Mobile Document Security

Empower your data security on mobile devices

Overview

Secure your data, not your device.

Allow authorized users to access persistently encrypted sensitive files on Android and iOS devices through a unique MDAM (Mobile Data & Access Management) solution on BYOD or company-owned devices. Limit file access based on GPS coordinates, apply a dynamic screen watermark when viewing files, and block screen capture tools. Like other Fasoo solutions, tracking and managing document and user activities can be viewed in real-time, regardless of location.

Key Features

Secure Data on Your Mobile Device

Securely access sensitive documents on your mobile devices and encrypt sensitive data downloaded on mobile devices and data accessed from information systems (ECM, EDM, and groupware) through mobile devices.

Diverse Access Control

Restrict file access based on dynamic access control and GPS coordinates.

Prevent Sensitive Data from Being Shared from Your Mobile Device

Apply a dynamic screen watermark on secured files viewed on a mobile device and block screen capture attempts. All user activities can be viewed in real time.

Extend Unstructured Data Protection to Mobile Devices

Authorized users can access encrypted sensitive files on Android and iOS devices through a unique MDAM (Mobile Data & Access Management) solution on BYOD or company-owned devices. Limit file access based on GPS coordinates, apply a dynamic screen watermark when viewing files, and block screen capture tools. Just like other Fasoo solutions, tracing and managing user activities can be viewed in real time.

Download our FED-M technical datasheet now!

Use Cases

Stop unauthorized use of confidential data

Implement data-centric security for privacy and regulatory compliance

Protect data downloaded from information systems

Challenges

 A former employee of a financial institution had sensitive customer documents on her phone, including names, addresses, account numbers, and investment information of high-profile clients.  While improperly accessing the information, she was interviewing for a new job with competitors.

  • Your employees access sensitive and confidential customer information from their phones so they can do their jobs.
  • Once the data leaves the protected confines of an information repository, database, or cloud-based service, your authorized users can share it with anyone, do anything with it, and compromise your customer’s confidential information.
  • You may be subject to regulatory fines, not to mention losing customers because they can’t trust you to maintain their confidentiality.
  • You need to persistently protect confidential data so that customer information is protected regardless of where it goes and who has it.

Solutions

FED-M lets you control who can access sensitive customer information on mobile devices.  Persistent security policies protect sensitive files regardless of where they are, the device, or their format.

  • Once the data is protected, you can safely share sensitive files through email, an external portal, or any cloud file-sharing site.
  • File access is tracked in real-time for precise auditing, and you can revoke access instantly.
  • Fasoo Enterprise DRM not only ensures that you meet financial regulations and safeguard customer confidentiality but also protects and controls sensitive information at rest, in motion, and in use.

Benefits

FED-M controls access to customer information on mobile devices to meet consumer and data privacy and protection legislation. Users can securely share files, revoke access to shared files immediately, regardless of location, and track and manage user and file activities in real-time.

Challenges

Many companies need to protect their regulated data better.  They typically protect the locations of files on mobile devices through an MDM solution rather than the file itself. As users share files and documents, this location or perimeter-based approach leaves the files vulnerable because the security does not travel with the document.

  • Security systems focusing on data movement are vulnerable to data misuse.
  • Security policies do not apply as users move documents from a protected location to the cloud or a mobile device, so users could deliberately or inadvertently share them with unauthorized users.
  • Users viewing sensitive data on their mobile devices could easily take a screenshot and share it.

Solutions

FED-M controls access to sensitive files on mobile devices through a dynamic security policy to prevent unauthorized users from viewing the documents, regardless of their location. This data-centric approach strengthens the company’s document security since security policies are consistent across all devices, platforms, and storage locations. Fasoo also provides data visibility and lineage through a unique embedded ID that travels with the file. This is critical to meet data privacy needs since the company can establish a link between files as users copy them or generate derivatives.

Benefits

Switching from the perimeter-based security system to the Fasoo data-centric solution allows companies to protect and manage all their regulated data.  Since so many employees access sensitive data on mobile devices, FED-M can help protect against violations of privacy regulations by limiting access to sensitive documents.  Audit logs simplify requirements to prove compliance by showing who accesses what files and when.

Challenges

A manufacturer needs to protect its intellectual property as engineers and manufacturing employees access sensitive documents on tablets and phones.  Its existing data security system focuses on protecting the locations of files on mobile devices rather than on the data itself.

  • As users and systems share files and documents, this perimeter-based approach leaves files containing sensitive data vulnerable because the security does not travel with the document.
  • Security policies do not apply as users move documents from a protected location to a mobile device, so users could deliberately or inadvertently share them with competitors or other unauthorized users.
  • Users viewing sensitive data on a tablet or phone could easily take a screenshot and share it with unauthorized users.

Solutions

FED-M allows controlled access to encrypted sensitive files on mobile devices using a dynamic security policy to prevent unauthorized users from viewing the documents. This data-centric security solution strengthens the company’s document security since security policies are consistent across all devices, platforms, and storage locations.

Benefits

Changing from the perimeter-based security system of an MDM to the Fasoo data-centric solution allows the manufacturing company to protect all its intellectual property from misuse.  Dynamic security policies limit access to sensitive files on tablets and phones as engineers and manufacturing employees view them.  Since the policies travel with the files if a user accidentally or deliberately emails a file to an unauthorized user, the data inside the file is not accessible.

FED-M

Meet with an FED-M
Sales Representative

Brochure

Learn more about
Fasoo Enterprise DRM

Resources

Want to see FED-M in Action?

Enter your information to speak with a Fasoo representative about how to protect, control, and track your mobile documents.

Book a meeting