Ensures content based access rights distribution and makes sure
that everything is put in order in your corporate file system.
The system obtains the file
The file is checked against
the policies and is marked with
a special label
If necessary, the file is
copied to the vault
Blocking activities
and applications related
to marked files
All actions with files and
folders are logged
Permission for files
and folders are read
During subsequent checks,
the system scans only newly added
and changed files
Gartner introduced the Data-Centric Audit and
Protection (DCAP) approach as highly recommended
to mitigate threats and compliance issues to critical
data. DCAP strategies are replacing disparate siloed
data security governance approaches.
Each document is labelled according
to the type of data it contains.
The automatic classification can be
complemented with manual for most
efficient protection.
Controls access rights to information
(full access, editing, reading, writing,
reading and changing, print restriction etc.)
depending on the policies set.
Audits user operations with the file
system. Reveals all data on the lifecycle
of a file. Blocks access to the file and
its transfer in any application.
Makes shadow copies of critical files
found on the workstations, server or
in network folders, saves the history
of their revisions.
Thus, regardless of:
Enables to perform immediate and accurate blocking of data leakage attempts and significantly reduce the load on the infrastructure.
Ensures protection of confidential documents kept in the corporate storages, as well as ensures control access to data, allows to trace changes done to files.
Enhance of SIEM’s analytical and operational capabilities. Detailed data on files directly from an endpoint, provided by FileAuditor, helps to extend the list of policies and fine-tune them.
The FileAuditor is capable of reading labels, added to files by other solutions and takes them into consideration.
“With the SearchInform solution, we improved employees' performance by monitoring their daily behaviour. At first, the system seems complicated, but after you start working with it daily, you intuitively understand everything.
The system is transparent to the end user. With two clicks, you can track everything the user did with the information.”
“The SearchInform risk monitoring is an awe-inspiring tool. I have never seen a tool that collects so many data from a computer and organizes it in a way to be clear about what was made in the hosts. It is pretty useful to collect evidence on actions of internal users from conversations, accesses, software that were used, the path from where a data was collected to where it was sent, and even capturing from webcam, microphone and displays.”
“The next-gen DLP - Risk Monitor is such a comprehensive solution that has a function for every department in your business. This solution is the only solution we are familiar with that can reveal the fraud and empower risk managers and C-Level executives to protect organization's digital assets, and increase staff performance while at the same time prevent the wide range of risks.”
“SearchInform solutions give all you need to monitor your data, network, and hardware, so you can make necessary enhancements to your information security system and IT infrastructure as a whole.”