FileAudit

, , Comments Off on File Monitoring Software Update. Much more than a file access log.

File Monitoring Software Update. Much more than a file access log.

File Monitoring Software Update. Much more than a file access log.

We are pleased to announce the release of an update to our file monitoring software solution – FileAudit. With a simple agentless deployment, FileAudit enables IT professionals to proactively monitor access to company-sensitive files and folders stored on Windows systems in real time. Free 20 Day Trial Download of FileAudit IT professionals can set up … Continued

, Comments Off on Monitor & Audit File Deletion & Falsification across Windows Servers.

Monitor & Audit File Deletion & Falsification across Windows Servers.

Monitor & Audit File Deletion & Falsification across Windows Servers.

A leading manufacturer in the European Automotive Industry needed to protect important or sensitive files from deletion or falsification. Through FileAudit’s access monitoring and auditing capabilities, the manufacturer has been able to report and track usage of all sensitive files on its Windows network. The risk of files being deleted or tampered with As an … Continued

, , Comments Off on Monitor Folder Changes in Windows – A Case Study

Monitor Folder Changes in Windows – A Case Study

Monitor Folder Changes in Windows – A Case Study

Being able to monitor folder changes on Windows servers is important for legal companies. A division from a well-known government law enforcement agency needed to better monitor and track the changes of sensitive files and folders presented in the prosecution of major criminals.  The division deals with high profile cases such as murder, fraud and … Continued

, , , Comments Off on PCI DSS Access Compliance

PCI DSS Access Compliance

PCI DSS Access Compliance

By providing visibility and control of corporate access and data, IS Decisions software solutions help companies ensure compliance with the Payment Card Industry (PCI) Data Security Standard (DSS).  In this article we’ll focus on the stronger access control, enhanced monitoring and detailed reporting that are needed for PCI DSS compliance. PCI DSS compliance requirements Simply put, … Continued

, , , Comments Off on HIPAA & Network Security for Windows Active Directory

HIPAA & Network Security for Windows Active Directory

HIPAA & Network Security for Windows Active Directory

Secure your organization’s network for HIPAA compliance. New revisions to federal privacy and security regulations (the HIPAA Omnibus Final Rule) are now in place with full effect from September 23rd. It concerns the necessary safeguards for protected health information – and stem from changes made under the Health Information Technology for Economic and Clinical Health … Continued

, , , , , Comments Off on Securing Authorized User Access on Windows Networks

Securing Authorized User Access on Windows Networks

Securing Authorized User Access on Windows Networks

How can organizations safeguard and secure their Windows infrastructure to mitigate insider threat, ensure regulatory compliance and respond to IT emergencies? Rahul Bhatt is a Security Consultant at LOGON Software Asia Limited, a leading independent supplier of security software to the Asian IT communities for over 10 years.   IT administrators spend a lot of … Continued

, , , Comments Off on How to Track File Access in Windows – A Case-Study

How to Track File Access in Windows – A Case-Study

How to Track File Access in Windows – A Case-Study

Does your organization need to track file access? Do you need to monitor employee access to certain or all corporate files? With a wealth of information stored on file servers and document management systems, there is a need to track file access to protect organizations against malicious insiders with authorized access that are looking to … Continued

, Comments Off on Monitor File Access on Windows Servers the easy way

Monitor File Access on Windows Servers the easy way

Monitor File Access on Windows Servers the easy way

So you want to audit and monitor file access (and access attempts) across your Windows Server? You’re absolutely right, It’s an efficient way for an organization to protect their sensitive data and enforce compliance to industry regulations. This post outlines how FileAudit can provide organizations with this insight. Reviewed by PCMag as “an easy yet robust tool for auditing files and folders … Continued

, , , , Comments Off on FISMA Compliance. What’s the deal?

FISMA Compliance. What’s the deal?

FISMA Compliance. What’s the deal?

In the United States, FISMA Compliance is a matter of national security. This is a guest post from our US partner Information Systems Laboratories (ISL) who offer a wide range of services to help companies implement or improve a corporate cyber/information security program. ISL has entered a partnership with IS Decisions, as they recognize UserLock … Continued

, Comments Off on Auditing file access across multiple servers: TechRepublic points towards FileAudit.

Auditing file access across multiple servers: TechRepublic points towards FileAudit.

Auditing file access across multiple servers: TechRepublic points towards FileAudit.

When it comes to protecting data theft perpetrated by insiders, “10 ways to make sure your data doesn’t walk out the door” (written by Deb Schinder and published on TechRepublic website) recommends to set up auditing file access on files and folders that contain sensitive data so that you can see who accessed it and when. FileAudit is … Continued

Secured By miniOrange