Docs

Ping32

File Security

By implementing strict data security policies, enterprises can build a comprehensive data protection system and safeguard core corporate data.

Overview

The File Security module enables auditing of terminal file operations and external transfers, while supporting effective control of file permissions and transfer channels. By auditing and controlling file behavior on terminals, enterprises can achieve effective data leakage prevention.

 

Leak Tracking

Ping32’s Leak Tracking and Document Flow Traceability monitor file transfer activities in real time, issuing alerts for sensitive behaviors. Multi-level auditing tracks document operations across channels, helping organizations identify potential risks in extensive office activities.

Key features:

  • The leak tracking engine performs deep analysis of user operations, auditing file transfers via different application channels, with multi-dimensional statistics and visual dashboards to help enterprises monitor terminal file transfer activities and assess risks.

  • External files can be analyzed for sensitive content; files are automatically backed up, and sensitive behaviors are assigned risk levels.

  • Document flow traceability tracks creation, modification, transfer history, involved personnel, terminal devices, transmission methods, and timestamps, enabling transparent and controllable document management.

  • Triggered screen recording: sensitive actions automatically activate screen capture, providing combined visual and textual evidence for tracing data leakage incidents.

 

File Operation Control

File Operation Control is critical to ensure enterprise file security. By restricting terminal permissions for specific files, enterprises prevent accidental or improper actions that could result in data loss or leaks.

Permissions can be configured for specific file paths:

  • Read

  • No copy

  • No delete

Only authorized personnel can perform operations on designated files, ensuring data integrity and security.

 

File Transfer Control

File Transfer Control enforces policies on improper usage or transmission of sensitive data, effectively managing document flow and preventing intentional or accidental leaks.

Key capabilities:

  • Flexible rules allow enterprises to set policies for file types, sizes, and transfer applications according to actual needs.

  • Users initiate file transfer requests via a compliant approval process, ensuring only authorized personnel can access and send sensitive data.

  • Real-time backup and historical screen capture of outgoing files provide a basis for audits and post-event investigation.

These controls ensure enterprises can trace all operations and file content, quickly identifying and mitigating potential data leakage risks.

Concept