From now on, the DCAP system is capable of performing analyzis of documents, stored in clouds by connecting to them via the WebDAV protocol.
SearchInform FileAuditor enriched the number of supported sources for content analysis and file classification. Now the system supports analyzis of cloud storages via the WebDAV protocol. It conducts an audit, analyzis the contents of the documents, and categorizes them.
In the program console, an information security officer can see a file and folder tree within the labeled cloud. The label provides information on the contents of the file.
The system offers more than 400 automatic data classification policies. You can also create your own policies based on the needs of the company. This classification label indicates which files require special monitoring and protection. It means that an IS officer does not have to waste time exploring the contents. The program is capable of performing analyzis of data from most popular cloud storage services, such as NextCloud that are based on WebDAV. Optionally, access via this protocol can be enabled on almost any cloud.
“The WebDAV protocol is another data transfer format, such as FTP or HTTP. It is a widely used one, which means that with this protocol’s support, FileAuditor expands the number of storages it is able to protect. Audit and content analysis of the files in clouds allow users to get their storage organized, see what exactly is being stored there, and which part of that can be considered vulnerable,” commented Sergio Bertoni, Lead Analyst at SearchInform.
In addition to WebDAV, in the network scan format, FileAuditor also supports FTP, SFTP, SMB, DFS, NFS standards; Windows, Active Directory, and NetApp file logs; and integrates with Exchange servers. At the local level, FileAuditor agents control any Windows, Linux, or MacOS storage and PCs. Also, FileAuditor seamlessly integrates with Huawei OceanStore and Huawei OceanStor Dorado data storage systems. This makes the SearchInform DCAP system a universal tool for controlling and protecting confidential documents in any infrastructure.
Comments