Average Ratings 0 Ratings
Average Ratings 0 Ratings
Description
Actively monitor, audit, report, notify, and react to all interactions with files and folders on Windows Servers and within cloud environments. Keep a close watch, in real time, on access to sensitive documents located on both Windows Servers and cloud storage. With robust filtering options, you can swiftly obtain the information you require, while tracking the IP address and machine name allows for precise identification of access instances. Configure email notifications and automated responses for various access events, such as denied access, file deletions, or activities linked to specific users, machines, or IP addresses, as well as large-scale actions like copying, deleting, or moving multiple files. Maintain a searchable, secure, and always-accessible audit trail for thorough reviews. Assess the access patterns and usage of files stored both on-premises and in the cloud to gain valuable insights. Additionally, set up centralized reporting schedules based on various criteria to streamline your oversight process. This comprehensive approach not only enhances security but also ensures compliance with organizational policies.
Description
One platform allows you to monitor productivity, conduct investigations, and protect yourself against insider risks.
Our powerful workforce analytics will give you visibility into the activity of your remote or hybrid employees. Veriato's workforce behavior analytics go far beyond passive monitoring. They analyze productivity, monitor insider risks and much more. Easy-to-use, powerful tools to keep your office, hybrid, and remote teams productive. Veriato’s AI-powered algorithms analyze user behavior patterns, and alert you to any suspicious or abnormal activity. Assign productivity scores for websites, programs and applications. Choose between three types: Continuous, Keyword Triggered, and Activity Triggered. Track local, removable and cloud storage as well as printing operations. Files can be viewed when they are created, modified, deleted or renamed.
API Access
Has API
API Access
Has API
Integrations
OpenText ArcSight Enterprise Security Manager
Splunk Enterprise
Integrations
OpenText ArcSight Enterprise Security Manager
Splunk Enterprise
Pricing Details
$826 one-time payment
Free Trial
Free Version
Pricing Details
$25 per user per month
Free Trial
Free Version
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Vendor Details
Company Name
IS Decisions
Founded
2001
Country
France
Website
www.fileaudit.com
Vendor Details
Company Name
Veriato
Founded
1998
Country
United States
Website
www.veriato.com
Product Features
Audit
Alerts / Notifications
Audit Planning
Compliance Management
Dashboard
Exceptions Management
Forms Management
Issue Management
Mobile Access
Multi-Year Planning
Risk Assessment
Workflow Management
Computer Security
Anti Spam
Antivirus
Audit Trail
Compliance Management
Database Security Audit
File Access Control
Financial Data Protection
Maintenance Scheduling
Real Time Monitoring
Security Event Log
Virus Definition Update
Vulnerability Protection
Data Security
Alerts / Notifications
Antivirus/Malware Detection
At-Risk Analysis
Audits
Data Center Security
Data Classification
Data Discovery
Data Loss Prevention
Data Masking
Data-Centric Security
Database Security
Encryption
Identity / Access Management
Logging / Reporting
Mobile Data Security
Monitor Abnormalities
Policy Management
Secure Data Transport
Sensitive Data Compliance
Product Features
Cybersecurity
AI / Machine Learning
Behavioral Analytics
Endpoint Management
IOC Verification
Incident Management
Tokenization
Vulnerability Scanning
Whitelisting / Blacklisting
Employee Monitoring
Activity Monitoring
Browsing History
Email Monitoring
Keystroke Recording
Productivity Analysis
Remote Control
Screen Activity Recording
Time & Attendance
Time Tracking
Investigation Management
Contact Management
Data Management
Incident Management
Reporting & Statistics
Subject Profiles