See All Sensitive Content Entering or Leaving the Enterprise
CISO Dashboard Visualization
- Real-time and historical view of all inbound and outbound file movement
- On the Web or in the Kiteworks Splunk App
- All files from all connected systems, whether on-prem or in the cloud
- All activity: who’s sending what to whom, when and where
- Spot anomalies in volume, location, domain, user, source, and scan results
Drill Down to Take Action on Anomalies
CISO Dashboard Ad Hoc Reports
- Drill down to the actionable details, including users, timestamps, and IP addresses
- Visibility down to the file level, the closest you can get to the content
- Export to a spreadsheet for further analysis
- Make decisions based on facts, not hunches
CISO Dashboard Alerts You of Suspicious Downloads
Intelligence, Analytics and Notifications
- Infers possible data exfiltration when an unusual file is downloaded to an unusual location
- Creates a syslog entry for further analysis and correlation by your SIEM
- Sends a notification to your SOC
- Flags the location on the CISO Dashboard map
- Provides all the details: user, IP address, device, server, etc.
Create Custom Dashboards and Reports in Your SIEM
Comprehensive Audit Trails and System Logs
- Leverage detailed logging to create your own SIEM dashboard
- Comprehensive picture of all information going in, through and out of the enterprise
- Even file scans for DLP, AV, ATP are logged and reportable
- Audit trail to connected on-prem and cloud content sources
- Also see every login, login failure, error, administrative setting or permission change, and every system event
- Use any SIEM that reads syslogs: Splunk, IBM QRadar, ArcSight, LogRhythm, FireEye Helix, and more…
Pass Audits and Comply with Industry Regulations
Detailed Compliance Reports
- Enables compliance with HIPAA/HITECH, GDPR, FERPA, SOC 2, FINRA, GLBA, FISMA and more
- All file activity logged, auditable and reportable
- Advanced GDPR and HIPAA one-click, audit-ready reports
- Compliance Reporting for Process, Physical Security and Technology Security requirements
- Adheres with NIST 800-53 and 800-171