IS Decisions FileAudit
0.00

Problems that solves

Shortage of inhouse software developers

Shortage of inhouse IT resources

Shortage of inhouse IT engineers

High costs of IT personnel

Values

Enhance Staff Productivity

Reduce Costs

IS Decisions FileAudit

Proactively track, audit, report, alert on and respond to, all access to files and folders on Windows servers and in the cloud

Description

Features:
  • File & Folder Real-Time Access Monitoring. FileAudit constantly examines and records read/write/delete accesses (or access attempts), file ownership changes and permission modifications – in real time - so IT or management can immediately address any inappropriate activity.
  • File & Folder Access Alerts. Receive automatic email alerts to predetermined access events (e.g. access denied, file deletion, specific user, IP address or file access, and mass access events such as bulk file copying). Instantaneous notification of a potential security breach that enables an immediate reaction when necessary.
  • File & Folder Access Auditing. FileAudit instantly provides comprehensive and accurate information about access to file and folders across multiple Windows Servers, through its schedulable, automated and multi-criteria reporting. It provides an organization with complete visibility of all activity across a Windows File System.
  • File Auditing, Recording & Long Term Archiving. Centralizing and archiving all file access events occurring on one or several Windows systems and across one or several Cloud Storage Providers generates an always available, searchable and secure audit trail. The ability to monitor and audit file activity across the whole organization means precise answers can be given to who did what, when and from where.
  • Powerful Filtering Capabilities. With powerful filtering capabilities, FileAudit can exclude irrelevant data and focus on only insightful and actionable information. This approach helps you find the answers you need – not just log data - with far less effort.
  • Improved File Auditing Performance. Scan options allows certain access events to be excluded from the audit trail. Configure the auditing to exclude user accounts, application or file types to obtain the pertinent access audit your organization needs.
  • Delegation to Non-IT Auditors. Create specific accounts for people with no administrative rights allowing them to perform audits securely and autonomously. In this way external auditors can use FileAudit without breaching security protocols and monitoring can be delegated to managers who have a better understanding of sensitive files across their business line.
  • Software that’s Intuitive & Easy to use. Agentless, remote and non-intrusive; FileAudit offers an easy yet robust tool for monitoring, auditing and securing access to files, folders and file shares that reside on Windows Systems and in the cloud.
Benefits: Secure sensitive enterprise data from improper access, potential theft, alteration or destruction FileAudit provides IT professionals with the optimal visibility into data access events to help detect and combat malicious access and the alteration of sensitive information. The opportunity to react quickly in identifying potential abuse significantly reduces the risk of security breaches. Simple to install & easy to use Agentless, remote and non-intrusive; FileAudit offers an easy yet robust tool to secure access to files, folders and file shares that reside on Windows System. Microsoft certified for compliance and support with Windows Server 2012 and Windows 8, FileAudit is installed in less than 3 minutes on any machine. Because FileAudit is so easy and intuitive, even non-IT executives (and external auditors) can use FileAudit securely and autonomously. Significantly reduce the workload related to monitoring access to sensitive files and folders Manual event log analysis is a tedious and time-consuming task: decrypting hundreds or even thousands of events, and attempting to retrieve those of interest generates endless hours of non value added work and creates a significant risk of error. Help regulated organizations meet compliance requirements Organizations can prove to regulators that sensitive information is being monitored and protected effectively through comprehensive monitoring on all access activity to data found on files, folders and file shares.