SearchInform releases FileAuditor

November 2019 Security Services & Risk Management

SearchInform has announced a solution for file system auditing. FileAuditor is a DCAP (data-centric audit and protection) product that allows businesses to control files containing critical data, inform managers about changes made to a file (creating, editing, moving, deleting, etc.) and make shadow copies of recent revisions. The system demonstrates who made these changes and detects access rights violation.

The capabilities of the software are not limited to files only. File folders are subject to analysis and the solution identifies content and modified access rights. A specialist responsible for risk mitigation will have a grasp on what is going on in a file system. This solves the problem of controlling transfer of confidential information to users who do not have access rights to it.

The company has developed the product to call attention to issues occurring in case a file is accessed by an unauthorised employee, edited and copied, and whether it contains critical information. Confidential data sometimes happens to be accessible to hundreds of people instead of a few who are allowed to use it.

“SearchInform FileAuditor allows you to clean up your file system and quickly respond to dangerous situations. For example, an internal corporate incident was discovered by one of our clients – a large retailer – while using the trial version of the product. A market research file, costing thousands of dollars, was accessed by 300 employees instead of a few dozen. If the module had been installed before, the incident would have been prevented,” says Sergey Ozhegov, CEO of SearchInform.

The system detects locations of vulnerable data by enabling any type of search: by phrases, by regular expressions, by attributes (size, location, etc.). It is possible to create complex queries, for example, search by a piece of text and a file attribute at the same time, as well as by selected directories and computers. SearchInform FileAuditor performs data analysis both on local PCs and on servers, which reduces the cost of purchasing data storage equipment.

For more information contact Condyn, +27 12 683 8816, info@condyn.net, www.condyn.net


Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Stolen credentials on the Dark Web
October 2019 , Cyber Security, Security Services & Risk Management
Over 21 million credentials belonging to Fortune 500 companies, 16 million of which were compromised during the last 12 months, are up for sale.

Read more...
Stolen credentials on the Dark Web
October 2019 , Cyber Security, Security Services & Risk Management
Over 21 million credentials belonging to Fortune 500 companies, 16 million of which were compromised during the last 12 months, are up for sale.

Read more...
Vodacom and SAPS launch MySAPS mobile app
October 2019 , Security Services & Risk Management
Vodacom, in partnership with the South African Police Service, will empower citizens to contribute to their own safety as well as the safety of their communities through the newly launched MySAPS app.

Read more...
Enterprise security must change
October 2019 , Cyber Security, Security Services & Risk Management
The recent wave of cyberattacks against local banks has highlighted the importance of protecting data against malicious users.

Read more...
Drones improve risk management
October 2019 , Security Services & Risk Management
Indwe embraces drone technology to help improve risk management and optimise insurance.

Read more...
Body-worn cameras transforming security
October 2019 , CCTV, Surveillance & Remote Monitoring, Security Services & Risk Management
Police Service Northern Ireland now has over 7 000 officers using 2 500 cameras covering approximately 173 000 incidents each year.

Read more...
Protecting your customers’ data
October 2019 , Training & Education, Security Services & Risk Management
Simon Murrell, head of development and executive director at BrandQuantum says companies need to protect their customers from identity theft and data breaches.

Read more...
From physical security to cybersecurity
Access & Identity Management Handbook 2020, Genetec , Cyber Security, Security Services & Risk Management
Genetec discusses the security-of-security concept as a means to protect cameras, door controllers and other physical security devices and systems against cybercriminal activity.

Read more...
Biometrics in identity
Access & Identity Management Handbook 2020 , Access Control & Identity Management, Security Services & Risk Management
With multiple identity providers offering to manage digital identities for the general public, the root identity – the single sovereign trusted identity upon which all others are based – must start with government.

Read more...
Success lies in planning
November 2019, Vox Telecom , Security Services & Risk Management
A safe and smart city will only be successful if it is planned properly, if there is buy-in from all the stakeholders and if it is managed efficiently.

Read more...