AIMstor enables you to secure your corporations' most critical information at storage endpoints, and by specific policies and classifications that enable lifecycle security implementation to your data.
AIMstor's change detection technology tracks, alerts and enforces out-of-policy activities. From simple things, such as the limitation of MP3 file placement on laptops, to the copy of executable files, and potential malware, to corporate file servers.
Achieve greater control of sensitive and secret information throughout its data life cycle
- The Who, What, When, Where, How for all data generation, changes, and movement.
- User behavior
- Control, limit, and restrict user behavior through policies and classifications that are assigned the moment data is created.
- Endpoint Storage
- Block endpoint data theft from any computer to any system (USB, iPod, Cameras, SD memory, cell phones, firewire disks, etc).
- Network Files
- Block user initiated network data theft from any machine.
- Block unauthorized files (executables, media, etc.) from being placed on unprotected server share folders.
- Policies are created once, then AIMstor self-managing nodes do their job.
- Data Theft
- Reduce potential for rogue user data theft, misuse, and liability of data loss.
- Data Sprawl
- Helps control "data sprawl" through consistent data management, intelligent blocks on types of data, and specialized policies on targeted file classifications.
File Access Control and Forensic Tracking
I.T. management is hard enough without having to play detective using native OS tools. AIMstor solves this problem by providing the ability to implement file level control for access, and forensic tracking, as part of the overall AIMstor solution.
AIMstor provides real-time Control and Tracking of Files and Folders on Windows machines (servers, laptops, etc.).
How is AIMstor different than other File / Folder tracking tools?
- Uses real-time Data Change technology (as opposed to "post snapshot compare")
- Tracks changes down to byte level
- Uses real-time policy engine to enforce forensic tracking, or even Blocking of file access
- Does not use Windows Event Logs
- Uses human behavior patterns for application into incident logs
- No changes to your Windows security configuration
- Audits local and remote file access in real-time including identification of user login, and physical or virtual machine.
- Saves specific byte level changes made to any file for later comparison.
AIMstor logs all data for viewing by I.T. manager, and provides the following:
Tracking of File System Access and Folder Access:
- change (writing to file)
- permissions changes
- ownership changes
Denial of File System and Folder Access:
- Blocked creates (specified Blocked file types, such as multi-media)
- Blocked deletes
- Blocked renames
- Blocked modifications
- Blocked creates
- Blocked deletes
- Blocked renames (for instance: prevent unwanted folder moving)
Interoperability across unrelated Domains, Active Directory Forests and stand-alone servers/workstations.
Scalable Administration interface that enables functionality on a small network to one with thousands of servers.
Unattended and Scheduled Reporting
For Portable Mass Storage Control
Secure and monitor endpoint data theft from any laptop, desktop, file server, or other computer from access to portable storage via USB, Firewire or other access port. Mass storage can include devices such as USB thumb drives, iPod, Cameras, SD memory, cell phones, portable disk drive and others.
For File Server Storage Control
Control the types of data that you allow onto file servers. Eliminate the ability to store any classification of data, ranging from specific types of multi-media. Control storage resources and save space, and eliminate junk from system resources, forever.
In the image below, AIMstor uses Track to show the full file history with touches and actions captured in the log, based on who made changes, what are exact changes, and when.
If desired, changes can be captured along the timeline by combining AIMstor's Version with Track functions in a single policy. Restore of particular versions from any specific point in time can help maintain data compliance consistency. It can also be a key foundation for data governance within your organization.