010-68421378
sales@cogitosoft.com
Categories
AddFlow  AmCharts JavaScript Stock Chart AmCharts 4: Charts Aspose.Total for Java Altova SchemaAgent Altova DatabaseSpy Altova MobileTogether Altova UModel  Altova MapForce Altova MapForce Server Altova Authentic Aspose.Total for .NET Altova RaptorXML Server ComponentOne Ultimate Chart FX for SharePoint Chart FX CodeCharge Studio ComponentOne Enterprise combit Report Server Combit List & Label 22 Controls for Visual C++ MFC Chart Pro for Visual C ++ MFC DbVisualizer version 12.1 DemoCharge DXperience Subscription .NET DevExpress Universal Subscription Essential Studio for ASP.NET MVC FusionCharts Suite XT FusionCharts for Flex  FusionExport V2.0 GrapeCity TX Text Control .NET for WPF GrapeCity Spread Studio Highcharts Gantt Highcharts 10.0 版 HelpNDoc Infragistics Ultimate  ImageKit9 ActiveX ImageKit.NET JetBrains--Fleet JetBrains-DataSpell JetBrains--DataGrip jQuery EasyUI jChart FX Plus OPC DA .NET Server Toolkit  OSS ASN.1/C Oxygen XML Author  OSS 4G NAS/C, C++ Encoder Decoder Library OSS ASN.1 Tools for C with 4G S1/X2 OSS ASN.1/C# OSS ASN.1/JAVA OSS ASN.1/C++ OPC HDA .NET Server Toolkit OPC DA .Net Client Development Component PowerBuilder redgate NET Developer Bundle Report Control for Visual C++ MFC  Sencha Test SPC Control Chart Tools for .Net Stimulsoft Reports.PHP Stimulsoft Reports.JS Stimulsoft Reports.Java Stimulsoft Reports. Ultimate Stimulsoft Reports.Wpf Stimulsoft Reports.Silverlight SlickEdit Source Insight Software Verify .Net Coverage Validator Toolkit Pro for VisualC++MFC TeeChart .NET Telerik DevCraft Complete Altova XMLSpy Zend Server

PA File Sight

PA File Sight - Protection and Auditing

Ransomware Protection

Detects ransomware attacks coming from the network and stops them. Supports honeypots and heuristics. Compromised computers are blocked from reaching files on other protected servers on the network.

Prevent Information Leaks

Detects users copying files, and optionally blocks access. Real-time alerts allow appropriate staff to investigate immediately. Requires Ultra features.

Audit File Access

Audits who is deleting files, moving files or reading files. Often used for compliance purposes. The Ultra version will record this to a database for rich reports.

real-time monitoring Real-time file and folder monitoring

Reports username, IP address and computer

Record creations, deletions, accesses, changes

Alert on file and folder moves and renames

Monitor file and folder permission changes

Automatically block access for specific accounts

Does not rely on Windows Native Auditing

Centralized Management with the Ultra Edition

Customers who trust PA File Sight

Ultra and Lite Editions

Compare Ultra vs Lite to see the differences.

For example, the Ultra Edition has Historical Reports and Advanced Alerts that help detect file copying activity/information leaks.

Screenshots

Monitoring Options

Monitor User Activities

Many Alert Types

Configuration Security

Enterprise Robustness

Optionally store audit data in Microsoft SQL Server (Ultra Edition)

Robust security, your data stays on your servers - it is not sent to the cloud

Monitor remote servers as easily as local servers

Automatic failover with a hot standby server

Access control to limit who sees what reports

Backup SMTP server settings to help ensure alerts get out

 

Centralized Management for Ultra Edition

PA File Sight 7.1 is enterprise ready. Easily push out monitoring Satellites to watch remote servers and report back to a central system. Administer the system from anywhere.

 

File Access Auditing Compliance

Many compliance mandates require auditing file access and ensuring file integrity. PA File Sight can help meet those requirements, including those listed below:

PCI (Payment Card Industry) DSS 10.5.5, 11.5, 12.9.5

SOX (Sarbanes-Oxley) DS5.5

GLBA 16 CFR Part 314.4(b) and (3)

HIPAA 164.312(b)

FISMA AC-19, CP-9, SI-1, SI-7

ISO 27001/27002 12.3, 12.5.1, 12.5.3, 15.3

 

PA File Sight can monitor log files. It can alert on writes (changes) to files, but ignore the expected appends to log files. This lets you detect log tampering.

How to Get Started?

File monitoring doesn't need to be complicated. PA File Sight can be installed and configured in literally a minute or two. Specify a local path and some file types to watch and it will get to work immediately.

 

Quick Navigation;

© Copyright 2000-2023  COGITO SOFTWARE CO.,LTD. All rights reserved