Repository Document Security

Empower your security for repositories

Overview

Secure files downloaded from document repositories so they are controlled when outside the system throughout the entire document lifecycle.

Encrypt files and extend the access control list (ACL) from the repository to the documents as users download them from Microsoft SharePoint, IBM FileNet, or any ECM, EDM, ERP or groupware system. Since these systems do not control files when outside their environment, this extends your existing repository security model as users share files outside the system.

Key Features

Automatic File Encryption

Encrypt sensitive documents automatically as they are downloaded or saved on endpoints. Automatic data encryption can be enforced to selective file formats, including Microsoft Office, PDF, images, texts, source code, CAD applications and many more.

Different Access Control by Users/Groups

Apply different permissions such as view, edit, print, and screen capture to users and groups based on their permissions in the information system. Integrate with existing authentication systems so users use the same credentials they always use for document access. And with efficient security management and exception policies, the user's work is not affected.

Seamless Integration with Different ECM, EDM, ERP

Simplify the deployment process using API integration with different ECM, PLM, or other information systems, including Microsoft SharePoint, iManage, Egnyte, IBM FileNet, Laserfiche, and Alfresco.

Advanced File-Centric Security

Fasoo Enterprise DRM is the most advanced file-centric security solution that allows organizations to protect, control, and track sensitive documents. The solution meets the security requirements of different stages in the document lifecycle. By leveraging behavioral analytics and providing insights for policy optimization, Fasoo helps customers cut through the complexity and delivers the most secure solution for their files.

Download our Fasoo Enterprise DRM white paper now!

Use Cases

Stop unauthorized use of confidential data

Manage confidential data during M&A deals

Protect data downloaded from information systems

Challenges

A former employee of Morgan Stanley pleaded guilty to stealing confidential data from about 730,000 customer accounts. He downloaded a report from an information system with names, addresses, account numbers, investment information, and other data to his home computer to work on it. While improperly accessing the information, he was interviewing for a new job with two competitors.

  • Your employees access sensitive and confidential customer information so they can do their jobs.
  • Once the data leaves the protected confines of an information repository, file share, or cloud-based service, your authorized users can share it with anyone, do anything with it, and compromise your customer’s confidential information.
  • You may be subject to regulatory fines, not to mention losing customers because they can’t trust you to maintain their confidentiality.
  • You need to persistently protect confidential data so that customer information is protected regardless of where it goes and who has it.

Solutions

FED-R protects customer information by encrypting files and applying persistent security policies to protect them regardless of where they are or their format, leveraging the existing controls in your information system.

  • Once the data is protected, you can safely share sensitive files through email, USB drive, external portal, or any cloud-based file-sharing site.
  • File access is tracked in real-time for precise auditing, and you can revoke access instantly.
  • Fasoo Enterprise DRM not only ensures that you meet financial regulations and safeguard customer confidentiality but also protects and controls sensitive information at rest, in motion, and in use.

Benefits

FED-R encrypts customer information to meet consumer and data privacy and protection legislation. Employees can securely share files internally or externally and control who can view, edit, print, and take a screen capture. They can limit access time and a number of devices, revoke access to shared files immediately regardless of location, and track and manage user and file activities in real-time.

Challenges

Mergers and acquisitions (M&A) transactions often involve intensive collaboration between investment bankers, lawyers, accountants, auditors, and other deal participants from various companies.

  • They share many confidential M&A documents, and it is crucial to safeguard them during and after the process.
  • Deal participants may download and share sensitive documents from a virtual deal room (repository) with non-participating members or other unauthorized users, deliberately or by mistake.
  • This could put your deal at risk. Once the M&A project is complete, all sensitive documents on local servers, cloud storage locations, and personal devices should be discarded.

Solutions

Fasoo Enterprise DRM for Repository provides data-centric security to secure virtual deal rooms.

  • All M&A-related documents in the virtual deal rooms are automatically encrypted at download; only specific groups can access the protected documents.
  • After closing an M&A deal, the deal room or other repository stores the final copies. 
  • The security administrator revokes all transaction documents on desktops, mobile devices, email, file servers, cloud repositories, and other storage locations, disabling user access to all other copies.

Benefits

FED-R encrypts deal information to meet data privacy and protection requirements. Users securely share files with deal participants, control who can View, Edit, Print, and take a Screen Capture of files, track and manage user and file activities in real-time, and revoke access to M&A transaction files immediately, regardless of location. FED-R also applies efficient security management/operations with exception policies.

Challenges

Organizations maintain relatively strong protection policies for documents in information systems using various security tools or techniques. When authorized users access these documents for legitimate purposes, they may save them as PDF files or share them in other formats.

  • These file derivatives are vulnerable to misuse and often overlooked as a source of a data breach.
  • Allowing authorized users to download sensitive documents while maintaining persistent protection of sensitive data is critical to protecting your customers and business.

Solutions

FED-R automatically encrypts and applies persistent protection policies to documents when saved (localized) to desktops.

  • When an authorized user downloads a document and saves it in PDF or other format, the file is automatically encrypted and only accessible by authorized users.
  • When a user copies the file to an external storage device or a cloud location or shares it through email, unauthorized users cannot access it.
  • This ensures your sensitive data remains in the hands of authorized users.

Benefits

FED-R encrypts customer or other sensitive information downloaded from information systems, enabling the company to meet data privacy and protection legislation. Users can control who can view, edit, print, and take a screen capture of sensitive files, including any derivatives or copies, and revoke access to shared files immediately, regardless of location.  The organization can track and manage user and file activities in real time, providing a sense of security and control over your data.

FED-R

Meet with an FED-R
Sales Representative

Brochure

Learn more about
Fasoo Enterprise DRM

Resources

Want to see FED-R in Action?

Enter your information to speak with a Fasoo representative about how to protect, control, and track documents at rest, in transit, and in use.

Book a meeting