Resources

Explore our resources for actionable insights on data security and management

Implement Data-Centric Security to Protect Sensitive Data at All Times

Replace an existing perimeter-based document security solution that doesn’t protect the data with a Fasoo data-centric security solution.

Challenges

A semiconductor manufacturer needs to better protect its intellectual property as it opens new design and fabrication facilities. Its existing data security system focuses on protecting the locations of files on endpoints, file shares, and in the cloud, rather than on the data itself. As users and systems share files and documents, this perimeter-based approach leaves files containing sensitive data vulnerable because the security does not travel with the document. Security policies do not apply as users move documents from a protected location to the cloud or an endpoint, so users could deliberately or inadvertently share them with competitors or other unauthorized users. Users viewing sensitive data on a screen could easily take a screen shot using image capture tools or a phone and share it with unauthorized users. As users need to move files to an air-gapped network for the most sensitive data, management wants to simplify granting exceptions to security policy to accommodate these needs.

Solutions

Fasoo Enterprise DRM (FED) encrypts sensitive files upon creation and applies a dynamic security policy to prevent unauthorized users from viewing the documents, regardless of the file location. This data-centric security solution strengthens the company’s document security since security policies are consistent across all devices, platforms and storage locations. Fasoo Smart Screen (FSS) protects against users sharing images of sensitive data by adding dynamic watermarks to trace the origin of the data. This will deter users from sharing sensitive data since identifying information is on the screen. Capture prevention also stops using image capture tools. Fasoo eXception Management (FXM) lets users request changes to security policy allowing them to quickly decrypt documents in exceptional situations and send them to users in the air-gapped network, customers or partners. This solution improves upon the existing perimeter or location-based security and eases the burden on IT to constantly plug new ways that users try to get around the security.

ico_use_case_benefits

Benefits

The process of changing from the perimeter-based security system to the Fasoo data-centric solution allows the manufacturing company to protect all its intellectual property from misuse.  FED protects documents automatically, FSS guards against unauthorized screen capture, and FXM enhances productivity since it’s easy to request and approve changes to security policies.  Enhanced usability of the new system allows users to work without worrying about security while reducing the burden on IT.

FED

  • Encrypt CAD drawings, image files, or documents with sensitive design and process information
  • Securely share files internally with different departments or externally with customers
  • Control who can View, Edit, Print, and take a Screen Capture of sensitive files
  • Apply an access time limit to the shared files and even revoke access immediately, regardless of location
  • Protect intellectual property with persistent encryption so it can’t be exploited by competitors

FSS

  • Prevent data leaks by blocking screen capture attempts of sensitive information with visible screen watermarks
  • Control who can take a Screen Capture of sensitive data in files and web-based applications
  • Deter sharing sensitive data with unauthorized users
  • Trace sensitive data back to the source through dynamic watermarks
  • Minimize the risk of a data breach by sharing images of sensitive data

FXM

  • Allow users to quickly request a temporary change in security policy to meet changing business needs
  • Provides temporary permissions to documents through a pre-approval, post-approval, or self-approval workflow
  • Opt out of print and screen watermarks, allow users to decrypt a file or automatically send a sensitive file to an external user
  • Receive emails for exception requests and approvals and real-time notifications for quick and accurate processing
  • Delegate exception approval to department heads, managers, colleagues, or other administrators to accommodate vacations or business trips

iSMG Data Security Summit: Dallas

May 15, 2025
Renaissance Dallas at Plano Legacy West Hotel

Join us at our session to learn more about data security, privacy, and governance in the age of LLMs.

Keep me informed