- Upgrade Your Data Security Policy through Intelligent Log Analysis
- Monitor, Assess and Optimize Your Data Security Policies
- Fasoo Usage Tracer centrally monitors usage logs for all Fasoo-protected documents
Setting up a perfect data security policy is almost impossible. This is why exceptional policies are so often adopted to balance productivity against security in any sort of policy enforcement settings. One plausible way to address this issue is having a flexible security policy management framework, where security policies can be continuously assessed and optimized through feedback from comprehensive data usage log analysis.
Fasoo Usage Tracer provides a centralized location for organizations to monitor, assess and optimize data security policies enforced by Fasoo Enterprise DRM, a suite of persistent data protection and control solutions, through usage log analysis.
Organizations that have multiple Fasoo data-centric solutions in place can collect and analyze all data usage logs from those solutions in a centralized location on a real time basis. Usage logs include user information, access rights, IP address, security classification, file name, time and date. Not only will this be the one stop location to manage all data/user activity logs but will also offer a more convenient management experience.
Pattern-based usage monitoring allows security administrators to enforce a set of rules to detect and monitor unusual file usage behaviors of targeted users and groups. Administrators can opt to get notifications whenever any violations of the rules are detected.
This solution provides the ratios of provisional license issuing logs to the total licenses issuing logs and compares them between groups and against industry benchmarks. For example, the ratio of individual user groups helps determine which groups need more privileges or abuse provisional or exceptional licenses. The log analysis helps security administrators assess the efficiency and effectiveness of existing security policies. The solution offers organizations with a decision making tool to proactively optimize data-security policies against data security challenges.