File activity monitoring is similar to database activity monitoring in many respects. For instance, a simple vivid example is that in both cases, you discover the sensitive data on your servers and configure policies to create rules about data access and actions to be taken when rules are met.

File activity monitoring may include the following capabilities:

  • Discovery to inventory files and metadata.
  • Classification to crawl through the files to look for potentially sensitive data, such as credit card information or personally identifiable information.
  • Monitoring- which can be used without discovery and classification to monitor access to files based on policy rules, audit and alert on inappropriate access, or even block access to the files to prevent data leakage.

File …

Read More →