FileAudit

, , Comments Off on Why Monitoring Shared Folder Access is so vital for this Law Enforcement Division in Court

Why Monitoring Shared Folder Access is so vital for this Law Enforcement Division in Court

Why Monitoring Shared Folder Access is so vital for this Law Enforcement Division in Court

A division from a well-known government law enforcement agency needed to better track the usage of sensitive files presented in the prosecution of major criminals.  The division deals with high profile cases such as murder, fraud and serial sexual assaults, serving over 1,000 employees including civilian members and police officers. Their work supports major investigations … Continued

, , , Comments Off on PCI DSS Access Compliance

PCI DSS Access Compliance

PCI DSS Access Compliance

By providing visibility and control of corporate access and data, IS Decisions software solutions help companies ensure compliance with the Payment Card Industry (PCI) Data Security Standard (DSS).  In this article we’ll focus on the stronger access control, enhanced monitoring and detailed reporting that are needed for PCI DSS compliance. PCI DSS compliance requirements Simply put, … Continued

, , , Comments Off on HIPAA & Network Security for Windows Active Directory

HIPAA & Network Security for Windows Active Directory

HIPAA & Network Security for Windows Active Directory

Secure your organization’s network for HIPAA compliance. New revisions to federal privacy and security regulations (the HIPAA Omnibus Final Rule) are now in place with full effect from September 23rd. It concerns the necessary safeguards for protected health information – and stem from changes made under the Health Information Technology for Economic and Clinical Health … Continued

, , , , , Comments Off on Securing Authorized User Access on Windows Networks

Securing Authorized User Access on Windows Networks

Securing Authorized User Access on Windows Networks

How can organizations safeguard and secure their Windows infrastructure to mitigate insider threat, ensure regulatory compliance and respond to IT emergencies? Rahul Bhatt is a Security Consultant at LOGON Software Asia Limited, a leading independent supplier of security software to the Asian IT communities for over 10 years.   IT administrators spend a lot of … Continued

, , Comments Off on File System Auditing. Video Tutorials for FileAudit

File System Auditing. Video Tutorials for FileAudit

File System Auditing. Video Tutorials for FileAudit

The IS Decisions team have made a new series of video tutorials on FileAudit – the file system auditing software. The Video Tutorials are designed to further complement existing resources that include support, documentation and a user community. A how-to on file auditing The full tutorial playlist is now available. Each episode in the series … Continued

, , , Comments Off on How to Track File Access across all Windows Servers. A Case-Study.

How to Track File Access across all Windows Servers. A Case-Study.

How to Track File Access across all Windows Servers. A Case-Study.

Does your organization need to track file access? Do you need to monitor employee access to certain or all corporate files? With a wealth of information stored on file servers and document management systems there is a need to track file access to protect organizations against malicious insiders with authorized access that are looking to … Continued

, Comments Off on Nine Steps to better File Auditing

Nine Steps to better File Auditing

Nine Steps to better File Auditing

Whether you’re just getting started with file auditing or looking to advance your existing monitoring and controls, it’s important to know that monitoring and auditing file access across Windows Servers does not need to be time-consuming and overwhelming. With increasing mobility and remote working trends, it is becoming even more challenging for IT to protect sensitive data and ensure … Continued

, Comments Off on Monitor File Access on Windows Servers the easy way

Monitor File Access on Windows Servers the easy way

Monitor File Access on Windows Servers the easy way

So you want to audit and monitor file access (and access attempts) across your Windows Server? Your absolutely right, It’s an efficient way for an organization to protect their sensitive data and enforce compliance to industry regulations. This post outlines how FileAudit can provide organizations with this insight. Reviewed by PCMag as “an easy yet robust tool for auditing files and folders … Continued

, , , , Comments Off on FISMA Compliance. What’s the deal?

FISMA Compliance. What’s the deal?

FISMA Compliance. What’s the deal?

In the United States, FISMA Compliance is a matter of national security. This is a guest post from our US partner Information Systems Laboratories (ISL) who offer a wide range of services to help companies implement or improve a corporate cyber/information security program. ISL has entered a partnership with IS Decisions, as they recognize UserLock … Continued

, Comments Off on Auditing file access across multiple servers: TechRepublic points towards FileAudit.

Auditing file access across multiple servers: TechRepublic points towards FileAudit.

Auditing file access across multiple servers: TechRepublic points towards FileAudit.

When it comes to protecting data theft perpetrated by insiders, “10 ways to make sure your data doesn’t walk out the door” (written by Deb Schinder and published on TechRepublic website) recommends to set up auditing file access on files and folders that contain sensitive data so that you can see who accessed it and when. FileAudit is … Continued

Secured By miniOrange