Blog

Tag: risk management

Fasoo Shows Wrapsody Productivity and Security Platform at Gartner Symposium 2017Fasoo demonstrated the latest version of the Wrapsody productivity and security platform at the Gartner Symposium/ITxpo 2017 from October 2 – 5, 2017 in Orlando, FL.  There was a lot of interest from CIOs, other executives and security professionals as many are struggling with how to secure sensitive information while also providing enhanced productivity for documents or unstructured data.

This year’s Symposium continued Gartner’s focus on helping organizations transform into digital businesses, which is far more than just automating processes.  It includes a holistic change of thinking, where data is the driver of growth and secure business processes are a given.  Since documents make up about 80% of the information that drives business processes, simplifying secure collaboration with documents while enhancing governance and compliance are key components of digital business.

On Tuesday October 3, 2017, John Herring, President & CEO and Ron Arden, Executive Vice President and COO of Fasoo, Inc., presented “Content Services and Security Platform for Digital TransformationJohn talked about using John Herring presents at Gartner Symposium 2017the power of the Wrapsody file-centric security and information management platform to simplify and enhance collaboration as businesses grow.  The key to Wrapsody is a unique, persistent file ID that follows a document and allows secure sharing, distribution and tracking, and version control at the data source across all locations.  It allows organizations to address issues from risk management to business performance.  Ron followed John with an example of how Wrapsody enabled a company to quickly and easily create its budget for next year.  Since all collaboration and interaction was around the budget spreadsheet, it allowed all stakeholders to update their sections easily without having to search for who did what when and where is the latest copy of the document.  Wrapsody also has great analytics that allows different constituencies in the organization to track and manage security, compliance, governance and productivity.

During the course of the Symposium, a lot of attendees and analysts came to the Fasoo booth to understand how to break through the problems of traditional file shares and document repositories.  While those systems are great for organizing information, they are challenging when users have to collaborate outside the system and move files from repository to desktop to email and to the cloud.  Tracking and managing documents regardless of location and ensuring that everyone has the current version is a constant battle that affects productivity, governance and security.  Wrapsody simplifies this by bringing the process down to the file level and automatically synchronizes files as users create and work with them.

A number of attendees were also interested in how Fasoo can provide more granular permission controls with the Wrapsody platform for those scenarios that demand greater security.  When a user creates a Wrapsody document, the user assigns View or Revision permissions to those people that need to access the document.  The document is encrypted and allows collaboration through the organization and beyond.  If a user wants to further control an authorized user’s ability to Print, take a screenshot, run a macro or extract data to an unprotected environment, those permissions can be granted.  One CIO commented that she liked that flexibility, since some documents are more sensitive than others and will require greater controls.

With companies trying to improve productivity and comply with numerous new regulations, such as GDPR in Europe, Wrapsody provides access control and an audit trail of wherever the document has traveled. Document owners, department heads and security administrators can see how each document has been used through a graphical dashboard.  Since documents are always protected and tracked, regardless of location, complying with new cybersecurity regulations is a lot easier.  One CIO from a government agency liked the analytics, since he said that understanding what information he has and who is using it is a major challenge to security and data governance.

Of course no Gartner Symposium would be complete without a visit to an Orlando theme park.  This year’s attendees got to enjoy an evening at Universal Studios with great food, rides and a lot of fun.  Having a drink at an Irish pub or going on a roller coaster are great ways to meet new people and be a kid again.  It was a nice balance with the seriousness of the main event.

Fasoo Data Security FrameworkThe internet, its commercialization and all its technological advances have changed the way of the modern world. Unlimited information is available at the touch of a button; tasks that used to take time and effort are now much simpler.  All this technology created the opportunity for companies to find new and creative ways to grow revenues and data collection has become an essential component of many business operations.

As data is moving and multiplying at a rapid pace across boundaries, platforms and applications, users have the ability to access data in a variety of ways and data very rarely stays within the secure perimeter of an enterprise anymore.

With more and more sensitive data residing outside of the corporate perimeter, locating, securing and controlling this data presents a significant challenge.  The traditional security strategies that businesses have been relying on are no longer the viable option they once were.

Businesses need to understand the risks to their data, keeping up to date with the constantly evolving threat landscape. You shouldn’t be protecting the crown jewels of your business using only perimeter security technologies, since it’s obvious that they are no match for today’s criminals.

In our current perimeter-less world, many CISOs realize that data centric security is the best method to secure sensitive data. They realize that data is vulnerable to security breaches and theft and that encryption should go down to the document level to ensure that any document is safe where it is stored, while it is in transit, and when it is being viewed by any authorized users.  Security is now becoming part of every stage of a document’s lifecycle — from creation to transmission, storage, editing and retrieval.

Three building blocks are key to building a data-centric security framework:

1. Data Discovery – The ability to implement a data security and governance strategy begins by identifying sensitive data at the source, wherever that may be.  Security has to travel with the data, no matter where the data goes. By identifying and analyzing sensitive data, enterprises can focus on managing and securing it.  Data discovery allows you to understand relationships between users and data that is created.  It helps you see how information multiplies and proliferates within the perimeter and how it’s used by different groups, line of business and mobile applications.

2. Policy-based encryption and usage governance – This enables you to secure and define the types of data an authorized user can access based on their roles. Organizations need a baseline level of security that meets the overall company policy, but also higher security levels and controls for specific business units or users that need it.  A customer service representative may only need to see a customer’s order history, but not financial information.  Limiting what data authorized users can access and what actions they can take on this can greatly reduce the ability for a current or former employee to expose or steal sensitive data.  This approach can further demonstrate that an enterprise is enforcing security and privacy regulatory policies.

3. Risk Management – It is essential to visualize and manage risks by correlating logs of authorized data usage with other user activity.  Having a comprehensive view of how sensitive data exits a perimeter or as sensitive data appears where it is not supposed to be, can provide business managers a level of intervention for risk management.

Clearly data is imperative to conduct business today and this brings the need for security and protection of sensitive data; all the time, anywhere. A data-centric security framework does this and even goes further to provide enterprises with the ability to revoke all access to data as needed.

Categories
Book a meeting