Data Loss

Data Loss

Do we fail to take Data Security Seriously? From my experience most companies I have seen fail to take data security seriously.

The sad fact is that In the life time of most companies a Breach will happen, but with good Data Security in the form of encryption the stolen data can be rendered as useless to the attacker, so your company and your customer are not impacted. Since 2013 only in 4% of breaches was the data rendered as useless to the attacker because companies acted responsibly and used encryption.

Breach Level Index

Tracking documents and printing is not enough yet. SurveilStar also enables you to control over every document operation. You can forbid certain users from accessing some documents, or grant read-only ability to the users.

SurveilStar can block copying files to removable devices, burning files to disc, transferring files via IM/FTP tools, or printing documents.

The document operation log contents include

  • Document operation type
  • Time
  • Computer name
  • User name
  • Source file name
  • File size
  • Path
  • Disk type
  • Application and caption.

If the file is shared via network, SurveilStar will also track who has been operated the shared file and the user’s IP address.

 

SurveilStar makes it easy for administrators or senior-level management to control access to mission-critical files and data. SurveilStar creates a record of who opened what file at what time and made what changes to it.

Thus, SurveilStar is raising the bar in data protection, by taking actions – blocking or tracking access — based on the contents within a file (for example, a Word document or Excel spreadsheet) as well as file names and paths, SurveilStar also eliminates the need for cumbersome fingerprinting of documents, or the need to check all files against a critical document repository on a server.

SurveilStar allows you to enforce individually, on a case-by-case basis, the policies that will affect each employee’s computer use. Example: your CEO can have blanket permission to attach files to an email. A junior member of the accounting team, however, can be blocked from attaching a spreadsheet of your company’s financial data to email.

Read More