Complete solution for Data Access Governance
File Activity Monitor
- Audit file movement and permissions
- Complete audit trail with quick search
- SIEM-integration with low amount of events
- Determination of Data Admin
- Proposal for permissions and groups
- Control of the critical business datas
- Real-time alerts and interventions
- Rule-based and protected objects
- Against ransomwares and data erasures
More than 65% of the companies and organizations are afraid of data theft or misuse of administrator privileges. Accordint to 91% of their employees have access for those files which they don't work, and 70% of the companies are not able to monitor and audit it's privileged users.
Source: Dimensional Research, The Growing Security Threat from Insiders
The StealthAUDIT operation stars with the integration of Active Directory.
Compares intelligently the file systems metadata with the AD group memberships and permissions, then it makes a proposal to the reduced permissions, elimination of AD errors, and either individual or mass changes.
All the collected datas can be used freely in a structured SQL database.