Who is Transfering Sensitive Data?
It is important to know when and how sensitive data is being transfered in and out of the enterprise and who is doing it. Transfering sensitive data unsecured or to/from unauthorized locations can result in a breach that could be avoided with effective File Transfer management.
Sentry Analytics’ custom reporting options make it simple to answer this and many other questions.
- Which user IDs were used to initiate transfers of sensitive data
- How many transfers were initiated
- How many utilized secured versus unsecured protocols