FSF Fasoo Secure File-server

Share your file safely

File-server is very useful to share documents within a workgroup. However, it is also known as a very common source of document leak. The first problem is that file-servers are not usually managed so tightly as any other corporate systems. Secondly, file-servers provide some security means such as authentication and access control, but that is not enough. For example, one with "view" permission to a folder, can copy any file in the folder onto one's own PC. The files copied are out of control and totally left at the PC owner's discretion.

Who knows they may end up at the wrong hands?

TARGET DOCUMENTS Any organization, from SMB to Fortune 100, handing confidential document digitally with file-server, will be the beneficiaries of FSF.

Typical documents that need DRM security : - Management/Marketing/Business Development Plans - Operational guides and manuals - Personnel forms and employee performance reviews - Business proposals, contracts and agreements - Tax/Accounting/Audit reports - CAD drawings and graphical designs - Customer/Partner/Patient information

www.fasoo.com FSF Fasoo Secure File-server

Specifications SYSTEM ARCHITECTURE Server H/W • CPU:Pentium IV 2GB (needs to be adjusted depending on the number of users) • Memory: 2GB or above (needs to be adjusted depending on the number of users) • HDD: 16GB or above (installation requirement 100MB or above)

OS • Windows 2000 Server(SP4 or above) Windows Server 2003(SP1 or above) Windows Server 2008

S/W • IIS 5.0 or above(Microsoft .Net Framework 1.1 or above) • Database -Sybase (Default) • Browser - Microsoft Internet Explorer(IE) 6.0(SP1) or above

Client OS • Windows 2000, XP, 2003, Vista(32bit) • Browser Microsoft IE 6.0(SP1) or above KEY CHARACTERISTICS Applications Easy to use enabled file securely who has a valid Email ID. Document FSF is designed to protect files stored in your file- • MS-Office, Notepad, Wordpad, Persistent control of your files Acrobat Reader server persistently. Unlike other security solutions, it is easy to deploy and all most unnoticeable for One significant difference of DRM compared to CAD simple file encryption is that the security policy is • AutoCAD, VoloView, 3D MAX any everyday authorized use. Simply select a file to be secured, drag & drop the file into a secure attached to the file permanently, being used by an Image folder, and the file is automatically encrypted. authorized user or relocated anywhere else. The • Adobe PhotoShop, Adobe Illustrator, persistent control of your files is guaranteed. MS Paint, Windows Picture & Fax Viewer Thereafter the encrypted file inherits the security policy of the folder. You do not need any extra log- Wherever a DRM enabled file is, you can recall it if in process except Windows authentication system. you feel it is no longer valid. You may have a very The secure folder can be specified by the file-server tight control of your valuable files. The usage logs administrator. of any DRM enabled files are accumulated to the server of FSF, which is your file-server actually. It Flexible policy management provides continuous tracking and auditing of The security policy of a secure folder can be document usage. For example, you can check changed any time by the administrator. Each who has used what files, when, where and for what folder may have a different policy. The policy purposes such as just view, print, edit and save. It determines who has which permissions, such as discourages illegal access and helps to track down view, print, edit or save for how long or how many the source of information leak when it happens. times. Once a file is DRM enabled, encrypted, it is governed by the policy of the folder where the file belongs when it is initially encrypted. The policy change of a secure folder immediately affects all the files that have been DRM enabled in the folder. In conjunction with FSE, you can send a DRM

For more information, visit www.fasoo.com | Email: [email protected]