SearchInform released FileAuditor for macOS operated devices
04.08.2022

The function, allowing to protect documents, kept on the corporate devices, operated by macOS was added in the new release of SearchInform FileAuditor. In particular, information security officers will be able to detect all vulnerable documents kept on corporate PCs due to full file storages indexing. Users, in turn, from now on have an opportunity to add manual data classification tags directly from the context menu. Thus, it’s possible to protect files of any format, in particular, executable ones – programs and applications, as well as archives.
Manual tags in the form of security labels are added to file icons, thus, employees understand, that the document shouldn't be shared with third-party. Tags may be customized: you can name them according to different parameters

•    The recommended access level (“Confidential”, “For official use”, “Publicly avaliable” etc.)
•    Document content (“Contracts”, “Commercial offers”)
•    Any other attributes (“For the accounting department”, “Appendix to an annual report”)

Information security staff may enable specific employees to add tags to files themselves. Employees simply have to right-click on the file shortcut and choose the appropriate tag from the context menu. The information security department will receive an illustrative report, showing which files got manual tags and who added them. Indexing of all files, kept on users’ PCs enables information security specialists to search promptly for confidential data in the files in order to detect, whether appropriate tags were added.
 “MacOS is one of the most proprietary operating system, however, embedded functions aren’t enough for ensuring appropriate safety level of corporate clients. Thus, earlier this year we have realized DLP system for macOS operated work stations, and now the FileAuditor is adopted for macOS devices. We proceed from our clients’ practical tasks: in order to ensure complex protection, it’s crucial to obtain all critical documents and let users understand that they work with confidential data, which shouldn’t be shared with third party. Manual tags definitely help to deal with this task. What’s more, companies will be able to engage employees in the process of files marking. It’s very important because the document creator is the one who knows better than anyone else how confidential the file really is. The big advantage is that you can mark any kind of files, so that the alarming system covers all critical data without exception,” – explains Alex Parfentiev, leading analyst at SearchInform.  

***
SearchInform is one of the leading providers of solutions in the sphere of information security and risk management. For over a decade the company has been a technological trailblazer focusing on contemporary cybersecurity threats, protecting business and government institutions against data theft, harmful human behavior, compliance breaches and incomplete audit. Today, the team asset includes products for complex protection from internal threats on the level of IT- infrastructure, file systems, users’ workstations and information transmission channels, human factor related risks. 
 

Subscribe to get helpful articles and white papers. We discuss industry trends and give advice on how to deal with data leaks and cyberincidents.