sec UK distribution by Secudata.co.uk
 

usb
file
 

How secure is your file server?

File servers have been widely used for gathering and sharing important projects and corporate data in work groups for a long time. But exactly how secure is your file server? Physical separation and encryption are certainly important to prevent outsider attacks. But businesses need something more. Fact Sheet: File Server one and two.

 

Existing problems

  • What would happen if your users accidentally copied confidential data over to their personal laptops or outside?
  • What is preventing partners, contractors and temporary file server users from stealing your corporate data?
  • What if your employee accidentally deletes or edits a must-keep file?
  • If you want to install other file server security solutions, are you willing to reregister all of your users?
 

SECUDRIVE’s Resolution

  • Prevent Copying: preventing unauthorized copying, printing, screen capture, and/or network transfer.
  • Track Activity: Detailed logging and real-time monitoring for user, manager, and file activity.
  • Integrated with Ease: Ability to detect users, groups, rights and Active Directory Account.
  • Encrypted Export/Import: Encrypted export/import of files stored on file server.


Using a file server to distribute confidential files for collaboration can come with great risk. There is a greater chance of unauthorized copying of files and data leakage if the file server runs without protection.

With SECUDRIVE File Server, administrators can monitor and control how files are used. Users registered to the file server can have copy control settings applied to them so files cannot be copied out of the file server without the administrator’s approval. With detailed event logs that record user and file activity, you can always keep track of your shared files. File Server is compatible with either Office or CAD applications such as Microsoft Office suite or Autodesk programs, respectively.

 


 

Enquiries: Please complete the form below and we will contact you shortly:

/.

Name *

Telephone / Mobile no *

Confidential E-Mail Address *


Organisation Name *

Security Option *

Comments