Fasoo Secure File-Server

Total Page:16

File Type:pdf, Size:1020Kb

Fasoo Secure File-Server FSF Fasoo Secure File-server Share your file safely File-server is very useful to share documents within a workgroup. However, it is also known as a very common source of document leak. The first problem is that file-servers are not usually managed so tightly as any other corporate systems. Secondly, file-servers provide some security means such as authentication and access control, but that is not enough. For example, one with "view" permission to a folder, can copy any file in the folder onto one's own PC. The files copied are out of control and totally left at the PC owner's discretion. Who knows they may end up at the wrong hands? TARGET DOCUMENTS Any organization, from SMB to Fortune 100, handing confidential document digitally with file-server, will be the beneficiaries of FSF. Typical documents that need DRM security : - Management/Marketing/Business Development Plans - Operational guides and manuals - Personnel forms and employee performance reviews - Business proposals, contracts and agreements - Tax/Accounting/Audit reports - CAD drawings and graphical designs - Customer/Partner/Patient information www.fasoo.com FSF Fasoo Secure File-server Specifications SYSTEM ARCHITECTURE Server H/W • CPU:Pentium IV 2GB (needs to be adjusted depending on the number of users) • Memory: 2GB or above (needs to be adjusted depending on the number of users) • HDD: 16GB or above (installation requirement 100MB or above) OS • Windows 2000 Server(SP4 or above) Windows Server 2003(SP1 or above) Windows Server 2008 S/W • IIS 5.0 or above(Microsoft .Net Framework 1.1 or above) • Database -Sybase (Default) • Browser - Microsoft Internet Explorer(IE) 6.0(SP1) or above Client OS • Windows 2000, XP, 2003, Vista(32bit) • Browser Microsoft IE 6.0(SP1) or above KEY CHARACTERISTICS Applications Easy to use enabled file securely who has a valid Email ID. Document FSF is designed to protect files stored in your file- • MS-Office, Notepad, Wordpad, Persistent control of your files Acrobat Reader server persistently. Unlike other security solutions, it is easy to deploy and all most unnoticeable for One significant difference of DRM compared to CAD simple file encryption is that the security policy is • AutoCAD, VoloView, 3D MAX any everyday authorized use. Simply select a file to be secured, drag & drop the file into a secure attached to the file permanently, being used by an Image folder, and the file is automatically encrypted. authorized user or relocated anywhere else. The • Adobe PhotoShop, Adobe Illustrator, persistent control of your files is guaranteed. MS Paint, Windows Picture & Fax Viewer Thereafter the encrypted file inherits the security policy of the folder. You do not need any extra log- Wherever a DRM enabled file is, you can recall it if in process except Windows authentication system. you feel it is no longer valid. You may have a very The secure folder can be specified by the file-server tight control of your valuable files. The usage logs administrator. of any DRM enabled files are accumulated to the server of FSF, which is your file-server actually. It Flexible policy management provides continuous tracking and auditing of The security policy of a secure folder can be document usage. For example, you can check changed any time by the administrator. Each who has used what files, when, where and for what folder may have a different policy. The policy purposes such as just view, print, edit and save. It determines who has which permissions, such as discourages illegal access and helps to track down view, print, edit or save for how long or how many the source of information leak when it happens. times. Once a file is DRM enabled, encrypted, it is governed by the policy of the folder where the file belongs when it is initially encrypted. The policy change of a secure folder immediately affects all the files that have been DRM enabled in the folder. In conjunction with FSE, you can send a DRM For more information, visit www.fasoo.com | Email: [email protected].
Recommended publications
  • The New Standard for Data Archiving
    The new standard for data archiving 1 Explosively increasing 2 Why data management digital data is important Ever-increasing volumes of digital data are mounting up every day due to rapidly growing Today, files can be lost from computers in any number of ways—you might accidentally internet technology, widespread use of SNS, data transmission between network- connected delete a file, a virus might wipe one out, or there could be a complete hard drive failure. devices, and other trends. Within the video production industry, data-heavy video content When a hard drive dies an untimely death, it can feel like a house has burnt down. (for example, 4K, 8K, and 4K/8K high-frame-rate video) is becoming a major source of video Important personal items are usually gone forever—photos, significant documents, broadcasting. Many companies and research institutes are creating high volumes of data downloaded music, and more. (big data) for use in AI systems. Somehow, these newly created assets need to be managed effectively, stored safely, and utilized along with the old assets. There are many options for backing up content without any sophisticated equipment—you can 163,000 EB use DVDs, external hard drives, optical discs, or even online storage. It’s a good idea to back up data to multiple places. Computer Natural Viruses Disasters 4% Other 2% 40,026 EB 3% 2,837 EB 8,591 EB 1,227 EB Software Corruption 9% 2010 2012 2015 2020 2025 System/ Hardware 1 EB = 1,000,000 TB Malfunction 56% User Error Performance 26% Source: Ontrack Data Recovery High Performance www.ontrack.co.uk/understandingdataloss E-commerce, Financial HOT SSD RAM Capacity Optimized Back O­ce, General Service WARM HDD Sony's Optical Disc Archive storage system offers the solution, Long-Term Archive COLD with a low total cost of ownership through the use of long-life Auto Loader, O-line Tape Optical Disc Cost media, and it includes inter-generational compatibility based on the same optical disc technology used in DVDs and Blu-ray discs.
    [Show full text]
  • Restoring in All Situations
    Restoring in all situations Desktop and laptop protection 1 Adapt data restore methods to different situations Executive Summary Whether caused by human error, a cyber attack, or a physical disaster, data loss costs organizations millions of euros every year (3.5 million euros on average according to the Ponemon Institute). Backup Telecommuting Office remains the method of choice to protect access to company data and ensure their availability. But a good backup strategy must necessarily be accompanied by a good disaster recovery strategy. Nomadization The purpose of this white paper is to present the best restore practices depending on the situation you are in, in order to save valuable time! VMs / Servers Apps & DBs NAS Laptops Replication 2 Table of Contents EXECUTIVE SUMMARY .......................................................................................................................... 2 CONTEXT ................................................................................................................................................ 4 WHAT ARE THE STAKES BEHIND THE RESTORING ENDPOINT USER DATA? ................................. 5 SOLUTION: RESTORING ENDPOINT DATA USING LINA ................................................................... 6-7 1. RESTORE FOR THE MOST NOVICE USERS ................................................................................ 8-10 2. RESTORE FOR OFF SITE USERS ................................................................................................11-13 3. RESTORE FOLLOWING LOSS,
    [Show full text]
  • IBM Connect:Direct for Microsoft Windows: Documentation Fixpack 1 (V6.1.0.1)
    IBM Connect:Direct for Microsoft Windows 6.1 Documentation IBM This edition applies to Version 5 Release 3 of IBM® Connect:Direct and to all subsequent releases and modifications until otherwise indicated in new editions. © Copyright International Business Machines Corporation 1993, 2018. US Government Users Restricted Rights – Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents Chapter 1. Release Notes.......................................................................................1 Requirements...............................................................................................................................................1 Features and Enhancements....................................................................................................................... 2 Special Considerations................................................................................................................................ 3 Known Restrictions...................................................................................................................................... 4 Restrictions for Connect:Direct for Microsoft Windows........................................................................ 4 Restrictions for Related Software.......................................................................................................... 6 Installation Notes.........................................................................................................................................6
    [Show full text]
  • A Survey of Distributed File Systems
    A Survey of Distributed File Systems M. Satyanarayanan Department of Computer Science Carnegie Mellon University February 1989 Abstract Abstract This paper is a survey of the current state of the art in the design and implementation of distributed file systems. It consists of four major parts: an overview of background material, case studies of a number of contemporary file systems, identification of key design techniques, and an examination of current research issues. The systems surveyed are Sun NFS, Apollo Domain, Andrew, IBM AIX DS, AT&T RFS, and Sprite. The coverage of background material includes a taxonomy of file system issues, a brief history of distributed file systems, and a summary of empirical research on file properties. A comprehensive bibliography forms an important of the paper. Copyright (C) 1988,1989 M. Satyanarayanan The author was supported in the writing of this paper by the National Science Foundation (Contract No. CCR-8657907), Defense Advanced Research Projects Agency (Order No. 4976, Contract F33615-84-K-1520) and the IBM Corporation (Faculty Development Award). The views and conclusions in this document are those of the author and do not represent the official policies of the funding agencies or Carnegie Mellon University. 1 1. Introduction The sharing of data in distributed systems is already common and will become pervasive as these systems grow in scale and importance. Each user in a distributed system is potentially a creator as well as a consumer of data. A user may wish to make his actions contingent upon information from a remote site, or may wish to update remote information.
    [Show full text]
  • File Server Scaling with Network-Attached Secure Disks
    Appears in Proceedings of the ACM International Conference on Measurement and Modeling of Computer Systems (Sigmetrics ‘97), Seattle, Washington, June 15-18, 1997. File Server Scaling with Network-Attached Secure Disks Garth A. Gibson†, David F. Nagle*, Khalil Amiri*, Fay W. Chang†, Eugene M. Feinberg*, Howard Gobioff†, Chen Lee†, Berend Ozceri*, Erik Riedel*, David Rochberg†, Jim Zelenka† *Department of Electrical and Computer Engineering †School of Computer Science Carnegie Mellon University Pittsburgh, PA 15213-3890 [email protected] http://www.cs.cmu.edu/Web/Groups/NASD/ Abstract clients with efficient, scalable, high-bandwidth access to stored data. This paper discusses a powerful approach to fulfilling this By providing direct data transfer between storage and client, net- need. Network-attached storage provides high bandwidth by work-attached storage devices have the potential to improve scal- directly attaching storage to the network, avoiding file server ability for existing distributed file systems (by removing the server store-and-forward operations and allowing data transfers to be as a bottleneck) and bandwidth for new parallel and distributed file striped over storage and switched-network links. systems (through network striping and more efficient data paths). The principal contribution of this paper is to demonstrate the Together, these advantages influence a large enough fraction of the potential of network-attached storage devices for penetrating the storage market to make commodity network-attached storage fea- markets defined by existing distributed file system clients, specifi- sible. Realizing the technology’s full potential requires careful cally the Network File System (NFS) and Andrew File System consideration across a wide range of file system, networking and (AFS) distributed file system protocols.
    [Show full text]
  • An Advanced Solution for Long-Term Retention of Enterprise Digital
    Data Management, Simplified. Enterprise Edition An Advanced Solution for Long-term Retention of Enterprise Digital Assets A centrally managed, secure archive is a key requirement for today’s enterprises, which must contend with exponential growth in data volumes, long-term retention requirements, and e-discovery mandates. Atempo Digital Archive, Enterprise Edition, is a comprehensive solution that addresses each of these data archiving challenges. Providing capabilities for both automatically and manually archiving data in long-term storage platforms, Atempo Digital Archive ensures that all corporate data is easy to find and access for as long as it needs to be retained. An Answer to Each Archiving Need Addressing Today’s Storage Management Challenges Enabling the Long-term Retention of Digital Assets Today, organizations must manage more, and more Digital information represents both the lifeblood of a critical, data than ever before—and data volumes continue business today, and the basis of records that may need to grow at an explosive pace. Traditional backup and to be accessed for generations. With its integrated recovery solutions have proven ill-equipped to keep up capabilities for full content indexing, search, and metadata with these demands. To ensure these increasing volumes indexing, Atempo Digital Archive allows users to retrieve of critical information are always available when needed, information quickly and easily. In addition, it offers organizations require advanced new archiving capabilities. refreshing mechanisms that verify whether storage Atempo Digital Archive is the one solution that enables media is still readable, and that ensure information IT organizations to address their storage management can continue to be accessed on an ongoing basis.
    [Show full text]
  • Overview Addressing Today's Storage Management Challenges Enabling
    DATA PROTECTION ATEMPO-DIGITAL ARCHIVE High performance file archiving software for large data volumes OVERVIEW A centrally managed, secure archive is a key requirement for today’s enterprises, which must contend with exponential growth in data volumes and long-term retention requirements. Atempo-Digital Archive is a comprehensive solution that addresses each of these data archiving challenges. Providing capabilities for both automatically and manually archiving large data volumes in long-term storage platforms, Atempo-Digital Archive ensures that all corporate data is easy to find and access for as long as it needs to be retained. ADDRESSING TODAY’S STORAGE MANAGEMENT CHALLENGES Today, organizations must manage more critical data than ever before - and data volumes continue to grow at an explosive pace. Traditional backup and recovery solutions have proven ill-equipped to keep up with these demands. To ensure these increasing volumes of critical information are always available when needed, organizations require advanced new archiving capabilities. Atempo-Digital Archive (ADA) is the one solution that enables IT organizations to address their storage management challenges today and in the long term. By managing data in a secure, centrally-managed archive, Atempo-Digital Archive represents the most efficient, reliable, and cost-effective way to protect critical business information. This solution ensures that an organization’s most valuable data is organized and easily accessible - while at the same time freeing up expensive disk space, lowering storage costs, and reducing the backup window for data that is infrequently accessed. ENABLING THE LONG-TERM RETENTION OF DIGITAL ASSETS Digital information represents both the lifeblood of a business today, and the basis of records that may need to be accessed for generations.
    [Show full text]
  • Optical Disc Archive File Manager2
    5-000-611-15(1) Optical Disc Archive File Manager2 Help ODS-FM2 © 2018 Sony Imaging Products & Solutions Inc. Overview ODS-FM2 is a software application for archiving and retrieving using the Optical Disc Archive System. In addition to systems using ODS-L10 and ODS-L30M devices, it can also be used with drive units connected directly to a server. ODS-FM2 can be used to manage not just cartridges inserted in an Optical Disc Archive System, but also cartridges for shelf management. 2 File Manager Mode This section describes the screens and operation in File Manager mode. • Archive screen • Archiving • Archiving using watched folders • Retrieving • Displaying/editing file metadata • Deleting cartridge information • Deleting files/folders on cartridges • Duplicating cartridges • Adding a network drive Archive Screen Archive and retrieve operations are performed from this screen. The Archive screen is made up of the following sections. (1) (2) (3) (4) Common operations Tree area (left side of Desktop/Library area) • Multiple selections are not supported. List area (right side of Desktop/Library area, Job area, [Placeholder] dialog) The operating method is analogous to both Explorer (Windows) and the Finder (macOS). • Select multiple files using the Shift key, Ctrl key (Windows), and Command key (macOS). • Select all files using Ctrl+A (Windows) or Command+A (macOS). 3 (1) Global menu Click the icons to move between screens. • (Archive): Displays the Archive screen to perform archive/retrieve operations. • (Settings): Displays the Settings screen. • (Help): Displays the Help and version information. • (Logout): Logs the user out. (2) Desktop area Displays the folders and files on the local computer and computers on the network.
    [Show full text]
  • Gigabit Ethernet Hard Drive User Guide
    Gigabit Ethernet Hard Drive User Guide Contents Introduction ...................................................................................2 Controls, Connectors and Indicators .................................................2 Front Panel Area ...............................................................................2 Rear Panel Area ................................................................................3 About the Hard Disk ..........................................................................4 Locating NAS Drive on Your Desk ......................................................5 Bundled Software ..............................................................................5 Finder.exe ........................................................................................5 Backup Software ..............................................................................5 TorrentFlux .......................................................................................5 Connecting To Your Network ..............................................5 About NAS Drive User Accounts ........................................................7 Connecting The NAS Drive To Your LAN ............................................8 Web-Based Administration Tool .....................................................10 Administration Login .....................................................................10 Basic Settings For Initial Setup ......................................................11 NAS Drive Operation .............................................................17
    [Show full text]
  • LISTSERV 16.0 Installation Manual for VM
    ©2010 L-Soft Sweden AB This document describes the installation of the LISTSERV 16.0 for VM with a build date of December 9, 2009. Information in this document is subject to change without notice. Companies, names, and data used in examples herein are fictitious unless otherwise noted. L-Soft international, Inc. does not endorse or approve the use of any of the product names or trademarks appearing in this document. Permission is granted to copy this document, at no charge and in its entirety, provided that the copies are not used for commercial advantage, that the source is cited, and that the present copyright notice is included in all copies so that the recipients of such copies are equally bound to abide by the present conditions. Prior written permission is required for any commercial use of this document, in whole or in part, and for any partial reproduction of the contents of this document exceeding 50 lines of up to 80 characters, or equivalent. The title page, table of contents and index, if any, are not considered part of the document for the purposes of this copyright notice, and can be freely removed if present. Copyright 2010, L-Soft international, Inc. All Rights Reserved Worldwide. LISTSERV is a registered trademark licensed to L-Soft international, Inc. ListPlex, CataList, and EASE are service marks of L-Soft international, Inc. UNIX is a registered trademark of X/Open Company Limited. AIX and IBM are registered trademarks of International Business Machines Corporation. Alpha AXP, Ultrix and VMS are trademarks of Digital Equipment Corporation.
    [Show full text]
  • NAS-235 the Airlive 2Bay Diskmaster NAS-235
    NAS-235 The AirLive 2Bay DiskMaster NAS-235 he NAS-235 inserts Terabytes of storage T space into your network without the cost, space, and maintenance hassles of a full- fledged file server. The NAS-235 provides solid data transfer performance for multiple client connections. And you can add as many NAS-235 to your network as you like. Compared to using a standard PC as a File Server, the NAS-235 offers lower cost, easier management, and increased reliability. Moreover, NAS-235 supports WN- 200USB for changing it into wireless, and hence avoids the annoying cabling issue. 10/100/ SATA RAID USB 1000 II 0, 1 2.0 Mbps BitTorrent WiFi Samba Capability* Client UPnP Share 3.5 inch SATA or IDE Drive Wirelessly With WN-200USB, NAS-235 become a wireless file server with up to two 3.5" SATA Hard Drives. Therefore, you can install any 3.5" SATA Hard Drive and share it instantly on the network. Users can use My Network Place to access the Hard Drive. Even set it as a network Drive. So you can save or read files directly. The NAS-235 can set username and password to limit access only to certain users. Best of all, Internet user can access the device throughput standard FTP client. Wireless File Sharing Automatic File Download BiTorrent HTTP FTP NAS-235 Internet NAS-235 WN-200USB File Download From Internet Wireless Router NoteBook PC WN-200USB 5F, No.96, Min-ChuanRd, Hsin-tien City, Taipei, Taiwan BitTorrent Client Built-in Bit-Torrent download engine, this engine allows you to download the legally shared contents on the Internet without leaving your PC power-ON all the time.
    [Show full text]
  • Release Notes
    Net-Net OS-E Release 3.6.0M5 Release Notes 780-0004-00 Revision 1.51 March 22, 2013 Notices © 2013 Acme Packet, Inc., Bedford, Massachusetts. All rights reserved. Acme Packet, Session Aware Networking, Net-Net, and related marks are trademarks of Acme Packet, Inc. All other brand names are trademarks, registered trademarks, or service marks of their respective companies or organizations. Patents Pending, Acme Packet, Inc. The Acme Packet Documentation Set and the Net-Net systems described therein are the property of Acme Packet, Inc. This documentation is provided for informational use only, and the information contained within the documentation is subject to change without notice. Acme Packet, Inc. shall not be liable for any loss of profits, loss of use, loss of data, interruption of business, nor for indirect, special, incidental, consequential, or exemplary damages of any kind, arising in any way in connection with the Acme Packet software or hardware, third party software or hardware, or the documentation. Some jurisdictions do not allow the exclusion or limitation of incidental or consequential damages, so the above exclusions may not apply. These limitations are independent from all other provisions and shall apply notwithstanding the failure of any remedy provided herein. Copying or reproducing the information contained within this documentation without the express written permission of Acme Packet, Inc., 100 Crosby Drive, Bedford, MA 01730, USA is prohibited. No part may be reproduced or retransmitted. Proprietary & Confidential iii Contents NNOS-E Release Notes, Version 3.6.0 Contacting Acme Packet ................................................................................. 1-18. Evaluation Site Information ....................................................................... 1-18. Technical Documentation .......................................................................... 1-18.
    [Show full text]