SearchInform releases FileAuditor

1 November 2019 Security Services & Risk Management

SearchInform has announced a solution for file system auditing. FileAuditor is a DCAP (data-centric audit and protection) product that allows businesses to control files containing critical data, inform managers about changes made to a file (creating, editing, moving, deleting, etc.) and make shadow copies of recent revisions. The system demonstrates who made these changes and detects access rights violation.

The capabilities of the software are not limited to files only. File folders are subject to analysis and the solution identifies content and modified access rights. A specialist responsible for risk mitigation will have a grasp on what is going on in a file system. This solves the problem of controlling transfer of confidential information to users who do not have access rights to it.

The company has developed the product to call attention to issues occurring in case a file is accessed by an unauthorised employee, edited and copied, and whether it contains critical information. Confidential data sometimes happens to be accessible to hundreds of people instead of a few who are allowed to use it.

“SearchInform FileAuditor allows you to clean up your file system and quickly respond to dangerous situations. For example, an internal corporate incident was discovered by one of our clients – a large retailer – while using the trial version of the product. A market research file, costing thousands of dollars, was accessed by 300 employees instead of a few dozen. If the module had been installed before, the incident would have been prevented,” says Sergey Ozhegov, CEO of SearchInform.

The system detects locations of vulnerable data by enabling any type of search: by phrases, by regular expressions, by attributes (size, location, etc.). It is possible to create complex queries, for example, search by a piece of text and a file attribute at the same time, as well as by selected directories and computers. SearchInform FileAuditor performs data analysis both on local PCs and on servers, which reduces the cost of purchasing data storage equipment.


Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Protecting yourself from DDoS attacks
Cyber Security Security Services & Risk Management
A DDoS attack, when an attacker floods a server or network with Internet traffic to prevent users from accessing connected online services, can be costly in both earnings and reputation.

Read more...
Crossing the chasm
Editor's Choice News Security Services & Risk Management Training & Education
Industry reports suggest that in the next ten years, millions of jobs could go unfilled because there simply are not enough people to fill them.

Read more...
Records in place now, not later
Editor's Choice Security Services & Risk Management
It is important, after an incident, to have records in place as soon as possible. Too often the matter is left for the day when the company is going to court, or a disciplinary hearing is scheduled.

Read more...
Considering cloud downtime insurance?
Arcserve Southern Africa Cyber Security IT infrastructure Security Services & Risk Management
Byron Horn-Botha, business unit head, Arcserve Southern Africa, reveals three vital steps that you must consider to ensure business continuity before you buy insurance.

Read more...
Real-world sustainability and innovation
Axis Communications SA Security Services & Risk Management
Technology such as smart city surveillance systems, in combination with video analytics that use artificial intelligence to analyse, prioritise and make decisions, enables cities to use resources as efficiently and sustainably as possible.

Read more...
The $600 000 question
Cyber Security Security Services & Risk Management Financial (Industry)
Usman Choudhary, chief product officer of VIPRE Security Group, advises companies to do the basics to protect themselves before looking for cyber insurance.

Read more...
Axora launches Metals and Mining Innovation Forecast 2022/23
IT infrastructure Security Services & Risk Management
Miners making super-slow progress towards digital transformation despite universally designating it ‘critical to survival’, with cybersecurity one of the concerns hindering progress.

Read more...
Putting safety at the heart of the city
Security Services & Risk Management
While no device or solution in the world will change the ongoing threat to women, there are smart innovations that can make the city safer.

Read more...
The next generation of Point of Sale
Commercial (Industry) Security Services & Risk Management Products
New digital point-of-sale (POS) platforms are gaining traction, which means payment providers and investors should take note.

Read more...
Define your strategy for agility and resilience
Security Services & Risk Management
The effects of the global pandemic have permeated every facet of our professional and personal lives. How we approach work and how organisations view business fundamentals have changed irrevocably.

Read more...