We are pleased to announce the release of an update to our file monitoring software solution – FileAudit. With a simple agentless deployment, FileAudit enables IT professionals to proactively monitor access to company-sensitive files and folders stored on Windows systems in real time. Free 20 Day Trial Download of FileAudit IT professionals can set up … Continued
Monitor & Audit File Deletion & Falsification across Windows Servers.
A leading manufacturer in the European Automotive Industry needed to protect important or sensitive files from deletion or falsification. Through FileAudit’s access monitoring and auditing capabilities, the manufacturer has been able to report and track usage of all sensitive files on its Windows network. The risk of files being deleted or tampered with As an … Continued
Monitor Folder Changes in Windows – A Case Study
Being able to monitor folder changes on Windows servers is important for legal companies. A division from a well-known government law enforcement agency needed to better monitor and track the changes of sensitive files and folders presented in the prosecution of major criminals. The division deals with high profile cases such as murder, fraud and … Continued
PCI Control Over Access: 4 Steps to Compliance
By providing visibility and control of corporate access and data, IS Decisions software solutions help companies ensure compliance with the Payment Card Industry (PCI) Data Security Standard (DSS). In this article we’ll focus on how to get compliant by strengthening PCI control over access with need-to-know restrictions, multi-factor authentication, enhanced monitoring and detailed reporting. What … Continued
HIPAA & Network Security for Windows Active Directory
Secure your organization’s network for HIPAA compliance. New revisions to federal privacy and security regulations (the HIPAA Omnibus Final Rule) are now in place with full effect from September 23rd. It concerns the necessary safeguards for protected health information – and stem from changes made under the Health Information Technology for Economic and Clinical Health … Continued
Securing Authorized User Access on Windows Networks
How can organizations safeguard and secure their Windows infrastructure to mitigate insider threat, ensure regulatory compliance and respond to IT emergencies? Rahul Bhatt is a Security Consultant at LOGON Software Asia Limited, a leading independent supplier of security software to the Asian IT communities for over 10 years. IT administrators spend a lot of … Continued
How to Track File Access in Windows – A Case-Study
Does your organization need to track file access? Do you need to monitor employee access to certain or all corporate files? With a wealth of information stored on file servers and document management systems, there is a need to track file access to protect organizations against malicious insiders with authorized access that are looking to … Continued
Monitor File Access on Windows Servers the easy way
So you want to audit and monitor file access (and access attempts) across your Windows Server? You’re absolutely right, It’s an efficient way for an organization to protect their sensitive data and enforce compliance to industry regulations. This post outlines how FileAudit can provide organizations with this insight. Reviewed by PCMag as “an easy yet robust tool for auditing files and folders … Continued
FISMA Compliance: Key Security Requirements
In the United States, the Federal Information Security Management Act (FISMA) compliance is a matter of national security. And, for even the most seasoned and savvy IT pros, navigating security compliance is anything but simple. What is FISMA? Signed into law in 2002 and updated in 2014 as the Federal Information Security Modernization Act, FISMA … Continued
Auditing file access across multiple servers: TechRepublic points towards FileAudit.
When it comes to protecting data theft perpetrated by insiders, “10 ways to make sure your data doesn’t walk out the door” (written by Deb Schinder and published on TechRepublic website) recommends to set up auditing file access on files and folders that contain sensitive data so that you can see who accessed it and when. FileAudit is … Continued