Now it is possible to prohibit access to sensitive data and operations with confidential files in any application on Linux-based file servers and endpoints.
The DCAP system SearchInform FileAuditor enhanced control over Linux-based data storages by the means of access rights rules. Such rules allow limiting access to the particular file for any type of corporate software, such as office programs, messengers, email clients, browsers, and even tailor-made applications. Due to this feature, it is possible to control any operations with files, including opening and sending.
Access rights policies are applied to the files that are automatically labeled according to their content (personal data, trade secrets, financial data, etc.). FileAuditor labels files at a file-system level, so when the file system blocks operations with labeled files in the particular application, such access rights limitations cannot be avoided. It is proprietary technology developed by SearchInform. From now on, it can be applied in Ext3 and Ext4, file systems used in Linux OS.
Labelling feature allows SearchInform FileAuditor to manage access rights not only to specific folders and files, but also to particular content category. Rules of access rights can be applied to the specified users, computers or can include certain conditions of rule activation. As a result, employees without necessary rights cannot open, edit, or transfer files if they contain confidential data.
“Such limitations will not affect business processes. Protected files can be used in accordance with pre-set rules of usage, which are activated only when users perform certain operations with data. For example, sales people can be allowed to view price documents to know current prices of the company’s products. At the same time, the same documents cannot be attached to an email or sent in messenger or browser. Such access rights management reduces the risks of data leaks,” said Sergio Bertoni, Lead Analyst at SearchInform.
“As a result, FileAuditor rules of access are flexible, reliable, and universal at the same time. They can be used for any type of software. It is especially important for Linux-based infrastructures. Tightening of legislation in terms of data storage, processing, and protection requires effective means of compliance. SearchInform FileAuditor is the top-end solution for information security, which advantages businesses in safe data processing and usage,” added Bertoni.
ABOUT SEARCHINFORM
SearchInform is an information security and risk management product vendor as well as an MSS provider. The company's clients are more than 4000 companies in 20+ countries. Today, the team has products and services for comprehensive protection against insider threats at all levels of corporate information systems: FileAuditor (the DCAP class solution); DLP system with extended functionality; Risk Monitor (advanced platform for internal threat mitigation); SIEM system, IS outsourcing service.
SearchInform uses four types of cookies as described below. You can decide which categories of cookies you wish to accept to improve your experience on our website. To learn more about the cookies we use on our site, please read our Cookie Policy.
Always active. These cookies are essential to our website working effectively.
Cookies does not collect personal information. You can disable the cookie files
record
on the Internet Settings tab in your browser.
These cookies allow SearchInform to provide enhanced functionality and personalization, such as remembering the language you choose to interact with the website.
These cookies enable SearchInform to understand what information is the most valuable to you, so we can improve our services and website.
These cookies are created by other resources to allow our website to embed content from other websites, for example, images, ads, and text.
Please enable Functional Cookies
You have disabled the Functional Cookies.
To complete the form and get in touch with us, you need to enable Functional Cookies.
Otherwise the form cannot be sent to us.
Subscribe to our newsletter and receive a bright and useful tutorial Explaining Information Security in 4 steps!
Subscribe to our newsletter and receive case studies in comics!