Curtain LogTrace File Activity Monitoring
In the daily work environment, companies often need to authorize their employees to access and use sensitive company data. However, most companies lack visibility into how their employees are actually utilizing this data, and whether any misuse is occurring. At the same time, companies have to meet internal audit requirements and comply with various data security regulations and policies. This creates a need for the IT department to find ways to effectively monitor and record how employees are accessing and using the company’s data resources.
Curtain LogTrace provides enterprise-wide file activity monitoring. It tracks user actions: create, copy, move, delete, rename, print, open, close, save. Includes source/destination paths and disk type. Perfect for monitoring user file activities.
Key Features:
- File log (create & delete file)
- File log (copy & move file)
- File log (print & rename file)
- App log (save, open & close file)
- Support MySQL & MS SQL
- Watermark for printout
- Central administration
- Integration with Active Directory
- Uninstall password for client
- Password management
- Admin delegation
- Self protection for the software
Learn more
SBS Quality Management Software
The SBS QMS Suite consists of 5 software modules that work together for efficient Quality compliance:
1) SBS Quality Database
- CAPA / 8D corrective and preventive actions (CAR) with root cause analysis
- Nonconformance management
- Risk analysis including FMEA, SWOT, interested party risk register
- Internal, customer, and third-party audit management
- Environmental Health and Safety (EHS / HSE) management
2) SBS Ground Control
- Employee training management (LMS)
- Self-Paced training
- Change control
- Document control
3) SBS Asset Tracking Database
- Calibrated equipment control
- Preventive maintenance
- Asset inventory management
4) SBS Inspection Database
- Record incoming material, in process, and final product inspection data
- Generate real time SPC charts
- Inspection plans and Control Plans
- Archive data for further statistical analysis
5) SBS Vendor Management
- Maintain an approved vendor list or AVL
- Develop vendor / supplier qualification plans
- Maintain vendor / supplier qualification history
Modules may be purchased separately or in any combination.
On-premise and cloud-based options are available.
Free demos are available for download or contact us for a cloud-based demo.
Learn more
Orangedox
Orangedox provides one-click create virtual data rooms that are directly synced with your Google Drive folders. Prevent your documents from being shared or forwarded and audit every time they've been opened. Easily manage your financial due diligence, fundraising, investor relations & investment management. No limits on the number of files/storage spaces used and share with up to 500 users per room.
Unique Selling Features
Seamless integration with Google Drive: Easily create data rooms from your existing Google Drive folders plus your rooms will always be synced with your Google Drive. No need to upload files to another app. Also integrated with Google Workspace, so you’ll never have to leave Google Drive or Gmail.
Learn more
SkyDRM
Ensure the security of your documents against unauthorized access while maintaining control over their usage. Streamline processes, enhance efficiency, and foster agility in your operations. Safeguard sensitive customer data from wrongful exposure and offer secure access to essential business applications. Shield your trade secrets and intellectual property from potential threats. Bridge the security gaps inherent in perimeter defenses while facilitating effective collaboration among users. Monitor and protect critical business documents, such as proprietary designs and intellectual assets, across various platforms, including devices, applications, cloud services, and on-premises environments. SkyDRM employs advanced digital rights management and dynamic authorization technologies to safeguard files and facilitate secure sharing practices. The document's protection remains intact regardless of its location or the individuals it is shared with, whether within your organization or externally, on file servers, or in the cloud. You can establish permissions for your files, determining who can access, view, edit, print, or share them, thereby maintaining control over your valuable information. This comprehensive approach not only strengthens your security posture but also empowers your team to work more effectively.
Learn more