Replace an existing perimeter-based document security solution that doesn’t protect the data with a Fasoo data-centric security solution.
Explore our resources for actionable insights on data security and management
Replace an existing perimeter-based document security solution that doesn’t protect the data with a Fasoo data-centric security solution.
A semiconductor manufacturer needs to better protect its intellectual property as it opens new design and fabrication facilities. Its existing data security system focuses on protecting the locations of files on endpoints, file shares, and in the cloud, rather than on the data itself. As users and systems share files and documents, this perimeter-based approach leaves files containing sensitive data vulnerable because the security does not travel with the document. Security policies do not apply as users move documents from a protected location to the cloud or an endpoint, so users could deliberately or inadvertently share them with competitors or other unauthorized users. Users viewing sensitive data on a screen could easily take a screen shot using image capture tools or a phone and share it with unauthorized users. As users need to move files to an air-gapped network for the most sensitive data, management wants to simplify granting exceptions to security policy to accommodate these needs.
Fasoo Enterprise DRM (FED) encrypts sensitive files upon creation and applies a dynamic security policy to prevent unauthorized users from viewing the documents, regardless of the file location. This data-centric security solution strengthens the company’s document security since security policies are consistent across all devices, platforms and storage locations. Fasoo Smart Screen (FSS) protects against users sharing images of sensitive data by adding dynamic watermarks to trace the origin of the data. This will deter users from sharing sensitive data since identifying information is on the screen. Capture prevention also stops using image capture tools. Fasoo eXception Management (FXM) lets users request changes to security policy allowing them to quickly decrypt documents in exceptional situations and send them to users in the air-gapped network, customers or partners. This solution improves upon the existing perimeter or location-based security and eases the burden on IT to constantly plug new ways that users try to get around the security.
The process of changing from the perimeter-based security system to the Fasoo data-centric solution allows the manufacturing company to protect all its intellectual property from misuse. FED protects documents automatically, FSS guards against unauthorized screen capture, and FXM enhances productivity since it’s easy to request and approve changes to security policies. Enhanced usability of the new system allows users to work without worrying about security while reducing the burden on IT.