong hands, unauthorized access is prevented and sensitive information is not exposed. Since files are automatically secured as they are saved, you can be assured that no one can access files leaked through any unauthorized disclosure to people inside or outside your organization. "Our internal Design team frequently creates CAD drawings and sends them to a third party for production. We take a laptop with the drawings to the production company and deliver them in person because we are afraid someone may leak these sensitive files to competitors. This helps prevent information from leaking, but there is still the issue of laptops being lost or stolen, and how to prevent someone else from accessing them. Now with Fasoo’s solution we are not concerned that sensitive CAD drawings will be lost or stolen and get into the wrong hands. Since the files are secured when saving them, we are confident about the security of our work, even if these files are exposed deliberately or by mistake to competitors.” -Heavy Industrial Machinery Corporation Design Leader-

    02/23/2016 Products/Solutions 02/23/2016
  • Protect Copyright of Your eBook and Securely Distribute

    An oveview on Fasoo eBook DRM. Starting from simply digitalizing contents on paper, eBook is steadily becoming the core element in the digital content industry; eBook has successfully extended its applications to novels, cartoons, catalogues, children contents, digital textbook, and many others by adding audio, video and interactive features and maximizing the user experience. However, because eBook is mainly distributed through the online network, there is a high chance of copyright infringement to occur through illegal replication, and this issue must be solved primarily to ensure the prosperity of the eBook market. Fasoo eBook DRM is the core solution in the eBook business that protects the copyright of eBook contents and ensures the prosperity of the eBook market As a DRM (Digital Rights Management) solution that follows eBook standards by the IDPF and consists of encryption and rights management bases, Fasoo eBook DRM is the core solution in the eBook business that protects the copyright of eBook contents and allows various business types, such as content sales and rentals. Some of the key benefits of Fasoo eBook DRM are as the only DRM (Digital Rights Management) solution that follows standards and security conditions of IDPF EPUB 2/3, the international standard eBook format, Fasoo eBook DRM protects the copyright of not only text-based eBook but also interactive eBook containing various multi-media. For the enhancement of security, we raised the reliability through adopting the cryptographic algorithm and key standards that satisfy the security recommendation (SP800-131) of the National Institute of Standards and Technology (NIST). Various platform types are supported, such as Windows based PC, iOS/Android based smartphones, and eBook readers. Fasoo eBook DRM is useful in extending business models through cross selling, B2C and B2B because it can simultaneously support various policy types, such as sales and rentals, and allows cross-compatibility among eBook services. In addition, cross selling among eBook service providers is supported. EPUB DRM technique of Fasoo has been selected as the standard eBook technique of South Korea, and Fasoo also participates in EPUB DRM international standardization of IDPF. Fasoo eBook DRM was adopted into eBook service of Kyobo Book Centre, the number one eBook provider, and Naver, the number one Korean search portal. "As the No.1 eBook service provider in Korea, we tried to adopt the safest and most robust technology for our complex business model and to support various devices from PC to mobile devices. Already being the top offline bookstore in Korea, by implementing Fasoo eBook DRM we were able to also lead the online eBook industry in providing secure online digital contents to our customers."

    02/04/2015 Products/Solutions 02/04/2015
  • Classify and Manage Different Notes on Your Smartphone

    An overview on DigitalPage. With DigitalPage, on your smartphone, you are able to leave notes, schedules, or business ideas on page, anytime, anywhere. There is no need for Internet connection to access your pages. In order to organize yourself, you will be able to add names, phone numbers, photos, voice recordings or location as an “in-line tag”, and these tags are connected with apps with which you can do or what you want. It is also beneficial to link your pages that you would like to see together. DigitalPage then will recommend pages that you had linked together. You are free to add or remove these links among pages at any time. Enjoy a smart life with your intelligent lifelog by using DigitalPage. Find more information on DigitalPage

    02/18/2015 Products/Solutions 02/18/2015
  • Secure Your Data on Mobile Platforms, Not Your Device

    An overview of Fasoo Mobile Solution. More and more employees are using personal devices for work, regardless of their organization's official BYOD policy. This is especially dangerous for businesses and their confidential data when considering that in 2013: 67% have admitted to using personal devices at work, regardless of the office's official BYOD policy $7 million worth of phones had been lost everyday around the world 50% of smartphone and tablet users have said that they don't password protect their devices. It's undeniable that more employees are going to use their mobile devices for work regardless of the policy, so the question is not whether you should allow BYOD, but how you can make sure that the data remains safe from exposure with BYOD. When allowing BYOD in your company, there are a number of security related questions that must be asked. Is the data on your mobile device safe the way it is? Is the connection between the server and mobile device secure? Is the access from your mobile device to server controlled? Is your mobile screen protected? Are you securely sharing files with others? Fasoo Mobile Solution secures the data itself and controls access to your server for complete BYOD security Some of the conventional mobile solutions such as MDM (Mobile Device Management), which manages, monitors and secures the mobile device, and MAM (Mobile Application Management), which manages all the applications and application data, are not enough to confidently answer yes to all the questions. MDM and MAM do address security by managing and controlling the device or the specific files at rest. However, once the device is unlocked and the data is in use, there may be no way to prevent the data from being leaked to the wrong hands. The only way to confidently answer 'yes' to all these security related questions is Mobile Data and Access Management (MDAM), the only complete BYOD security system. Since data keeps moving outside the device or application, the key is securing the data itself and controlling access to your server. Fasoo Mobile Solution extends secure file access to allow people to communicate and collaborate through smartphones and tablets. It provides businesses with the ability to persistently secure, control and trace sensitive files on mobile devices. It is the only solution to provide MDAM, which delivers protection for stored mobile and network data, server access control, mobile screen protection and secure sharing of files. In 2011, Fasoo was awarded with the '2011 Global Digital Rights Management Competitive Strategy Innovation of the Year' from global research and consulting company, Frost and Sullivan In 2010, Fasoo was referenced as one of the "Global Top 6 DRM Companies" in an Aberdeen Group Report In 2010, Fasoo was the only Asian company to be referred as one of the "Global Enterprise DRM Top 7 Vendors' from, world renowned global research & consulting company, Gartner

    02/04/2016 Products/Solutions 02/04/2016
  • Upgrade Your Data Security Policy through Intelligent Log Analysis

    An overview of Fasoo Usage Tracer. Setting up a perfect data security policy is almost impossible. This is why exceptional policies are so often adopted to balance productivity against security in any sort of policy enforcement settings. There is only one way to address this issue which is by having a flexible security policy management framework, where security policies can be continuously assessed and optimized through feedback from a comprehensive data usage log analysis. Fasoo Usage Tracer centrally monitors usage logs for all Fasoo-protected documents Fasoo Usage Tracer provides a centralized location for organizations to monitor, assess and optimize data security policies enforced by Fasoo Enterprise DRM, a suite of persistent data protection and control solutions, through usage log analysis. Organizations that have multiple Fasoo data-centric solutions in place can collect and analyze all data usage logs from those solutions in a centralized location on a real time basis. Usage logs include user information, access rights, IP address, security classification, file name, time and date. Not only will this be the one stop location to manage all data/user activity logs but will also offer a more convenient management experience. Pattern-based usage monitoring allows security administrators to enforce a set of rules to detect and monitor unusual file usage behaviors of targeted users and groups. Administrators can opt to get notifications whenever any violations of the rules are detected. This solution provides the ratios of provisional license issuing logs to the total licenses issuing logs and compares them between groups and against industry benchmarks. For example, the ratio of individual user groups helps determine which groups need more privileges or abuse provisional or exceptional licenses. The log analysis helps security administrators assess the efficiency and effectiveness of existing security policies. The solution offers organizations with a decision making tool to proactively optimize data-security policies against data security challenges. "Now we can monitor all file usage activities that we have under Fasoo’s solutions, and get commendations to set certain permissions for certain users. This all helps us to continue to keep our data secure.” -Financial Services Firm Chief Security Officer-

    02/10/2016 Products/Solutions 02/10/2016
  • Extend and Reinforce Security to Share and Collaborate with Microsoft SharePoint Documents

    An overview of Fasoo Secure Document for SharePoint. Many organizations use Microsoft SharePoint to increase efficiency, improve control of information and reduce overall cost of information management. However, files are considered secure while they remain within SharePoint libraries, but these files can be legitimately downloaded to desktops, laptops and even mobile devices by authorized users, where they can be easily copied and forwarded somewhere else because it no longer retains any security controls. The documents can also now be read, saved and printed by any user without restrictions, thus the risk of data loss increases dramatically. To avoid such issues, files should be persistently protected and continuously encrypted, whether in transit or in use throughout their entire lifecycle. Fasoo Secure Document (FSD) for Microsoft SharePoint persistently protects your files downloaded from your ECM To persistently protect the files downloaded from SharePoint, organizations need to extend the SharePoint permission levels to include the documents downloaded. In addition, access to the downloaded documents need to be dynamically enforced to reflect any changes in SharePoint permission levels for ensuring continuous and consistent security. ECM allows organizations to share information and collaborate easily with colleagues, business partners and customers. ECM alone cannot provide persistent protection throughout the document lifecycle, since there is no way to track user and file activities of documents after they are downloaded. Fasoo Secure Document or FSD ensures files remain secure no matter where they go after users download them from the ECM system. FSD for Microsoft SharePoint gives enterprise complete control of how their content is being used once it leaves their direct control. The integration of Microsoft SharePoint with Fasoo will extend Microsoft SharePoint security to content regardless of its location and provide enhanced access control for authorized user both inside and outside of the organization. Fasoo encrypts files downloaded from ECM repositories based on the users’ ECM permission levels, or other metadata associated with them. The protected files maintain the security policy of the ECM system wherever they travel, and limit access privileges depending on users’ ECM permission levels including View, Edit, Print and Screen Capture. All file activities are logged so an administrator has a full audit trail of the user, time and data of access and even the device they accessed the file. FSD for Microsoft SharePoint is seamless and will provide the security you need when files containing sensitive information are downloaded from Microsoft SharePoint systems.

    02/18/2015 Products/Solutions 02/18/2015
  • Cloud Storage Service for Efficient Collaboration

    An overview of DigitalQuick. Do you have difficulty maintaining the version history of documents that you working with others? If so, you need to use DigitalQuick which is an efficient collaborative service that enables co-editing and version management through sharing documents. All version of the document created through DigitalQuick are stored in the cloud and supported by the version control system. All edits applied to the document are managed by the version control system, therefore you can always work with the latest version of the document. With DigitalQuick keep your documents up-to-date and mange updated history. When using DigitalQuick, you can pinpoint the people you want to share the documents with, so you can safely collaborate with them without worrying about security. As you collaborate on the documents with other people at the same time, you will be able to track all the changes that are made. In such a case, you can check the comments of the document which is generated after the document is modified. Do you need to continuously update and deliver (or distribute) a document you have created? That is not the case with DigitalQuick. DigitalQuick documents always come with a link that allows those that are allowed to access it download the latest version of the document. Hence, even if your colleagues or friends are not DigitalQuick users, they can follow the provided link to download the latest version of the document. Are you worried that your important documents are being leaked? A document created through DigitalQuick is automatically encrypted and can be accessed only by authorized users in the group. Therefore, just by creating a DigitalQuick document, you can prevent it from being leaked. Find more information on DigitalQuick

    02/18/2015 Products/Solutions 02/18/2015
  • Fasoo CEO Joins Panel on Cybersecurity for the U.S. & South Korea

    Today at the Four Seasons Hotel in Seoul, South Korea, Fasoo CEO Dr. Kyugon Cho was part of a panel focusing on the “Changing Views on Cyber Security in Public and Private Sector”. Along with Fasoo, such executives from Palo Alto Networks, NIST (National Institute of Standards and Technology), Raytheon, Sentek Global and Tanium also joined in the panel discussion regarding cyber security in both countries. Dr. Cho, spoke about what has changed for the last 25 years in terms of cybersecurity, also security solutions so far, as well as security, now and in the future. He also answered panel questions directed at best practices, adopting data-centric security for intellectual property as well as how to capture government funding to modernize cyber security in the US. The cybersecurity forum, co-hosted by the Korea’s Ministry of Science, ICT and Future Planning and the Department of Commerce, exchanged information on priorities in their efforts to increase cybersecurity as well as hold business meetings between both sides. Led by Assistant Security of Commerce for Industry and Analysis Marcus Jadotte, the U.S. group was also represented by 14 American cybersecurity companies.

    05/19/2016 Products/Solutions 05/19/2016