Search
English Korean Japanese Partner Portal Contact Us Location
navigation
< >

Fasoo Usage Trace (FUT) - Upgrade Your Data Security Policy through Intelligent Log Analysis

Last updated

Feb 10, 2016

Share this content


Setting up a perfect data security policy is almost impossible. This is why exceptional policies are so often adopted to balance productivity against security in any sort of policy enforcement settings. There is only one way to address this issue which is by having a flexible security policy management framework, where security policies can be continuously assessed and optimized through feedback from a comprehensive data usage log analysis.

Fasoo Usage Tracer centrally monitors usage logs for all Fasoo-protected documents
Fasoo Usage Tracer provides a centralized location for organizations to monitor, assess and optimize data security policies enforced by Fasoo Enterprise DRM, a suite of persistent data protection and control solutions, through usage log analysis.

Organizations that have multiple Fasoo data-centric solutions in place can collect and analyze all data usage logs from those solutions in a centralized location on a real time basis. Usage logs include user information, access rights, IP address, security classification, file name, time and date. Not only will this be the one stop location to manage all data/user activity logs but will also offer a more convenient management experience.

Pattern-based usage monitoring allows security administrators to enforce a set of rules to detect and monitor unusual file usage behaviors of targeted users and groups. Administrators can opt to get notifications whenever any violations of the rules are detected.

This solution provides the ratios of provisional license issuing logs to the total licenses issuing logs and compares them between groups and against industry benchmarks. For example, the ratio of individual user groups helps determine which groups need more privileges or abuse provisional or exceptional licenses. The log analysis helps security administrators assess the efficiency and effectiveness of existing security policies. The solution offers organizations with a decision making tool to proactively optimize data-security policies against data security challenges.


"Now we can monitor all file usage activities that we have under Fasoo’s solutions, and get commendations to set certain permissions for certain users. This all helps us to continue to keep our data secure.

[Financial Services Firm Chief Security Officer]


Resources

  • Fasoo Usage Tracer