Product showcase: DCAP solution FileAuditor for data classification and access rights audit

According to the security policies, established in the organization, only 100 users had legitimate access rights to the file.
Only a specialized advanced DCAP system is capable of revealing that a document with confidential content is kept in publicly available storage and that users inside corporate perimeter, who don't have legitimate access rights to the file, access or process it.
FileAuditor scans all file storages and checks them for compliance with security policies.
It examines files' names, directory they are kept in, reveals, which users have access to the files, and what's the most important, it analyzes each files' content.
If the file falls under any of the search rule, FileAuditor adds confidentiality label to the file: for instance, personal data or source code.
It doesn't matter, if the file is moved to another directory, its name and extension are changed - FileAuditor makes decision basing on the file content - if the file still contains something confidential after editing, the appropriate label is added to the file and it remains protected.
IS officer detects violations in files and folder access rights distribution.
FileAuditor shows user access rights to each document and folder using information from file system resources.
Thanks to this, an IS specialist does not need to use additional tools, he/she can immediately see: which groups and employees have access to a document and who are not allowed to access it; view the list of operations available to each user / each group of users with a particular file / a particular directory.
This is how change of access rights to file is performed in FileAuditor.
From now on every operation with a document, such as file opening or changing access to it; making changes to file content; file transmissions etc.
You can select files, which during the time period of interest were changed; renamed, transmitted or deleted; which access rights were redistributed; fell under a rule or vice versa, which control was stopped.
FileAuditor in the illustrative manner visualizes operations with files.
According to the rules, configured beforehand, solution prevents unwanted operations, e.g. attaching file to email, opening email via any application etc.
If an employee doesn't have legitimate access rights to work with the file, but intends to forward or open it, he/she receives a notification on the restriction of the operation.
Security policy activation when a user doesn't have legitimate access rights to work with a file.
If the confidential and valuable data is deleted from the file, the confidentiality label is also changed and the file control is stopped.
The solution makes backups of required types of files just in case they are lost or stolen.
The solution monitors all operations with files, reveals, who and when worked with file and what operations exactly were made if a file was renamed or transmitted anywhere.
The file system audit is the first and necessary step.


This Cyber News was published on www.helpnetsecurity.com. Publication date: Thu, 21 Dec 2023 11:13:05 +0000


Cyber News related to Product showcase: DCAP solution FileAuditor for data classification and access rights audit

Product showcase: DCAP solution FileAuditor for data classification and access rights audit - According to the security policies, established in the organization, only 100 users had legitimate access rights to the file. Only a specialized advanced DCAP system is capable of revealing that a document with confidential content is kept in ...
1 year ago Helpnetsecurity.com
Data Classification Software Features to Look Out For - For organizations looking to improve their data protection and data compliance strategies, technology is essential. Implementation of the right software can help you gain visibility into your company's data, improving your ability to protect customer ...
1 year ago Securityboulevard.com
How to perform a proof of concept for automated discovery using Amazon Macie | AWS Security Blog - After reviewing the managed data identifiers provided by Macie and creating the custom data identifiers needed for your POC, it’s time to stage data sets that will help demonstrate the capabilities of these identifiers and better understand how ...
2 months ago Aws.amazon.com
Data Classification: Your 5 Minute Guide - Data classification has become a vital component of data security governance. With the rise of virtual data networks, organizations must take necessary measures to protect and secure confidential information. Data classification is the process of ...
1 year ago Tripwire.com
Week in review: Terrapin SSH attack, Mr. Cooper breach - Creating a formula for effective vulnerability prioritizationIn this Help Net Security interview, Michael Gorelik, CTO and Head of Malware Research at Morphisec, provides insights into the business impact of vulnerabilities. EMBA: Open-source ...
11 months ago Helpnetsecurity.com
CVE-2021-47603 - In the Linux kernel, the following vulnerability has been resolved: ...
1 month ago
Auditing Kubernetes with Open Source SIEM and XDR - Container technology has gained traction among businesses due to the increased efficiency it provides. In this regard, organizations widely use Kubernetes for deploying, scaling, and managing containerized applications. Organizations should audit ...
1 year ago Thehackernews.com
Microsoft extends Purview Audit log retention after July breach - Microsoft is extending Purview Audit log retention as promised after the Chinese Storm-0558 hacking group breached dozens of Exchange and Microsoft 365 corporate and government accounts in July. The list of affected organizations included government ...
1 year ago Bleepingcomputer.com
Cisco's Commitment to Human Rights: A Tribute to the 75th Anniversary of the Universal Declaration of Human Rights - December 10 marks the 75th anniversary of the United Nations' adoption of the Universal Declaration of Human Rights, a landmark document that for the first time recognized human rights and freedoms are inherent to all individuals, regardless of ...
1 year ago Feedpress.me
9 Best DDoS Protection Service Providers for 2024 - eSecurity Planet content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More. One of the most powerful defenses an organization can employ against distributed ...
1 year ago Esecurityplanet.com
Concentric AI expands Semantic Intelligence DSPM capabilities with audio and video data protection - Concentric AI unveiled that its Semantic Intelligence DSPM solution now offers sensitive data discovery, identification, risk monitoring, and remediation protection for audio and video files, furthering the data protection capabilities of its DSPM ...
1 year ago Helpnetsecurity.com
Building a Sustainable Data Ecosystem - Finally, I outline future research and policy refinement directions, advocating for a collaborative and responsible approach to building a sustainable data ecosystem in generative AI. In recent years, generative AI has emerged as a transformative ...
9 months ago Feeds.dzone.com
Data Protection in Educational Institutions - This article delves into the significance of data protection in educational institutions, emphasizing three key areas: the types of educational data, data privacy regulations, and data protection measures. Lastly, robust data protection measures are ...
1 year ago Securityzap.com
EFF Joins Forces with 20+ Organizations in the Coalition #MigrarSinVigilancia - Today, EFF joins more than 25 civil society organizations to launch the Coalition #MigrarSinVigilancia. The Latin American coalition's aim is to oppose arbitrary and indiscriminate surveillance affecting migrants across the region, and to push for ...
1 year ago Eff.org
New Microsoft Purview features use AI to help secure and govern all your data - More than 90% of organizations use multiple cloud infrastructures, platforms, and services to run their business, adding complexity to securing all data.1Microsoft Purview can help you secure and govern your entire data estate in this complex and ...
1 year ago Microsoft.com
Decoding the data dilemma: Strategies for effective data deletion in the age of AI - Businesses today have a tremendous opportunity to use data in new ways, but they must also look at what data they keep and how they use it to avoid potential legal issues. Forrester predicts a doubling of unstructured data in 2024, driven in part by ...
9 months ago Venturebeat.com
IT consultant in Germany fined for exposing shoddy security The Register - A security researcher in Germany has been fined €3,000 for finding and reporting an e-commerce database vulnerability that was exposing almost 700,000 customer records. Back in June 2021, according to our pals at Heise, an contractor identified ...
11 months ago Theregister.com
Using the Knowledge Store on Cisco Observability Platform - Cisco Observability Platform enables developers to build custom observability solutions to gain valuable insights across their technology and business stack. While storage and query of Metric, Event, Log, and Trace data is a key platform capability, ...
11 months ago Feedpress.me
Social Justice: a global perspective - Today, we commemorate World Day of Social Justice and honor those across the globe who stand for the equitable access to opportunities within societies where individuals' rights are recognized and protected. I have the distinct honor of leading the ...
10 months ago Feedpress.me
Council Gives Green Light to Europe's Corporate Sustainability Due Diligence Directive - For most businesses, corporate responsibility has evolved from a peripheral concern to a core consideration. Today, with the Council's vote on the European Union Corporate Sustainability Due Diligence Directive, the EU took a significant step toward ...
9 months ago Feedpress.me
Palo Alto Networks Prevents Data Loss at Enterprise Scale with NVIDIA - With NVIDIA accelerated computing and AI software, cybersecurity leaders like Palo Alto Networks can safeguard vast amounts of sensitive information with unprecedented speed and accuracy, ushering in a new era of AI-driven data protection. The ...
2 months ago Paloaltonetworks.com
International Threats to Freedom of Expression: 2023 Year in Review - 2023 has been an unfortunate reminder that the right to free expression is most fragile for groups on the margins, and that it can quickly become a casualty during global conflicts. They surfaced in bills and laws around the world that explicitly ...
11 months ago Eff.org
Optimizing Data Lake Usage with Effective Object Management - Data lakes are a popular solution for data storage, and for good reason. Data lakes are flexible and cost effective, as they allow multiple query engines and many object formats without the need to manage resources like disks, CPUs, and memory. In a ...
10 months ago Imperva.com
Electronic Frontier Alliance Comes Back Strong: 2023 in Review - The Electronic Frontier Alliance is a loose network of local groups fighting for digital rights in the United States, chaired by EFF. Members' efforts have been recovering from the limitations put on local organizing caused by the pandemic. More EFA ...
11 months ago Eff.org
Mine Secures $30M in Series B Funding - PRESS RELEASE. BOSTON and TEL AVIV, Israel, Dec. 5, 2023 /PRNewswire/ - Mine, a pioneering company disrupting the data privacy market, announced today that it has raised $30 million in Series B funding, co-led by Battery Ventures and PayPal Ventures, ...
1 year ago Darkreading.com

Latest Cyber News


Cyber Trends (last 7 days)


Trending Cyber News (last 7 days)