Fasoo, Inc.
Protecting confidential information through persistent data-centric security using people-centric policies.
- (732) 955-2333
- 6707 Democracy Blvd
Suite 905
Bethesda,, MD 20817
United States
Filter Results By:
Applications
-
product
Fasoo Data Radar
Fasoo Data Radar is an enterprise classification and security policy management tool that is complementary to Fasoo Enterprise DRM. Data Radar can also be implemented as a standalone discovery and classification solution. It scans files throughout the enterprise to find content that is confidential or of high value. It can scan files located within folders and logical drives on PCs – that is, it can scan files on file servers, cloud storage servers, repositories, and anything else that can be mounted as a logical drive or shared folder. The files that Fasoo Data Radar scans are those that match templates which specify criteria for files to be scanned.
-
product
Fasoo Usage Tracer
Setting up a perfect data security policy is almost impossible. This is why exceptional policies are so often adopted to balance productivity against security in any sort of policy enforcement settings. There is only one way to address this issue which is by having a flexible security policy management framework, where security policies can be continuously assessed and optimized through feedback from a comprehensive data usage log analysis.
-
product
Focus Risk View
Fasoo RiskView is a tool for security administrators that monitor activity related to unstructured data and user activities with confidential data. It gathers information from Fasoo Usage Tracer (the log analysis utility for Fasoo Enterprise DRM) and Fasoo eData Manager. It has APIs that can be configured to import log data from other security technology components, including firewalls, DLP, databases, and even physical security systems (e.g., entry/exit data from keycard or biometric systems) and employee attendance records. Fasoo RiskView includes a decision making framework that security administrators as well as business managers can use to review suspicious activities and after relevant investigations, in order to decide whether or not to take action to address these concerns with potential insider threats.