FileAuditor

Ensures content based access rights distribution and makes sure
that everything is put in order in your corporate file system.

How does
SearchInform
FileAuditor work?

The system obtains the file

The file is checked against
the policies and is marked with
a special label

If necessary, the file is
copied to the vault

Blocking activities
and applications related
to marked files

All actions with files and
folders are logged

Permission for files
and folders are read

During subsequent checks,
the system scans only newly added
and changed files

Gartner Image
 

Gartner introduced the Data-Centric Audit and
Protection (DCAP) approach as highly recommended
to mitigate threats and compliance issues to critical
data. DCAP strategies are replacing disparate siloed
data security governance approaches.

What tasks does
FileAuditor solve?

 
White paper

Learn how to help employees master secure
document flow

Security policies

The system has 250+ preset security
policies: general-purpose and industry
-specific. Also, there is a possibility to create
customised security policies.

The FileAuditor performs content based data
protection,
what ensures the highest standard of
data security, unavailable in any other solution
and helps to manage data efficiently.

Automatic labelling can be complemented with manual, what ensures the most efficient protection of sensitive data.
Users can complement pre-configured sensitive data classification rules with own samples
Rules for searching for critical documents (by text, by regular expressions, by file attributes) can be created.
Speed, frequency and terms of scanning can be specified.

Thus, regardless of:

  • Change of attributes.
  • The type of file, containing confidential data and whether confidential data is present in the form of a picture, a document or a document with a picture.
  • Program used for opening a file.
The number of recent file versions, the copies of which should be kept can be specified.
  • With DLP

    Enables to perform immediate and accurate blocking of data leakage attempts and significantly reduce the load on the infrastructure.

  • Huawei OceanStore and other SANs

    Ensures protection of confidential documents kept in the corporate storages, as well as ensures control access to data, allows to trace changes done to files.

  • With SIEM system

    Enhance of SIEM’s analytical and operational capabilities. Detailed data on files directly from an endpoint, provided by FileAuditor, helps to extend the list of policies and fine-tune them.

  • Microsoft MIP and other systems for data classification.

    The FileAuditor is capable of reading labels, added to files by other solutions and takes them into consideration.

Try-for-free Image

Start Your Free 30-day
Trial
Now!

By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement.

Reviews

1/1
Letter Subscribe to get helpful articles and white papers. We discuss industry trends and give advice on how to deal with data leaks and cyber incidents.