DCAP solution (data-centric audit and protection) for automated auditof information storages, search for access violations and tracking changes made to critical data.
SearchInform FileAuditor is a DCAP solution (data-centric audit and protection) for an automated audit of information storages, search for access violations and tracking changes made to critical data.
FileAuditor solves the following tasks:
Classification of vulnerable data
Finds files in a document flow that contain critical information, and assigns a certain type to each file: personal data, trade secret, credit card numbers, etc.
Critical documents archiving
Makes shadow copies of critical files found on a PC, server or network folders, saves the history of their revisions. Confidential data archive helps in incident investigation and ensures recovery of lost information.
Access rights audit
Facilitates confidential information access control – automatically monitors open resources, files available to a specific user or group, privileged accounts.
User activity monitoring
Audits user operations in a file system. The specialists responsible for risk mitigation always have their information about changes made to a file updated (creating, editing, moving, deleting, etc.).
FileAuditor currently scores 72/100 in the Identity & Access Management category. This is based on user satisfaction (90/100), press buzz (40/100), recent user trends (falling), and other relevant information on FileAuditor gathered from around the web.
The score for this software has stayed the same over the past month. What is this? |
Regional Restrictions: SearchInform products can be used worldwide and comply with local regulatory requirements.
Seamless integration of a DCAP-solution into Risk Monitor significantly extends the functionality of the system for risk mitigation
Customizable rule settings save specialists from unnecessary work, allowing them to focus on monitoring only critical data
Changes made to files can be tracked almost instantly – the system saves a specified number of file revisions which helps during internal investigation
Product recommendations, vendor rankings, market overview and tips on how to select Identity & Access Management software for business. Published in July 2025.
With organizations increasingly adopting mobile applications and cloud services, the need for user identity and access management has never been more urgent. Software products for managing user identity cater to this need by allowing the right individual ac...
FREE DOWNLOAD Identity-&-Access-Management-Software-Buyer-Guide-2018.pdfYes
Yes
No
No
Risk managers, CEO, internal auditors, information security officers, project managers, data protection officer, internal control officer, business operations manager, SOC
The program demonstrates: