SlideShare une entreprise Scribd logo
1  sur  32
Company and Product Overview 
1Q/2014 
FSD for SharePoint 
1
Company 
Overview 
2 
 Founded in June, 2000 
 Specializes in Enterprise DRM (EDRM) solutions and services 
 Holds 270 employees, and more than 60% of employees has 
security consulting or DRM engineering backgrounds 
 Deployed over 1,200 organizations for more than 2 million users 
 Most of customers have deployed the solutions in enterprise-wide 
scale, and 20+ customers have the deployment of over 100,000 
users worldwide 
 Launched DigitalQuick (secure cloud collaboration) in 2013 
External Communication
Value Proposition 
3 
 Protects valuable information such as trade secrets & classified 
information beyond controlled boundaries (data-centric) 
 Ensures valuable digital assets are only viewed by the intended 
audience and unauthorized copies of documents are not produced 
and circulated 
 Reduces the risk of intellectual property loss while collaborating 
with 3rd parties 
Secure Inter- 
Organizational 
Communications 
External Communication 
Effective 
Knowledge 
Management 
Regulatory 
Compliance
New Challenges 
4 
 Tightened regulation and compliance around PII and data integrity 
 Growing concerns of losing intellectual properties and trade 
secrets 
 Increasing threats by insiders/authorized users 
 New data security demands in cloud, mobile and social computing 
External Communication
Problems in 
Conventional 
Security 
5 
 Conventional security solutions (Firewall, IPS, VPN, DLP) basically 
establish a physical boundary whose inside is assumed safe 
 Difficult to set up an effective policy against unfaithful insiders and 
smart hackers 
 In cloud and mobile computing environment, it is impossible to 
define the physical boundary of safe inside 
 These limitations have been seen repeatedly through a series of 
PII leak incidents 
External Communication
Fasoo 
Enterprise 
DRM 
6 
 Fasoo Enterprise DRM safeguards and prevents unauthorized use 
of digital files and provides consistent and reliable protection of 
the documents with effective file encryption, permission control 
and audit trail technologies. 
 The solution offers customers persistent document security 
through encryption technologies that limit document access and 
rights. 
 It allows enterprises to prevent unintended information disclosure 
or exposure, ensure a secure information sharing environment, 
better manage workflows and simplify secure collaboration. 
External Communication
As-Is 
Steve in Sales 
Sam in Sales 
Sam creates and 
shares price list with 
Steve. 
Steve reviews & 
shares the final 
version to Fred in 
Finance. 
Fred in Finance 
Fred receives the list 
from Seth via email, 
and makes updates 
(incl. PII) on his ledger. 
Cam, Contractor 
Cameron can 
print any 
document. 
Ex-Employee 
Ex-employees can access 
any document (copied 
while he was with 
previous organization). 
Business Traveler 
Partner Employee 
External users 
could access 
documents with 
full access 
Business 
travelers could 
access 
documents with 
full permission. 
Security 
Vulnerability 
External Communication 7
To-Be 
Steve in Sales 
Sam in Sales 
Sam creates and 
shares price list with 
Steve. 
Steve reviews & 
shares the final 
version to Fred in 
Finance. 
Fred in Finance 
Fred receives the list 
from Seth via email, 
and makes updates 
(incl. PII) on his ledger. 
Cam, Contractor 
Business travelers could 
access protected documents 
via offline license, but have 
limited permission. 
Cameron prints protected 
documents, and visible 
watermark is placed on non-PII 
documents. However, Cameron 
cannot print documents w/ PII. 
Ex-Employee 
Ex-employees attempt to 
access protected 
document, but have no 
access to protected 
documents. 
Business Traveler 
Partner Employee 
External users with appropriate credentials 
could access FSE-enabled documents using 
automated email authentication. 
Gained abilities to Protected 
secure, control and 
track sensitive 
documents no matter 
where they are. 
Security Admin 
External Communication 8
General Flow of 
Data and SW 
Components 
DRM Packager 
DRM Client/Agent 
Mobile App 
DRM Server Mobile Gateway 
External Communication 9
Characteristic 
10 
 Fasoo secures information persistently regardless of location or 
whether it is at rest, in transit or in use. 
 Products manage documents created locally at a PC, created and 
stored inside a document repository, such as Microsoft 
SharePoint, or created and distributed to ad-hoc external users, 
using email, FTP, file sharing services, USB drives or other 
distribution methods. 
 Documents are encrypted and access is controlled through a 
policy (License) defined by administrators or document creators. 
 Since a DRM Client controls access to the rendering application, 
access is only granted through a License. 
 Each time a user accesses a document, the DRM Client contacts 
the DRM Server for a License. 
 This enables an administrator or document creator to change 
access permissions dynamically and even revoke access to a 
document once the document is created and distributed. 
External Communication
FSD 
--------------------- 
Protects/controls/tracks 
documents have left the 
protective confines of the 
repository 
--------------------- 
 FSD Server 
 FSD Server-Packager 
DRM Client 
Item Description 
Encryption • FSD Server-Packager (encryption module) integrates with web server of 
repository to encrypt target documents automatically. 
• While encrypting documents, the module is also injecting metadata (e.g., 
document’s library path, repository’s ID, FSD Server ID, etc. as DRM/IRM policy 
identifiers). 
• Even if the encrypted documents are being edited at desktops, its derivatives 
also maintain the consistent DRM policy by the client. 
Authentication • FSD Server communicates either repository, user directory (e.g., AD) or 3rd 
party authentication tool to validate user credentials. 
Policy • FSD Server communicates with repository by sending document ID (e.g., 
document’s library path, file ID, etc.) and user ID, then is mapping the user’s 
repository permission (e.g., Read, Contribute, Full Control, etc.) with DRM 
permission (e.g., View, Edit, Capture, Watermark, etc.) 
• After permission mapping, FSD Server generates permission License file, then 
sends back to the user (DRM Client) for document access. 
Audit trail • DRM Client sends document usage logs (e.g., user ID, file ID, device, network 
information) back to FSD Server periodically. 
External Communication 11
FSD 
--------------------- 
General Flow of Data 
and SW Components 
User 1 Repository User Directory 
(AD) 
FSD Server 
User 2 (w/ 
credentials) 
User 3 (w/o 
credentials) 
Has View/Edit, 
but no Print/Capture 
permissions 
External Communication 12
FSD for 
SharePoint 
--------------------- 
Enabling IRM for Document 
Library –Encrypting on the 
fly (1) 
Confidential 13
FSD for 
SharePoint 
--------------------- 
Enabling IRM for Document 
Library –Encrypting on the 
fly (2) 
Confidential 14
FSD for 
SharePoint 
-------------------- 
Setting IRM Permission for 
Document Library (1) 
Confidential 15
FSD for 
SharePoint 
-------------------- 
Setting IRM Permission for 
Document Library (2) 
Confidential 16
FSD for 
SharePoint 
-------------------- 
Setting IRM Permission for 
Document Library (3) 
Confidential 17
FSD for 
SharePoint 
--------------------Allowing 
administrators to grant 
Print/Screen Capture/Office 
Access to users/groups 
Confidential 18
Customizable 
Permission 
Mapping 
--------------------Allowing 
administrators to map 
existing SharePoint list 
permissions 
SP Permission Level DRM Permission Level (Detail DRM Permission) 
Read, Restricted Read or View Only View (VIEW) 
Design, Approve or Contribute Edit (VIEW, EDIT, SECURE_SAVE, SECURE_EXTRACT) 
Full Control or Manage Hierarchy Full (VIEW, EDIT, SECURE_SAVE, SAVE, 
SECURE_EXTRACT, EXTRACT) 
n/a Print (PRINT, SECURE_PRINT) 
n/a Screen Capture (PRINT_SCREEN) 
SP Permission DRM Permission Level (Detail DRM Permission) 
ViewListItem View (VIEW) 
EditListItems, ManageList or AddandCustomizePages Edit (VIEW, EDIT, SECURE_SAVE, SECURE_EXTRACT) 
ManagePermissions, ManageWeb or FullMask Full (VIEW, EDIT, SECURE_SAVE, SAVE, 
SECURE_EXTRACT, EXTRACT) 
n/a Print (PRINT, SECURE_PRINT) 
n/a Screen Capture (PRINT_SCREEN) 
Confidential 19
Direct File Access 
in SharePoint 
--------------------Opening a 
protected document in the 
protected library 
*In case of PDF file, user will be 
asked to download a copy 
(protected) at local PC 
Confidential 20
Direct File 
Editing/Saving in 
SharePoint 
--------------------Saving a 
protected document 
directly to the same library 
*In case of PowerPoint, direct 
editing is restricted, and user must 
download a copy (protected), and 
upload the revised file. 
Confidential 21
Persistent 
Protection & 
Dynamic 
Permission 
Control 
--------------------- 
If a protected document 
(lock icon) is saved at PC, 
local copy maintains a 
consistent policy of the 
protected library/object 
store folder. 
External Communication 22
Secure Extract 
--------------------- 
If a protected document is 
edited at PC, its derivative 
(e.g., PDF) maintains a 
consistent policy of the 
protected library/object 
store folder. 
External Communication 23
Secure Copy & 
Paste 
--------------------- 
Copy/cut & paste (drag & 
drop) is only allowed 
within/between protected 
documents, and does not 
allow users (w/ edit 
capability) to extract 
content from protected 
document to unprotected 
file. 
External Communication 24
Screen Capture 
Prevention (1) 
--------------------- 
Screen capture can only be 
allowed when user has 
appropriate user 
credentials. 
External Communication 25
Screen Capture 
Prevention (2) 
--------------------- 
Screen capture can only be 
allowed when user has 
appropriate user 
credentials. 
External Communication 26
Customer Benefit 
Raising 
Competitive 
Advantages 
Optimizing 
Productivity 
Data- 
Centric 
Security 
External Communication 27
Fasoo 
Enterprise 
DRM (FED) 
Suite 
Desktop 
Repository 
External 
Print 
Display 
Context-Aware 
Pattern-Based 
Mobile 
External Communication 28
Key Differentiator 
--------------------- 
Longevity, 
Breadth of Solution 
29 
 Longevity 
‐ Fasoo is a leading DRM/IRM company in the global market. Since 
2000, Fasoo has focused its efforts on protecting clients' critical 
information from unauthorized users. Most other DRM/IRM focused 
companies have been acquired or altered their focus. 
 Breadth of solution 
‐ Based on the 14+ years of DRM/IRM focus, Fasoo has been able to 
build an extremely broad solution set with the ability to handle the 
enterprise requirements of data stored in repositories, created on 
local devices and transmitted through Ad-hoc means. Fasoo 
continues to develop products to meet the changing requirements 
including adding Mobile Device Support (iOS, Android), Cloud 
Sharing Support (like Dropbox) and soon to be released support for 
Mac. No other products in the market can satisfy the enterprise 
requirements like Fasoo. 
External Communication
Key Differentiator 
--------------------- 
Flexibility, 
Scalability 
30 
 Flexibility 
‐ Fasoo understands that the market is extremely broad and while 
current solutions can integrate with key market leading products like 
SharePoint (repository) Outlook (email), organizations may have 
proprietary needs. As a result, Fasoo has SDKs with APIs available in 
Java, C and C++ for integration into any document repository. 
 Scalability 
‐ Fasoo has proven to scale within some of the largest environments 
in the world. Large portion of Fasoo customers have the 
deployment of over 10,000 users enterprise-wide, and more than 20 
customers have the deployment of over 100,000 users worldwide. 
External Communication
Key Differentiator 
--------------------- 
Extensive Application 
Coverage, 
Mobile Platforms 
31 
 Extensive application coverage 
‐ Fasoo supports an extremely broad base of rendering applications. 
While most companies only support Microsoft Office and Adobe 
PDF, Fasoo extends to nearly 50 applications and exponentially 
more file types. Fasoo has the ability to extend the application 
support upon client's request. 
 Mobile platforms 
‐ Access to content is no longer restricted to the PC. With the mobile 
device explosion, it is critical that DRM/IRM solutions enable at a 
minimum the ability to view files on a iOS or Android device. As a 
result in 2011, Fasoo released its proprietary iOS and Android App. 
External Communication
Wrap-up and Q&A 
inquiry@fasoo.com 
32

Contenu connexe

Tendances

Enterprise Mobility Suite-Microsoft Intune
Enterprise Mobility Suite-Microsoft IntuneEnterprise Mobility Suite-Microsoft Intune
Enterprise Mobility Suite-Microsoft Intune
Lai Yoong Seng
 
Δωδεκαθεϊσμός
ΔωδεκαθεϊσμόςΔωδεκαθεϊσμός
Δωδεκαθεϊσμός
filipposh
 
Aula 01 resumão de arquivologia p mpu - técnico administrativo
Aula 01  resumão de arquivologia p mpu - técnico administrativoAula 01  resumão de arquivologia p mpu - técnico administrativo
Aula 01 resumão de arquivologia p mpu - técnico administrativo
gigra
 
2.4 Η ΥΠΕΡΑΣΠΙΣΗ ΤΩΝ ΑΝΘΡΩΠΙΝΩΝ ΔΙΚΑΙΩΜΑΤΩΝ
2.4 Η ΥΠΕΡΑΣΠΙΣΗ ΤΩΝ ΑΝΘΡΩΠΙΝΩΝ ΔΙΚΑΙΩΜΑΤΩΝ2.4 Η ΥΠΕΡΑΣΠΙΣΗ ΤΩΝ ΑΝΘΡΩΠΙΝΩΝ ΔΙΚΑΙΩΜΑΤΩΝ
2.4 Η ΥΠΕΡΑΣΠΙΣΗ ΤΩΝ ΑΝΘΡΩΠΙΝΩΝ ΔΙΚΑΙΩΜΑΤΩΝ
Ελενη Ζαχου
 
ΔΕ 15. Συναγμένοι στη Θεία Ευχαριστία η ουσία της Εκκλησίας
ΔΕ 15.  Συναγμένοι στη Θεία Ευχαριστία η ουσία της Εκκλησίας  ΔΕ 15.  Συναγμένοι στη Θεία Ευχαριστία η ουσία της Εκκλησίας
ΔΕ 15. Συναγμένοι στη Θεία Ευχαριστία η ουσία της Εκκλησίας
ΠΕ 01 ΜΠΑΛΤΟΣ ΙΩΑΝΝΗΣ
 
Streamlining Contract Management with M-Files
Streamlining Contract Management with M-FilesStreamlining Contract Management with M-Files
Streamlining Contract Management with M-Files
Artem Shpachenko
 

Tendances (20)

Microsoft Azure Information Protection
Microsoft Azure Information Protection Microsoft Azure Information Protection
Microsoft Azure Information Protection
 
IAM Methods 2.0 Presentation Michael Nielsen Deloitte
IAM Methods 2.0 Presentation Michael Nielsen DeloitteIAM Methods 2.0 Presentation Michael Nielsen Deloitte
IAM Methods 2.0 Presentation Michael Nielsen Deloitte
 
Overview of Digital transformation and Microsoft 365
Overview of Digital transformation and Microsoft 365Overview of Digital transformation and Microsoft 365
Overview of Digital transformation and Microsoft 365
 
Enterprise Mobility Suite-Microsoft Intune
Enterprise Mobility Suite-Microsoft IntuneEnterprise Mobility Suite-Microsoft Intune
Enterprise Mobility Suite-Microsoft Intune
 
Intro to Office 365 Admin
Intro to Office 365 AdminIntro to Office 365 Admin
Intro to Office 365 Admin
 
OBCS-PPT-sehhia (1).pptx
OBCS-PPT-sehhia (1).pptxOBCS-PPT-sehhia (1).pptx
OBCS-PPT-sehhia (1).pptx
 
3.3α ΠΟΛΥΠΟΛΙΤΙΣΜΙΚΟΤΗΤΑ ΚΑΙ ΠΕΝΤΗΚΟΣΤΗ
3.3α ΠΟΛΥΠΟΛΙΤΙΣΜΙΚΟΤΗΤΑ ΚΑΙ ΠΕΝΤΗΚΟΣΤΗ3.3α ΠΟΛΥΠΟΛΙΤΙΣΜΙΚΟΤΗΤΑ ΚΑΙ ΠΕΝΤΗΚΟΣΤΗ
3.3α ΠΟΛΥΠΟΛΙΤΙΣΜΙΚΟΤΗΤΑ ΚΑΙ ΠΕΝΤΗΚΟΣΤΗ
 
Tackling SharePoint Site And Microsoft Teams Sprawl In Microsoft 365 What You...
Tackling SharePoint Site And Microsoft Teams Sprawl In Microsoft 365 What You...Tackling SharePoint Site And Microsoft Teams Sprawl In Microsoft 365 What You...
Tackling SharePoint Site And Microsoft Teams Sprawl In Microsoft 365 What You...
 
SharePoint Site IA Architecture Design Considerations - Innovate Vancouver.pdf
SharePoint Site IA Architecture Design Considerations - Innovate Vancouver.pdfSharePoint Site IA Architecture Design Considerations - Innovate Vancouver.pdf
SharePoint Site IA Architecture Design Considerations - Innovate Vancouver.pdf
 
Δωδεκαθεϊσμός
ΔωδεκαθεϊσμόςΔωδεκαθεϊσμός
Δωδεκαθεϊσμός
 
Aula 01 resumão de arquivologia p mpu - técnico administrativo
Aula 01  resumão de arquivologia p mpu - técnico administrativoAula 01  resumão de arquivologia p mpu - técnico administrativo
Aula 01 resumão de arquivologia p mpu - técnico administrativo
 
Os Desafios da Preservação de Documentos Digitais
Os Desafios da Preservação de Documentos DigitaisOs Desafios da Preservação de Documentos Digitais
Os Desafios da Preservação de Documentos Digitais
 
Office 365 Mail migration strategies
Office 365 Mail migration strategiesOffice 365 Mail migration strategies
Office 365 Mail migration strategies
 
Aula 01 - Recuperação da Informação
Aula 01 - Recuperação da InformaçãoAula 01 - Recuperação da Informação
Aula 01 - Recuperação da Informação
 
1.5α Η ΣΧΕΣΗ ΜΑΣ ΜΕ ΤΟΝ ΘΕΟ
1.5α Η ΣΧΕΣΗ ΜΑΣ ΜΕ ΤΟΝ ΘΕΟ1.5α Η ΣΧΕΣΗ ΜΑΣ ΜΕ ΤΟΝ ΘΕΟ
1.5α Η ΣΧΕΣΗ ΜΑΣ ΜΕ ΤΟΝ ΘΕΟ
 
2.4 Η ΥΠΕΡΑΣΠΙΣΗ ΤΩΝ ΑΝΘΡΩΠΙΝΩΝ ΔΙΚΑΙΩΜΑΤΩΝ
2.4 Η ΥΠΕΡΑΣΠΙΣΗ ΤΩΝ ΑΝΘΡΩΠΙΝΩΝ ΔΙΚΑΙΩΜΑΤΩΝ2.4 Η ΥΠΕΡΑΣΠΙΣΗ ΤΩΝ ΑΝΘΡΩΠΙΝΩΝ ΔΙΚΑΙΩΜΑΤΩΝ
2.4 Η ΥΠΕΡΑΣΠΙΣΗ ΤΩΝ ΑΝΘΡΩΠΙΝΩΝ ΔΙΚΑΙΩΜΑΤΩΝ
 
ΔΕ 15. Συναγμένοι στη Θεία Ευχαριστία η ουσία της Εκκλησίας
ΔΕ 15.  Συναγμένοι στη Θεία Ευχαριστία η ουσία της Εκκλησίας  ΔΕ 15.  Συναγμένοι στη Θεία Ευχαριστία η ουσία της Εκκλησίας
ΔΕ 15. Συναγμένοι στη Θεία Ευχαριστία η ουσία της Εκκλησίας
 
γοτθικό ρυθμός τελικο
γοτθικό ρυθμός τελικογοτθικό ρυθμός τελικο
γοτθικό ρυθμός τελικο
 
Streamlining Contract Management with M-Files
Streamlining Contract Management with M-FilesStreamlining Contract Management with M-Files
Streamlining Contract Management with M-Files
 
Enabling Sharing & Collaboration in OneDrive & SharePoint
Enabling Sharing & Collaboration in OneDrive & SharePointEnabling Sharing & Collaboration in OneDrive & SharePoint
Enabling Sharing & Collaboration in OneDrive & SharePoint
 

Similaire à Fasoo Secure Document (FSD) for SharePoint

Sanctuary Device Control
Sanctuary Device ControlSanctuary Device Control
Sanctuary Device Control
HassaanSahloul
 
Stealth Extranet for SharePoint_datasheet
Stealth Extranet for SharePoint_datasheetStealth Extranet for SharePoint_datasheet
Stealth Extranet for SharePoint_datasheet
Mark Stratman
 
FinalCode-At-A-Glance-Webcopy-Optimized
FinalCode-At-A-Glance-Webcopy-OptimizedFinalCode-At-A-Glance-Webcopy-Optimized
FinalCode-At-A-Glance-Webcopy-Optimized
Phillip Stalnaker
 
Secure File SharingSecure File Sharing Using Access Contro.docx
Secure File SharingSecure File Sharing Using Access Contro.docxSecure File SharingSecure File Sharing Using Access Contro.docx
Secure File SharingSecure File Sharing Using Access Contro.docx
jeffreye3
 

Similaire à Fasoo Secure Document (FSD) for SharePoint (20)

DLP and MDM Datasheet
DLP and MDM DatasheetDLP and MDM Datasheet
DLP and MDM Datasheet
 
Secure Enterprise File Sharing and Mobile Content Management
Secure Enterprise File Sharing and Mobile Content ManagementSecure Enterprise File Sharing and Mobile Content Management
Secure Enterprise File Sharing and Mobile Content Management
 
CSE_Instructor_Materials_Chapter7.pptx
CSE_Instructor_Materials_Chapter7.pptxCSE_Instructor_Materials_Chapter7.pptx
CSE_Instructor_Materials_Chapter7.pptx
 
Why ClouDoc to protect CAD files?
Why ClouDoc to protect CAD files? Why ClouDoc to protect CAD files?
Why ClouDoc to protect CAD files?
 
Sanctuary Device Control
Sanctuary Device ControlSanctuary Device Control
Sanctuary Device Control
 
Maintain A Secure, Independent Network For Survey Projects
Maintain A Secure, Independent Network For Survey Projects Maintain A Secure, Independent Network For Survey Projects
Maintain A Secure, Independent Network For Survey Projects
 
IRJET- Document Management System, Open Source and Secure
IRJET-  	  Document Management System, Open Source and SecureIRJET-  	  Document Management System, Open Source and Secure
IRJET- Document Management System, Open Source and Secure
 
Glasswall - Safety and Integrity Through Trusted Files
Glasswall - Safety and Integrity Through Trusted FilesGlasswall - Safety and Integrity Through Trusted Files
Glasswall - Safety and Integrity Through Trusted Files
 
SOFTCAMP SHIELDEX AD
SOFTCAMP SHIELDEX AD SOFTCAMP SHIELDEX AD
SOFTCAMP SHIELDEX AD
 
Fasoo Company And Product Information
Fasoo Company And Product InformationFasoo Company And Product Information
Fasoo Company And Product Information
 
DG_Architecture_Training.pptx
DG_Architecture_Training.pptxDG_Architecture_Training.pptx
DG_Architecture_Training.pptx
 
DSS @Arrow_Inspiration_Roadshow_2013_Symantec_Extends_Encryption_Offerings
DSS @Arrow_Inspiration_Roadshow_2013_Symantec_Extends_Encryption_OfferingsDSS @Arrow_Inspiration_Roadshow_2013_Symantec_Extends_Encryption_Offerings
DSS @Arrow_Inspiration_Roadshow_2013_Symantec_Extends_Encryption_Offerings
 
Wave 14 - Winodws 7 Security Story Core by MVP Azra Rizal
Wave 14 - Winodws 7 Security Story Core by MVP Azra RizalWave 14 - Winodws 7 Security Story Core by MVP Azra Rizal
Wave 14 - Winodws 7 Security Story Core by MVP Azra Rizal
 
Stealth Extranet for SharePoint_datasheet
Stealth Extranet for SharePoint_datasheetStealth Extranet for SharePoint_datasheet
Stealth Extranet for SharePoint_datasheet
 
Document Management System - docManager
Document Management System - docManagerDocument Management System - docManager
Document Management System - docManager
 
FinalCode-At-A-Glance-Webcopy-Optimized
FinalCode-At-A-Glance-Webcopy-OptimizedFinalCode-At-A-Glance-Webcopy-Optimized
FinalCode-At-A-Glance-Webcopy-Optimized
 
Digital Rights Management One For Sharepoint
Digital Rights Management One For SharepointDigital Rights Management One For Sharepoint
Digital Rights Management One For Sharepoint
 
Document Management System or Digital Folder.pptx
Document Management System or Digital Folder.pptxDocument Management System or Digital Folder.pptx
Document Management System or Digital Folder.pptx
 
Secure File SharingSecure File Sharing Using Access Contro.docx
Secure File SharingSecure File Sharing Using Access Contro.docxSecure File SharingSecure File Sharing Using Access Contro.docx
Secure File SharingSecure File Sharing Using Access Contro.docx
 
Understanding Microsoft Teams Security & Compliance features and plan for Gov...
Understanding Microsoft Teams Security & Compliance features and plan for Gov...Understanding Microsoft Teams Security & Compliance features and plan for Gov...
Understanding Microsoft Teams Security & Compliance features and plan for Gov...
 

Dernier

%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...
%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...
%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...
masabamasaba
 
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
masabamasaba
 
%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...
%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...
%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...
masabamasaba
 
Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...
Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...
Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...
Medical / Health Care (+971588192166) Mifepristone and Misoprostol tablets 200mg
 

Dernier (20)

%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...
%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...
%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...
 
tonesoftg
tonesoftgtonesoftg
tonesoftg
 
Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...
Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...
Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...
 
Software Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsSoftware Quality Assurance Interview Questions
Software Quality Assurance Interview Questions
 
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
 
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
 
%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...
%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...
%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...
 
%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisa%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisa
 
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
 
Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...
Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...
Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...
 
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
 
Define the academic and professional writing..pdf
Define the academic and professional writing..pdfDefine the academic and professional writing..pdf
Define the academic and professional writing..pdf
 
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital TransformationWSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
 
8257 interfacing 2 in microprocessor for btech students
8257 interfacing 2 in microprocessor for btech students8257 interfacing 2 in microprocessor for btech students
8257 interfacing 2 in microprocessor for btech students
 
%in Harare+277-882-255-28 abortion pills for sale in Harare
%in Harare+277-882-255-28 abortion pills for sale in Harare%in Harare+277-882-255-28 abortion pills for sale in Harare
%in Harare+277-882-255-28 abortion pills for sale in Harare
 
Microsoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdfMicrosoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdf
 
WSO2CON2024 - It's time to go Platformless
WSO2CON2024 - It's time to go PlatformlessWSO2CON2024 - It's time to go Platformless
WSO2CON2024 - It's time to go Platformless
 
VTU technical seminar 8Th Sem on Scikit-learn
VTU technical seminar 8Th Sem on Scikit-learnVTU technical seminar 8Th Sem on Scikit-learn
VTU technical seminar 8Th Sem on Scikit-learn
 
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
 

Fasoo Secure Document (FSD) for SharePoint

  • 1. Company and Product Overview 1Q/2014 FSD for SharePoint 1
  • 2. Company Overview 2  Founded in June, 2000  Specializes in Enterprise DRM (EDRM) solutions and services  Holds 270 employees, and more than 60% of employees has security consulting or DRM engineering backgrounds  Deployed over 1,200 organizations for more than 2 million users  Most of customers have deployed the solutions in enterprise-wide scale, and 20+ customers have the deployment of over 100,000 users worldwide  Launched DigitalQuick (secure cloud collaboration) in 2013 External Communication
  • 3. Value Proposition 3  Protects valuable information such as trade secrets & classified information beyond controlled boundaries (data-centric)  Ensures valuable digital assets are only viewed by the intended audience and unauthorized copies of documents are not produced and circulated  Reduces the risk of intellectual property loss while collaborating with 3rd parties Secure Inter- Organizational Communications External Communication Effective Knowledge Management Regulatory Compliance
  • 4. New Challenges 4  Tightened regulation and compliance around PII and data integrity  Growing concerns of losing intellectual properties and trade secrets  Increasing threats by insiders/authorized users  New data security demands in cloud, mobile and social computing External Communication
  • 5. Problems in Conventional Security 5  Conventional security solutions (Firewall, IPS, VPN, DLP) basically establish a physical boundary whose inside is assumed safe  Difficult to set up an effective policy against unfaithful insiders and smart hackers  In cloud and mobile computing environment, it is impossible to define the physical boundary of safe inside  These limitations have been seen repeatedly through a series of PII leak incidents External Communication
  • 6. Fasoo Enterprise DRM 6  Fasoo Enterprise DRM safeguards and prevents unauthorized use of digital files and provides consistent and reliable protection of the documents with effective file encryption, permission control and audit trail technologies.  The solution offers customers persistent document security through encryption technologies that limit document access and rights.  It allows enterprises to prevent unintended information disclosure or exposure, ensure a secure information sharing environment, better manage workflows and simplify secure collaboration. External Communication
  • 7. As-Is Steve in Sales Sam in Sales Sam creates and shares price list with Steve. Steve reviews & shares the final version to Fred in Finance. Fred in Finance Fred receives the list from Seth via email, and makes updates (incl. PII) on his ledger. Cam, Contractor Cameron can print any document. Ex-Employee Ex-employees can access any document (copied while he was with previous organization). Business Traveler Partner Employee External users could access documents with full access Business travelers could access documents with full permission. Security Vulnerability External Communication 7
  • 8. To-Be Steve in Sales Sam in Sales Sam creates and shares price list with Steve. Steve reviews & shares the final version to Fred in Finance. Fred in Finance Fred receives the list from Seth via email, and makes updates (incl. PII) on his ledger. Cam, Contractor Business travelers could access protected documents via offline license, but have limited permission. Cameron prints protected documents, and visible watermark is placed on non-PII documents. However, Cameron cannot print documents w/ PII. Ex-Employee Ex-employees attempt to access protected document, but have no access to protected documents. Business Traveler Partner Employee External users with appropriate credentials could access FSE-enabled documents using automated email authentication. Gained abilities to Protected secure, control and track sensitive documents no matter where they are. Security Admin External Communication 8
  • 9. General Flow of Data and SW Components DRM Packager DRM Client/Agent Mobile App DRM Server Mobile Gateway External Communication 9
  • 10. Characteristic 10  Fasoo secures information persistently regardless of location or whether it is at rest, in transit or in use.  Products manage documents created locally at a PC, created and stored inside a document repository, such as Microsoft SharePoint, or created and distributed to ad-hoc external users, using email, FTP, file sharing services, USB drives or other distribution methods.  Documents are encrypted and access is controlled through a policy (License) defined by administrators or document creators.  Since a DRM Client controls access to the rendering application, access is only granted through a License.  Each time a user accesses a document, the DRM Client contacts the DRM Server for a License.  This enables an administrator or document creator to change access permissions dynamically and even revoke access to a document once the document is created and distributed. External Communication
  • 11. FSD --------------------- Protects/controls/tracks documents have left the protective confines of the repository ---------------------  FSD Server  FSD Server-Packager DRM Client Item Description Encryption • FSD Server-Packager (encryption module) integrates with web server of repository to encrypt target documents automatically. • While encrypting documents, the module is also injecting metadata (e.g., document’s library path, repository’s ID, FSD Server ID, etc. as DRM/IRM policy identifiers). • Even if the encrypted documents are being edited at desktops, its derivatives also maintain the consistent DRM policy by the client. Authentication • FSD Server communicates either repository, user directory (e.g., AD) or 3rd party authentication tool to validate user credentials. Policy • FSD Server communicates with repository by sending document ID (e.g., document’s library path, file ID, etc.) and user ID, then is mapping the user’s repository permission (e.g., Read, Contribute, Full Control, etc.) with DRM permission (e.g., View, Edit, Capture, Watermark, etc.) • After permission mapping, FSD Server generates permission License file, then sends back to the user (DRM Client) for document access. Audit trail • DRM Client sends document usage logs (e.g., user ID, file ID, device, network information) back to FSD Server periodically. External Communication 11
  • 12. FSD --------------------- General Flow of Data and SW Components User 1 Repository User Directory (AD) FSD Server User 2 (w/ credentials) User 3 (w/o credentials) Has View/Edit, but no Print/Capture permissions External Communication 12
  • 13. FSD for SharePoint --------------------- Enabling IRM for Document Library –Encrypting on the fly (1) Confidential 13
  • 14. FSD for SharePoint --------------------- Enabling IRM for Document Library –Encrypting on the fly (2) Confidential 14
  • 15. FSD for SharePoint -------------------- Setting IRM Permission for Document Library (1) Confidential 15
  • 16. FSD for SharePoint -------------------- Setting IRM Permission for Document Library (2) Confidential 16
  • 17. FSD for SharePoint -------------------- Setting IRM Permission for Document Library (3) Confidential 17
  • 18. FSD for SharePoint --------------------Allowing administrators to grant Print/Screen Capture/Office Access to users/groups Confidential 18
  • 19. Customizable Permission Mapping --------------------Allowing administrators to map existing SharePoint list permissions SP Permission Level DRM Permission Level (Detail DRM Permission) Read, Restricted Read or View Only View (VIEW) Design, Approve or Contribute Edit (VIEW, EDIT, SECURE_SAVE, SECURE_EXTRACT) Full Control or Manage Hierarchy Full (VIEW, EDIT, SECURE_SAVE, SAVE, SECURE_EXTRACT, EXTRACT) n/a Print (PRINT, SECURE_PRINT) n/a Screen Capture (PRINT_SCREEN) SP Permission DRM Permission Level (Detail DRM Permission) ViewListItem View (VIEW) EditListItems, ManageList or AddandCustomizePages Edit (VIEW, EDIT, SECURE_SAVE, SECURE_EXTRACT) ManagePermissions, ManageWeb or FullMask Full (VIEW, EDIT, SECURE_SAVE, SAVE, SECURE_EXTRACT, EXTRACT) n/a Print (PRINT, SECURE_PRINT) n/a Screen Capture (PRINT_SCREEN) Confidential 19
  • 20. Direct File Access in SharePoint --------------------Opening a protected document in the protected library *In case of PDF file, user will be asked to download a copy (protected) at local PC Confidential 20
  • 21. Direct File Editing/Saving in SharePoint --------------------Saving a protected document directly to the same library *In case of PowerPoint, direct editing is restricted, and user must download a copy (protected), and upload the revised file. Confidential 21
  • 22. Persistent Protection & Dynamic Permission Control --------------------- If a protected document (lock icon) is saved at PC, local copy maintains a consistent policy of the protected library/object store folder. External Communication 22
  • 23. Secure Extract --------------------- If a protected document is edited at PC, its derivative (e.g., PDF) maintains a consistent policy of the protected library/object store folder. External Communication 23
  • 24. Secure Copy & Paste --------------------- Copy/cut & paste (drag & drop) is only allowed within/between protected documents, and does not allow users (w/ edit capability) to extract content from protected document to unprotected file. External Communication 24
  • 25. Screen Capture Prevention (1) --------------------- Screen capture can only be allowed when user has appropriate user credentials. External Communication 25
  • 26. Screen Capture Prevention (2) --------------------- Screen capture can only be allowed when user has appropriate user credentials. External Communication 26
  • 27. Customer Benefit Raising Competitive Advantages Optimizing Productivity Data- Centric Security External Communication 27
  • 28. Fasoo Enterprise DRM (FED) Suite Desktop Repository External Print Display Context-Aware Pattern-Based Mobile External Communication 28
  • 29. Key Differentiator --------------------- Longevity, Breadth of Solution 29  Longevity ‐ Fasoo is a leading DRM/IRM company in the global market. Since 2000, Fasoo has focused its efforts on protecting clients' critical information from unauthorized users. Most other DRM/IRM focused companies have been acquired or altered their focus.  Breadth of solution ‐ Based on the 14+ years of DRM/IRM focus, Fasoo has been able to build an extremely broad solution set with the ability to handle the enterprise requirements of data stored in repositories, created on local devices and transmitted through Ad-hoc means. Fasoo continues to develop products to meet the changing requirements including adding Mobile Device Support (iOS, Android), Cloud Sharing Support (like Dropbox) and soon to be released support for Mac. No other products in the market can satisfy the enterprise requirements like Fasoo. External Communication
  • 30. Key Differentiator --------------------- Flexibility, Scalability 30  Flexibility ‐ Fasoo understands that the market is extremely broad and while current solutions can integrate with key market leading products like SharePoint (repository) Outlook (email), organizations may have proprietary needs. As a result, Fasoo has SDKs with APIs available in Java, C and C++ for integration into any document repository.  Scalability ‐ Fasoo has proven to scale within some of the largest environments in the world. Large portion of Fasoo customers have the deployment of over 10,000 users enterprise-wide, and more than 20 customers have the deployment of over 100,000 users worldwide. External Communication
  • 31. Key Differentiator --------------------- Extensive Application Coverage, Mobile Platforms 31  Extensive application coverage ‐ Fasoo supports an extremely broad base of rendering applications. While most companies only support Microsoft Office and Adobe PDF, Fasoo extends to nearly 50 applications and exponentially more file types. Fasoo has the ability to extend the application support upon client's request.  Mobile platforms ‐ Access to content is no longer restricted to the PC. With the mobile device explosion, it is critical that DRM/IRM solutions enable at a minimum the ability to view files on a iOS or Android device. As a result in 2011, Fasoo released its proprietary iOS and Android App. External Communication
  • 32. Wrap-up and Q&A inquiry@fasoo.com 32