Many corporations would not even notice a breach because they do not have the tools or the processes to detect a breach. In addition, even if they should become aware of a breach they would not be able to reliably determine exactly what information had been accessed.
FTP/Sentry monitors FTP activity across the enterprise and records the activity in a secure location. It can tell you who accessed what information when and from where — all at the click of a mouse. IT staff gains visibility to FTP activity enterprise-wide and are able to monitor system health as well as identify exceptions immediately.
FTP/Sentry provides the controls to monitor and audit FTP activity as well as detect and investigate suspicious activity. FTP/Sentry ensures Audits and Breach investigations can be performed instantly and are accurate, comprehensive, timely and cost effective.
The exposure to breaches is magnified exponentially when sensitive files remain exposed on servers longer than they need to. As users often forget to delete their files, many breaches happen long after a file was uploaded. Most enterprises lack the FTP automation capabilities to manage file retention.
FTP/Sentry helps reduce exposure and prevent data breaches by providing an automation framework capable of detecting uploads of sensitive files and removing files automatically after successful transfer.
Wie FTP/Sentry funktioniert
Remote Monitoring Agents are deployed on distributed platforms (Linux, Unix, Windows etc.) as well as IBM z/OS Mainframes and provide real-time FTP usage data to the Real-Time Monitor.
FTP/Sentry’s Real-Time Monitor interfaces with Remote Monitoring Agents to monitor FTP activity across the enterprise and records the activity in a secure location for audit purposes. It also monitors the health of the Remote Monitoring Agents and can generate an alert when an agent becomes unresponsive.
FTP/Sentry Desktop, a Windows application, can tell you who accessed what information when and from where.
The Alert Center allows you to define alerts for a variety of user-defined events including uploads of sensitive data, transfers to destinations outside the corporate network, failed transfers etc.
The Automation Framework enables you to initiate actions based upon events that have been detected, such as deleting files after successful download, notifying business partners of failed or interrupted file transfers etc.
Möchten Sie mehr erfahren? Kontaktieren Sie uns!
Wenn Sie mehr erfahren möchten, eine Trial Version bekommen möchten oder eine Produktpräsentation, dann kontaktieren Sie uns einfach. Wir werden Ihnen so schnell wie möglich antworten.
The latest Products
Intelligent Routing Platform
Vorteile von FTP/Sentry
FTP/Sentry ensures Audits and Breach investigations are:
✔ - Präzise: Performed using data stored in a secure location, so intruders cannot manipulate log files.
✔ - Umfassend: They encompass all FTP Servers in the enterprise - including those which otherwise might not be included.
✔ - Sofort durchgeführt: Audits and Breach investigations are easily performed without advance planning or notice to collect data and can therefore be performed instantly when suspicion of abuse arises.
✔ - Rechtzeitig: In an Active Attack Scenario, seconds count. FTP/Sentry provides all information instantly.
✔ - Kostengünstig: Ensures Auditors and Breach Investigators do not waste costly time gathering data and sifting through endless log files.
Benachrichtigungen von FTP/Sentry
The Real-Time Monitor can generate alerts for any circumstance. For example:
• - Alerts can be generated for uploads of sensitive data (identified by file name using pattern matching).
• - Alerts can be generated for transmissions of sensitive data.
• - Alerts can be generated for failed FTP transactions (failed file transfers, logon failures, etc.).
• - Alerts can be generated for specific FTP transactions, based on selection criteria you provide.
Einen Verstoß überprüfen / Untersuchungsmöglichkeiten
Breach investigations can be difficult, as often very little information is available. FTP/Sentry allows you to investigate a breach in several possible ways:
► - By Filename: If you know that a given file has been accessed, FTP/Sentry will show you which ID accessed it when and from which IP address.
► - By IP address: If you know an attack originated from a given IP address, FTP/Sentry will show you what files on which servers were accessed and when they were accessed.
► - By FTP Server: If you know a given FTP server was breached, FTP/Sentry will show what files were accessed when, under which ID and from which IP address.
► - By Time Period: If you know when an attack happened, FTP/Sentry will show you what files on which servers were accessed as well as which IDs were used and from which IP addresses they were accessed.
Blue Sea Technology GmbH & Co. KG Beckumer Str. 152
+49 (0) 2382 966 225 email@example.com
+49 (0) 2382 966 225 firstname.lastname@example.org