In Sortchinform FileAuditor, has been implemented protection against unauthorized access, changes and data leaks

Anonim
In Sortchinform FileAuditor, has been implemented protection against unauthorized access, changes and data leaks 4868_1

Now the DCAP system "Sortchinform FileAuditor" automatically blocks unwanted acts with files, depending on their contents.

"Surchinform Fileauditor" is a solution for auditing file systems, the program controls confidential documents for PC users and tracks actions with them. The new version of software added the ability to block access and send confidential files in any arbitrary applications.

The task is solved by tags that are automatically assigned to files depending on their category - "Commercial Mystery", "PDN", "Contracts", "Financial Reporting", "Files with Passwords", etc. Then the labels are configured permissions and prohibitions: What users, for what PC and in which applications can be opened and change.

For example, in FileAuditor, you can prohibit sending files with the "PDN" label on any channel - whether it is a corporate messenger or a well-known Telegram. The user simply cannot attach such documents to the attachment and receive an error notification. You can enable work in MS Office with documents from the category "Confidential" Only the Director - then all other users, even getting access to such a file, will not be able to open it.

At the same time, the labels are invisible to users and are inherited with different acts with files, including copying, renaming, shift expansion. FileAuditor automatically rechecks the presence of labels and sets them on the newly created confidential documents files. This ensures continuous control.

Additional advantage of this approach - efficiency. For comparison: DLP is read separately each file sent to find confidential content and check whether it is suitable under the blocking criteria. It takes more time and resources. In Fileauditor, information about whether or is prohibited by file actions are collected in the label - the program reads it and acts instantly. In this case, FileAuditor works autonomously and can provide protection for confidential files even in those companies where DLP is not installed.

In a bundle with DLP, the functionality of the program grows to grow multiple: under the control there will be attempts to send not only the entire file, but also excerpts from it - for example, the text copied to the message or body.

More interesting material on cisoclub.ru. Subscribe to us: Facebook | Vk | Twitter | Instagram | Telegram | Zen | Messenger | Icq new | YouTube | Pulse.

Read more