PA File Sight - Protection and Auditing
Ransomware Protection
Detects ransomware attacks coming from the network and stops them. Supports honeypots and heuristics. Compromised computers are blocked from reaching files on other protected servers on the network.
Prevent Information Leaks
Detects users copying files, and optionally blocks access. Real-time alerts allow appropriate staff to investigate immediately. Requires Ultra features.
Audit File Access
Audits who is deleting files, moving files or reading files. Often used for compliance purposes. The Ultra version will record this to a database for rich reports.
real-time monitoring Real-time file and folder monitoring
Reports username, IP address and computer
Record creations, deletions, accesses, changes
Alert on file and folder moves and renames
Monitor file and folder permission changes
Automatically block access for specific accounts
Does not rely on Windows Native Auditing
Centralized Management with the Ultra Edition
Customers who trust PA File Sight
Ultra and Lite Editions
Compare Ultra vs Lite to see the differences.
For example, the Ultra Edition has Historical Reports and Advanced Alerts that help detect file copying activity/information leaks.
Screenshots
Monitoring Options
Monitor User Activities
Many Alert Types
Configuration Security
Enterprise Robustness
Optionally store audit data in Microsoft SQL Server (Ultra Edition)
Robust security, your data stays on your servers - it is not sent to the cloud
Monitor remote servers as easily as local servers
Automatic failover with a hot standby server
Access control to limit who sees what reports
Backup SMTP server settings to help ensure alerts get out
Centralized Management for Ultra Edition
PA File Sight 7.1 is enterprise ready. Easily push out monitoring Satellites to watch remote servers and report back to a central system. Administer the system from anywhere.
File Access Auditing Compliance
Many compliance mandates require auditing file access and ensuring file integrity. PA File Sight can help meet those requirements, including those listed below:
PCI (Payment Card Industry) DSS 10.5.5, 11.5, 12.9.5
SOX (Sarbanes-Oxley) DS5.5
GLBA 16 CFR Part 314.4(b) and (3)
HIPAA 164.312(b)
FISMA AC-19, CP-9, SI-1, SI-7
ISO 27001/27002 12.3, 12.5.1, 12.5.3, 15.3
PA File Sight can monitor log files. It can alert on writes (changes) to files, but ignore the expected appends to log files. This lets you detect log tampering.
How to Get Started?
File monitoring doesn't need to be complicated. PA File Sight can be installed and configured in literally a minute or two. Specify a local path and some file types to watch and it will get to work immediately.
© Copyright 2000-2023 COGITO SOFTWARE CO.,LTD. All rights reserved