File system audit
Control of operations on sensitive data
DCAP solution (data-centric audit and protection) for automated file system audit,
search for access violations and monitoring changes in critical data.
What documents contain business critical information?
How much critical data does a company have and where is it located?
Who has access to the data and can edit it?
Finds files in a document flow that contain critical information, and assigns a certain type to each file: personal data, trade secret, credit card numbers, etc.
Facilitates confidential information access control – automatically monitors open resources, files available to a specific user or group, privileged accounts.
Makes shadow copies of critical files found on a PC, server or network folders, saves the history of their revisions. Confidential data archive helps in incident investigation and ensures recovery of lost information.
Audits user operations in a file system. The specialists responsible for risk mitigation always have their information about changes made to a file updated (creating, editing, moving, deleting, etc.).
The program runs on the EndpointController agent interception platform - scans employee PCs, servers, network folders and transfers data for analysis to a workstation of a risk manager.
FileAuditor visualises file system scan results in accordance with specified rules
FileAuditor can work both as a stand-alone instrument and as part of SearchInform Risk Monitor. The integration of DCAP-solutions into Risk Monitor will significantly expand the functionality of the system.
If you have already installed SearchInform Risk Monitor, the installation of agent and server software won’t be needed to activate FileAuditor. The system update and activation of a new option will be enough.
Participate anonymously, let us know your opinion and we will inform you about industry current tendencies and solutions