What data is being transfered in and out of the organization?
File Transfer software makes it easy to send data offsite and bring data in from remote locations. It is important to know what data is entering and leaving the company to ensure that all transmissions are authorized. This is especially true of files containing sensitive company and customer information. Much File Transfer usage is “ad-hoc” and auditing is the only way to ensure that people aren’t misappropriating company resources and data.
Knowing what data is being transfered in and out of the organization is also a critical part of managing File Transfers. This information forms the basis for modifying File Transfer server configuration settings, setting folder and file permissions and managing user ID tables. It also provides information that can be used to identify sensitive file names to Sentry Analytics™.
Sentry Analytics’ File Usage view summarizes File Transfers by file name. It shows the number of transactions initiated by for each node of the file names accessed. It summarizes file activity by secured versus unsecured access.
Drill Down for File Activity Details
Double-click a file name entry to see a detailed list of transactions involving files by that name (or pattern).