FileAudit

, , Comments Off on File Monitoring Software Update. Much more than a file access log.

File Monitoring Software Update. Much more than a file access log.

File Monitoring Software Update. Much more than a file access log.

We are pleased to announce the release of an update to our file monitoring software solution – FileAudit. With a simple agentless deployment, FileAudit enables IT professionals to proactively monitor access to company-sensitive files and folders stored on Windows systems in real time. Free 20 Day Trial Download of FileAudit IT professionals can set up … Continued

, Comments Off on Monitor & Audit File Deletion & Falsification across Windows Servers.

Monitor & Audit File Deletion & Falsification across Windows Servers.

Monitor & Audit File Deletion & Falsification across Windows Servers.

A leading manufacturer in the European Automotive Industry needed to protect important or sensitive files from deletion or falsification. Through FileAudit’s access monitoring and auditing capabilities, the manufacturer has been able to report and track usage of all sensitive files on its Windows network. The risk of files being deleted or tampered with As an … Continued

, , Comments Off on Monitor Folder Changes in Windows – A Case Study

Monitor Folder Changes in Windows – A Case Study

Monitor Folder Changes in Windows – A Case Study

Being able to monitor folder changes on Windows servers is important for legal companies. A division from a well-known government law enforcement agency needed to better monitor and track the changes of sensitive files and folders presented in the prosecution of major criminals.  The division deals with high profile cases such as murder, fraud and … Continued

, , , Comments Off on PCI Control Over Access: 4 Steps to Compliance

PCI Control Over Access: 4 Steps to Compliance

PCI Control Over Access: 4 Steps to Compliance

By providing visibility and control of corporate access and data, IS Decisions software solutions help companies ensure compliance with the Payment Card Industry (PCI) Data Security Standard (DSS).  In this article we’ll focus on how to get compliant by strengthening PCI control over access with need-to-know restrictions, multi-factor authentication, enhanced monitoring and detailed reporting. What … Continued

, , , Comments Off on HIPAA & Network Security for Windows Active Directory

HIPAA & Network Security for Windows Active Directory

HIPAA & Network Security for Windows Active Directory

Secure your organization’s network for HIPAA compliance. New revisions to federal privacy and security regulations (the HIPAA Omnibus Final Rule) are now in place with full effect from September 23rd. It concerns the necessary safeguards for protected health information – and stem from changes made under the Health Information Technology for Economic and Clinical Health … Continued

, , , , , Comments Off on Securing Authorized User Access on Windows Networks

Securing Authorized User Access on Windows Networks

Securing Authorized User Access on Windows Networks

How can organizations safeguard and secure their Windows infrastructure to mitigate insider threat, ensure regulatory compliance and respond to IT emergencies? Rahul Bhatt is a Security Consultant at LOGON Software Asia Limited, a leading independent supplier of security software to the Asian IT communities for over 10 years.   IT administrators spend a lot of … Continued

, , , Comments Off on How to Track File Access in Windows – A Case-Study

How to Track File Access in Windows – A Case-Study

How to Track File Access in Windows – A Case-Study

Does your organization need to track file access? Do you need to monitor employee access to certain or all corporate files? With a wealth of information stored on file servers and document management systems, there is a need to track file access to protect organizations against malicious insiders with authorized access that are looking to … Continued

, Comments Off on Monitor File Access on Windows Servers the easy way

Monitor File Access on Windows Servers the easy way

Monitor File Access on Windows Servers the easy way

So you want to audit and monitor file access (and access attempts) across your Windows Server? You’re absolutely right, It’s an efficient way for an organization to protect their sensitive data and enforce compliance to industry regulations. This post outlines how FileAudit can provide organizations with this insight. Reviewed by PCMag as “an easy yet robust tool for auditing files and folders … Continued

, , , , Comments Off on FISMA Compliance: Key Security Requirements

FISMA Compliance: Key Security Requirements

FISMA Compliance: Key Security Requirements

In the United States, the Federal Information Security Management Act (FISMA) compliance is a matter of national security. And, for even the most seasoned and savvy IT pros, navigating security compliance is anything but simple. What is FISMA? Signed into law in 2002 and updated in 2014 as the Federal Information Security Modernization Act, FISMA … Continued

, Comments Off on Auditing file access across multiple servers: TechRepublic points towards FileAudit.

Auditing file access across multiple servers: TechRepublic points towards FileAudit.

Auditing file access across multiple servers: TechRepublic points towards FileAudit.

When it comes to protecting data theft perpetrated by insiders, “10 ways to make sure your data doesn’t walk out the door” (written by Deb Schinder and published on TechRepublic website) recommends to set up auditing file access on files and folders that contain sensitive data so that you can see who accessed it and when. FileAudit is … Continued

Secured By miniOrange