Monitoring and blocking user actions Audits user operations with the file system. The IT security department is always aware of up-to-date information about the “life” of a file (creation,...
Access Rights Audit Controls access rights to information (full access, editing, reading, writing, reading and changing, etc.). Tracks employees who have unauthorized access to data. Finds confidential files stored...
Critical documents archiving Makes shadow copies of critical files found on a PC, server or network folders, saves the history of their revisions. Confidential data archive helps in incident...
Classification of vulnerable data Finds files in a document flow that contain critical information, and assigns a certain type to each file: personal data, trade secret, credit card numbers,...
Document Classification A DCAP solution (data-centric audit and protection) for automated audit of information storage, search for access violations, and tracking changes made to critical data. The system protects...