Javascript must be enabled to download our products and perform other essential functions on the website.

ionicons-v5-m
ionicons-v5-j
Buy Now Download Free Trial
ionicons-v5-m
ionicons-v5-f

File Sight pa server monitor

Powerful Protection
and Auditing

Key Features:

  • ionicons-v5-e Ransomware Protection
  • ionicons-v5-e Data Loss Prevention - Prevent Information Leaks
  • ionicons-v5-e Audit File Access
  • ionicons-v5-e Trusted Applications (Application Whitelisting)
ionicons-v5-c

watch now!

ransomware protection

Ransomware Protection

  • Detects ransomware attacks coming from the network and stops them
  • Supports honeypots and heuristics
  • Only allow executables to run that meet your rules
  • Compromised computers are blocked from reaching files on other protected servers on the network.
Ransomware Protection information
DLP data loss prevention

Data Loss Prevention (DLP), Prevent Information Leaks

  • Detects users copying files, and optionally blocks access
  • Block access to cloud folders and external drives based on real-time rules
  • Real-time alerts allow appropriate staff to investigate immediately
Data Loss Prevention information
audit file access

Audit File Access

  • Audits who is deleting files, moving files or reading files
  • Often used for compliance purposes
  • The Ultra version will record this to a database for rich reports.
Audit File Access information
malware protection application whitelisting

Trusted Applications

  • Allow only trusted applications to run (Application Whitelisting)
  • Protects against unknown applications (malware) from even starting up
  • File I/O is allowed or denied in real-time based on your rules
Trusted Application information

ionicons-v5-e Real-time file and folder monitoring

ionicons-v5-e Reports username, IP address and computer

ionicons-v5-e Record creations, deletions, accesses, changes

ionicons-v5-e Alert on file and folder moves and renames

ionicons-v5-e Allow or prevent file access based on real-time rules

ionicons-v5-e Monitor file and folder permission changes

ionicons-v5-e Automatically block access for specific accounts

ionicons-v5-e Does not rely on Windows Native Auditing

Features

Ultra and Lite Editions

Compare Ultra vs Lite to see the differences.

For example, the Ultra Edition has Historical Reports and Advanced Alerts that help detect file copying activity/information leaks.

Customers who trust Power Admin

See more ...

Enterprise Robustness

ionicons-v5-e Optionally store audit data in Microsoft SQL Server (Ultra Edition)

ionicons-v5-e Robust security, your data stays on your servers - it is not sent to the cloud

ionicons-v5-e Monitor remote servers as easily as local servers

ionicons-v5-e Automatic failover with a hot standby server

ionicons-v5-e Access control to limit who sees what reports

ionicons-v5-e Backup SMTP server settings to help ensure alerts get out

See the detailed feature list for more information.

Centralized Management for Ultra Edition

PA File Sight 9.4 is enterprise ready. Easily push out monitoring Satellites to watch remote servers and report back to a central system. Administer the system from anywhere.

PA File Sight file auditing diagram

File Access Auditing Compliance

Many compliance mandates require auditing file access and ensuring file integrity. PA File Sight can help meet those requirements, including those listed below:

  • PCI (Payment Card Industry) DSS 10.5.5, 11.5, 12.9.5
  • SOX (Sarbanes-Oxley) DS5.5
  • GLBA 16 CFR Part 314.4(b) and (3)
  • HIPAA 164.312(b)
  • FISMA AC-19, CP-9, SI-1, SI-7
  • ISO 27001/27002 12.3, 12.5.1, 12.5.3, 15.3
  • NIST 800-53 and NIST 800-171

PA File Sight can monitor log files. It can alert on writes (changes) to files, but ignore the expected appends to log files. This lets you detect log tampering.

How to Get Started?

File monitoring doesn't need to be complicated. PA File Sight can be installed and configured in literally a minute or two. Specify a local path and some file types to watch and it will get to work immediately.