CIO Influence
CIO Influence News Datacentre Security

Fasoo Enhances ITAR Compliance with Data-Centric Security Controls

Fasoo Enhances ITAR Compliance with Data-Centric Security Controls

fasoo_logo

Fasoo, the leader in data-centric security, highlights the growing challenges organizations face in maintaining compliance with the International Traffic in Arms Regulations (ITAR) as defense manufacturers and suppliers increasingly rely on global collaboration.

“The challenge is no longer limited to controlling physical exports alone. It lies in governing how sensitive technical data is accessed, shared, and reused across distributed teams, cloud platforms, and complex supplier networks,” said Jason Sohn, Executive Managing Director at Fasoo. “As collaboration becomes more global and digital, organizations need controls that move with the data itself to maintain compliance and control.”

Under the ITAR, an export can occur not only when controlled data leaves the United States, but also when it is disclosed to a foreign person within U.S. borders. This concept of “deemed export” means that access to controlled data may constitute a regulated event. In today’s digital engineering environments, where CAD files, design drawings, specifications, and reports move across systems and partners, maintaining compliance depends on controlling how data is accessed and used throughout its lifecycle.

Many organizations continue to rely on repository-level controls, network boundaries, or manual processes to manage ITAR obligations. However, these approaches often break down once technical data is downloaded, copied, or shared externally. Without controls that travel with the data, companies face increased risks of unauthorized access, untracked retransfers, and insufficient audit trails, which can lead to severe regulatory penalties and loss of export privileges.

Also Read: CIO Influence Interview with Gera Dorfman, Chief Product Officer at Orca

Fasoo addresses these challenges by enabling a data-centric approach to ITAR compliance, one that governs technical data directly and continuously, regardless of where it travels. Instead of attempting to secure every system or collaboration tool, Fasoo focuses on embedding persistent protection, access control, and traceability into the files themselves.

With file-level encryption, ITAR-controlled technical data remains secure after download or transfer, ensuring that only authorized individuals can access sensitive content. Eligibility-based granular access controls allow organizations to align data access with citizenship, role, and project context, reducing the risks of unauthorized disclosure to foreign persons.

At the same time, comprehensive file activity logs provide end-to-end visibility into how export-controlled data is accessed, modified, shared, or retransferred.

This approach is particularly critical in multi-tier defense supply chains, where authorized partners may further share data with subcontractors or affiliates. By maintaining control and visibility beyond organizational boundaries, Fasoo helps organizations prevent hidden export violations while preserving efficient collaboration across engineering and manufacturing ecosystems.

By shifting ITAR compliance from a reactive, system-based process to a proactive, data-centric security embedded in data itself, organizations can reduce regulatory risks, strengthen audit controls, and build trust across defense supply chains.

Catch more CIO Insights: Identity is the New Perimeter: The Rise of ITDR

[To share your insights with us, please write to psen@itechseries.com ]

Related posts

Normalyze is SOC 2 Type 2 Compliant for Its Data-first Cloud Security Platform

Cision PRWeb

New Ruckus Unleashed Product Line Exploit Discovered by SAM Seamless Network

PR Newswire

Zero Trust in the Cloud Era: Securing Hybrid and Multi-Cloud Environments

Agnidipta Sarkar