Integrated File Usage Log Management
Monitor usage logs for all Fasoo-protected documents allowing administrators to assess and optimize data security policies. Pattern-based usage monitoring allows security administrators to detect and monitor unusual file usage behavior while determining the efficiency and effectiveness of existing security policies through intelligent log analysis.
Upgrade your data security policy through intelligent log analysis
for precise monitoring
Collect and analyze all data usage logs from multiple Fasoo
solutions in a centralized location on a real time basis.
Assess and optimize data security policy
Enforce a set of rules to detect and monitor unusual file
usage behaviors of targeted users and groups.
Administrators receive an automatic notification
when abnormal events are detected.
Complete file usage tracking
during its whole lifecycle
Manage data and user activity logs (access rights, IP address,
classification, etc.) and track documents through intuitive
timeline and usage graphs.