New feature enables employees to request time-limited access to restricted files directly from their workstation – with each request automatically routed to the Information Security team for review and approval.
SearchInform has expanded the functionality of its DCAP (Data-Centric Audit and Protection) system FileAuditor with a new capability for temporary file access management. The update addresses the frequent business need to grant employees short-term access to sensitive documents for specific tasks, without modifying existing security policies. This approach simplifies workflows for both end users and information security teams.
When an employee attempts to open a restricted file and access is blocked, the FileAuditor notification interface on their PC now allows them to create and send a request for temporary access. The request details must include access duration and justification, for example, to complete a manager’s assignment. The information security specialist sees the request in the DCAP console where they can review the details, adjust the requested timeframe, if necessary, and either approve or deny access with one click.
This streamlined process benefits both sides: employees gain the necessary data more quickly, while security teams reduce administrative overhead. At the same time, full security control remains in place. FileAuditor continues to monitor file system activity in real time, detecting any misuse of granted privileges, for example, if an employee makes unauthorized edits or deletes a document. In such cases, the system allows file recovery from shadow copies stored in the FileAuditor storage.
“The main advantage of this solution lies in its flexibility,” said Sergio Bertoni, SearchInform Lead Analyst.
“Rigid, static restrictions can slow down business processes. That’s why we offer time-limited access to a specific file without removing other workplace controls. FileAuditor continues to monitor all operations across all documents. When the security team responds to a user request, rights are granted in a targeted mannerwithout rewriting standard policies. As soon as the access period expires, protection resumes automatically. This controlled, manageable approach delivers real value to business operations,” he explained.
The update enhances FileAuditor toolset for managing access to confidential data. Core security policies are enforced through classification-based access controls, which restrict entire categories of sensitive data (such as personal data, contracts, or trade secrets) across selected applications. In addition, administrators can define fine-grained permissions for specific files and folders within the file system. The combined use of these features allows organizations to strike a balance between broad data protection and flexible, individualized access – including temporary access when required.
ABOUT SEARCHINFORM
SearchInform is an information security and risk management product vendor as well as an MSS provider. The company's clients are more than 4000 companies in 20+ countries. Today, the team has products and services for comprehensive protection against insider threats at all levels of corporate information systems: FileAuditor (the DCAP class solution); DLP system with extended functionality; Risk Monitor (advanced platform for internal threat mitigation); SIEM system, IS outsourcing service.
SearchInform uses four types of cookies as described below. You can decide which categories of cookies you wish to accept to improve your experience on our website. To learn more about the cookies we use on our site, please read our Cookie Policy.
Always active. These cookies are essential to our website working effectively.
Cookies does not collect personal information. You can disable the cookie files
record
on the Internet Settings tab in your browser.
These cookies allow SearchInform to provide enhanced functionality and personalization, such as remembering the language you choose to interact with the website.
These cookies enable SearchInform to understand what information is the most valuable to you, so we can improve our services and website.
These cookies are created by other resources to allow our website to embed content from other websites, for example, images, ads, and text.
Please enable Functional Cookies
You have disabled the Functional Cookies.
To complete the form and get in touch with us, you need to enable Functional Cookies.
Otherwise the form cannot be sent to us.
Subscribe to our newsletter and receive a bright and useful tutorial Explaining Information Security in 4 steps!
Subscribe to our newsletter and receive case studies in comics!