Enterprise Digital Rights Management › wp-content › ... Enterprise Digital Rights...
date post
07-Jun-2020Category
Documents
view
1download
0
Embed Size (px)
Transcript of Enterprise Digital Rights Management › wp-content › ... Enterprise Digital Rights...
396 World Cup Buk-ro, Mapo-gu Seoul 121-795, Korea tel: +82-2-300-9000 | fax: +82-2-300-9400 | email: inquiry@fasoo.com | web: www.fasoo.com
Fasoo | Confidential | Page 1
Enterprise Digital Rights Management
White Paper
FASOO, INC | 7315 WISCONSIN AVENUE, SUITE 420, BETHESDA, MD 20814 TEL. 732-955-2333| WEB: www.fasoo.com
FASOO.COM, INC (HEADQUARTERS) | 396 WORLD CUP BUK-RO, MAPO-GU, SEOUL, 121-795, KOREA TEL. +82-2-300-9000 | FAX. +82-2-300-9400 | WEB: www.fasoo.com
mailto:inquiry@fasoo.com http://www.fasoo.com/ http://www.fasoo.com/ http://www.fasoo.com/
7315 Wisconsin Avenue, Suite 420 Bethesda, MD 20814 tel: 732-955-2333
web: www.fasoo.com | email: inquiry@fasoo.com
P a g e | 2 www.fasoo.com
Table of Contents
Introduction.................................................................................................................................................... 4
Fasoo Data Security Framework .............................................................................................................. 5
Data-centric Security Model .................................................................................................................. 5
People-centric Policy ............................................................................................................................. 5
Multi-layered Approach ......................................................................................................................... 6
Solution ..................................................................................................................................................... 6
Strategy ..................................................................................................................................................... 7
Strategic Intent .......................................................................................................................................... 7
Challenges .................................................................................................................................................... 8
Policy Enforcement ................................................................................................................................... 8
Policy Management Model ........................................................................................................................ 9
Characteristics and Specifications of Fasoo Enterprise DRM .................................................................... 10
Architecture ............................................................................................................................................. 10
Application Support ............................................................................................................................. 11
Integration ........................................................................................................................................... 11
Authentication...................................................................................................................................... 12
Policy Management ................................................................................................................................. 12
Blocking Screen Capture .................................................................................................................... 12
Watermark ........................................................................................................................................... 13
Flexible Policy Setting ......................................................................................................................... 13
Exceptional Policy Setting ................................................................................................................... 13
Dynamic Policy Control and Offline Access ........................................................................................ 13
Intelligent Policy Management: Context Aware Protection (CAP) ...................................................... 14
Tamper Resistance ................................................................................................................................. 15
Secure Copy & Paste .......................................................................................................................... 15
Secure Export...................................................................................................................................... 15
Trusted Clock ...................................................................................................................................... 15
Usage Log and Audit Trail....................................................................................................................... 15
Fasoo Enterprise DRM Suite ...................................................................................................................... 16
Document Security Domain .................................................................................................................... 16
Server DSD FED Product, Fasoo Enterprise DRM for Repository ......................................................... 18
Ad-hoc DSD FED Product, Fasoo Enterprise DRM for External ............................................................ 19
PC DSD FED Product, Fasoo Enterprise DRM for Node ....................................................................... 20
http://www.fasoo.com/ mailto:inquiry@fasoo.com
7315 Wisconsin Avenue, Suite 420 Bethesda, MD 20814 tel: 732-955-2333
web: www.fasoo.com | email: inquiry@fasoo.com
P a g e | 3 www.fasoo.com
Extended FED Products .......................................................................................................................... 21
Fasoo Smart Print ............................................................................................................................... 21
Fasoo Smart Screen ........................................................................................................................... 21
Fasoo Enterprise DRM for Mobile ....................................................................................................... 21
Intelligent Real-time Encryption .......................................................................................................... 21
Fasoo Integrated Log Manager ........................................................................................................... 21
Fasoo Data Security Solutions .................................................................................................................... 22
Fasoo Data Manager .............................................................................................................................. 22
Fasoo Enterprise DRM ............................................................................................................................ 22
Fasoo RiskView ...................................................................................................................................... 22
Summary ..................................................................................................................................................... 23
http://www.fasoo.com/ mailto:inquiry@fasoo.com
7315 Wisconsin Avenue, Suite 420 Bethesda, MD 20814 tel: 732-955-2333
web: www.fasoo.com | email: inquiry@fasoo.com
P a g e | 4 www.fasoo.com
Introduction
The latest technology allows us to communicate and collaborate at the speed of light, but makes it easy
to lose intellectual property, trade secrets, personally identifiable information (PII), personal health
information (PHI) or PCI regulated data with just one click or tap. An increasingly mobile workforce uses
a mix of organization-managed and personal (unmanaged) devices from home, while on the road and
from higher-risk global locations. Cloud and mobile computing has brought new challenges as
companies adopt BYOD policies to reduce cost and allow users the flexibility to choose the best
experience for themselves. Conventional information security tries to protect network and system
boundaries, but cloud and mobile computing blur those lines making it difficult or even meaningless to
define the perimeter of a corporate network. Information security must enable mobility and the
consumerization of devices, applications, collaboration tools, and social networking for business and
personal use.
About 80 percent of the data created today is unstructured content stored in documents. Most
organizations consider these documents secure while inside a controlled boundary, such as a content
management system, collaborative repository, email inbox or shared file folders. Authorized users
download these documents to desktops, laptops and mobile devices, where they can easily copy and
forward them anywhere. Once someone has a document, they can do anything with the information in it,
since there are no restrictions on what can be done with the data or