File activity monitoring



Control file access activities, simplify processes, and cut costs

sensitive business data is stored, it can ensure comprehensive protection of these data, thus avoiding compliance-related penalties. With the organization's increasing control of the database, the reviewers have gradually shifted their focus to the documents. Ensuring that corporate-wide responsibility for document data is clear is no longer a crumbling task. With Imperva, you can easily track user activities and access rights, saving time and meeting compliance requirements, while proving to auditors that you have sufficient control over data protection.


more easily meet compliance requirements

simplifies the compliance process by continuously auditing the file storage system through file activity monitoring and recording in detail all file access information (including the actions of privileged users) throughout the company. You can prove that you have implemented strong controls through flexible reports that summarize audit data.

Save time and improve results with automatic access audit

assigns and determines file access rights based on needs to ensure consistent compliance. With SecureSphere, you can simplify the complex access audit process and develop repeatable workflows. Let the data owner directly empower in the permission review to determine who can access the file. Learn aboutFile user permissions.

to increase IT productivity and cut costs

automates the implementation of manual tasks that are critical to managing file data and improves the productivity of IT personnel. With file activity monitoring, IT organizations can efficiently identify data owners, manage file access rights, track file activity, implement ethics walls, and investigate unusual activities.

find the problem immediately

time is everything. In the event of abnormal file access behavior, file activity monitoring will notify you at the first time. Imperva advanced policy-based document security technology to continuously monitor the most important documents, so that you can save all worries. You can also helpFile Firewalllock suspicious file access to further enhance security.

Develop unused data to save costs

You can reclaim the storage space occupied by unused files and data to quickly reduce costs. With SecureSphere, you can accurately determine the currently used and unused data, and then efficiently archive or delete the unused data.

Specifications

File Activity Monitor Specifications

SpecificationsDescription
supported operating systems
  • Windows 2003, 2008 and 2012

  • RedHat 5.X

  • Solaris 10

supported file systems
  • CIFS file storage system

  • NFS file storage system

  • NAS devices

Supported directory services
  • Microsoft Active Directory users and groups

User permission management
  • Use the permission to audit the user's access to files and lists.

  • Verify that sensitive data is used in an unauthorized way.

  • Identify hibernation accounts

  • Files that can be accessed by a global group

  • Track user permission changes

  • Revoke permissions and group membership

  • The recommended data owner

File system activity audit
  • Username

  • domain

  • object name

  • group

  • (Add, Remove, and Delete)

  • object type

  • attribute

  • values before and after

  • Source and destination IP addresses

Data classification
Tamper-proof audit trail
  • Audit trails are stored in a tamper-proof repository.

  • You can choose to encrypt audit data or set a digital signature.

  • View audit data through role-based access control (read-only)

  • Real-time audit data

deployment mode
  • network: non-inline monitoring and transparent bridging

  • host: lightweight proxy (local or global mode)

management
  • Web user interface (HTTP/HTTPS)

  • The command line interface (SSH/console)

management
  • Implement centralized management through MX Server

events and reports
  • SNMP

  • Syslog

  • and LeadingSIEM supplier integration

  • email data owners and other stakeholders

  • Conformed operations

  • SecureSphere task workflow

  • Integrated Graphics Report

  • Real-time dashboard

related products