Which remote locations are accessing the company’s file transfer servers?
Knowing where data is being transfered into and out of the organization is an important part of managing File Transfer usage. This information forms the basis for modifying File Transfer server configuration settings and identifying unauthorized access.
Sentry Analytics’ Remote IP Usage view summarizes File Transfers by the initiating system. It shows the number of transactions initiated by for each node of the remote IP address of the system. It summarizes File Transfer activity by secured versus unsecured access.
Drill Down for File Transfer Details
Double-click an IP address pattern entry to see a detailed list of transfers initiated from that IP address (or pattern).