Classification of Vulnerable Data
Finds files in a document flow that contain critical information, and assigns a certain type to each file: personal data, trade secret, credit card numbers, etc.
Access Rights Audit
Facilitates confidential information access control – automatically monitors open resources, files available to a specific user or group, privileged accounts.
Critical Documents Archiving
Makes shadow copies of critical files found on a PC, server or network folders, saves the history of their revisions. Confidential data archive helps in incident investigation and ensures recovery of lost information
User Activity Monitoring
Audits user operations in a file system. The specialists responsible for risk mitigation always have their information about changes made to a file updated (creating, editing, moving, deleting, etc.).