![FileAudit FileAudit](https://cdn.isdecisions.com/Images/Layout/Pr/FA/EN/UC-icon-server.png)
Data will most often reside within corporate file servers, shared drives, databases, office documents or files used as part of data transfer operations - making files the focus of a data breach.
![FileAudit FileAudit](https://cdn.isdecisions.com/Images/Layout/Pr/FA/EN/UC-icon-card.png)
The files contain data of value such as credit card information, health records, intellectual properties or personal information on customers or employees. This gives organizations a clear choice in where to place protective efforts.