Skip to main content
TrustRadius
SearchInform FileAuditor

SearchInform FileAuditor

Overview

What is SearchInform FileAuditor?

SearchInform FileAuditor is a DCAP solution (data-centric audit and protection) for automated audit of information storages, search for access violations and tracking changes made to critical data. The system protects confidential documents from careless and deliberate malicious actions of employees and puts…

Read more
Recent Reviews
TrustRadius

Leaving a review helps other professionals like you evaluate Data-Centric Audit Protection (DCAP) Software

Be the first one in your network to review SearchInform FileAuditor, and make your voice heard!

Return to navigation

Product Details

What is SearchInform FileAuditor?

SearchInform FileAuditor is a DCAP solution (data-centric audit and protection) for automated audit of information storages, search for access violations and tracking changes made to critical data. The system protects confidential documents from careless and deliberate malicious actions of employees and puts things in order in file storages.

How FileAuditor solves the problem of monitoring the security of critical data:

· Classification of vulnerable data

Finds files in a document flow that contain critical information, and adds a special mark to each file, indicating the type of info it contains: personal data, trade secret, credit card numbers, etc.

· Access rights audit

Controls access rights to information (full access, editing, reading, writing, reading and changing, etc.). Tracks employees who have unauthorized access to data. Finds confidential files stored in violation of established security rules (in the public domain, in shared network folders, on employee PCs, etc.)

· Monitoring and blocking user actions

Audits user operations with the file system. The responsible person is always aware of up-to-date information on the lifecycle of a file (creation, editing, transfer, deletion, etc.). Blocks access to the file and its transfer in any application.

· Critical documents archiving

Makes shadow copies of critical files found on a PC, server or in network folders, saves the history of their revisions. Confidential data archive helps in incident investigation and ensures recovery of lost information.

ADVANTAGES

· PC load control and memory saving – monitoring can be scheduled or provoked by a particular event or condition; it's possible to keep only sensitive documents; a deduplication system saves storage space

· Ability to deploy and operate the software in the cloud. The software can be deployed in the cloud, which allows companies that do not have their own IT infrastructure to use the system.

· Due to customizable rule settings specialists don't have to deal with unnecessary tasks and can focus on monitoring only critical data.

· Changes made to files can be tracked almost instantly – the system saves a specified number of file revisions which helps during internal investigation

· Proactive protection of files from changes and transfers. The system can be configured to block access to documents to prevent unwanted user actions with the files.

· Seamless integration with Risk Monitor or DLP extends the functionality of the solution

SearchInform FileAuditor Features

  • Supported: Classification of vulnerable data
  • Supported: Access rights audit
  • Supported: Critical documents archiving
  • Supported: User activity monitoring

SearchInform FileAuditor Screenshots

Screenshot of Audit of a file containing confidential informationScreenshot of Folder tree with marking of sensitive documentsScreenshot of How the system works

SearchInform FileAuditor Technical Details

Deployment TypesOn-premise, Software as a Service (SaaS), Cloud, or Web-Based
Operating SystemsWindows, Linux
Mobile ApplicationNo
Supported CountriesGlobal
Supported LanguagesEnglish, Spanish, Portuguese, Russian.
Return to navigation

Comparisons

View all alternatives
Return to navigation

Reviews

Sorry, no reviews are available for this product yet

Return to navigation