Curtain LogTrace File Activity Monitoring
In the daily work environment, companies often need to authorize their employees to access and use sensitive company data. However, most companies lack visibility into how their employees are actually utilizing this data, and whether any misuse is occurring. At the same time, companies have to meet internal audit requirements and comply with various data security regulations and policies. This creates a need for the IT department to find ways to effectively monitor and record how employees are accessing and using the company’s data resources.
Curtain LogTrace provides enterprise-wide file activity monitoring. It tracks user actions: create, copy, move, delete, rename, print, open, close, save. Includes source/destination paths and disk type. Perfect for monitoring user file activities.
Key Features:
- File log (create & delete file)
- File log (copy & move file)
- File log (print & rename file)
- App log (save, open & close file)
- Support MySQL & MS SQL
- Watermark for printout
- Central administration
- Integration with Active Directory
- Uninstall password for client
- Password management
- Admin delegation
- Self protection for the software
Learn more
Complize
Australian immigration is complex. Complize is an online immigration compliance platform that delivers innovative automated workflows, online training, and knowledge libraries, enabling organisations to manage and mitigate the risks associated with employing temporary visa holders.
Penalties for non-compliance are severe, including financial penalties, reputational damage, and even imprisonment. Complize addresses these issues by providing end-to-end tools, including best practice onboarding and offboarding procedures, visa expiry tracking, and identifying conduct that may breach immigration laws, thereby reducing your organisation’s risk profile.
Designed by immigration lawyers, the Complize platform simplifies organisational compliance, putting you in control of your immigration records with automated workflows, dashboards, and reporting.
Learn more
Magnet AXIOM Cyber
Magnet Forensics' solutions are used by large and small enterprises to quickly close cases. They use powerful analytics to surface intelligence and insights. They can also leverage automation and the cloud to reduce downtime, and enable remote collaboration at scale.
Magnet Forensics is used by some of the largest corporations in the world to investigate IP theft, fraud and employee misconduct.
Learn more
Aid4Mail
Aid4Mail is a leading email processing tool from Switzerland. It comes in three editions:
1. Use Converter to collect and convert emails accurately, fast, and reliably. It supports all popular mail services (e.g. Office 365, Gmail, Yahoo! Mail) and mailbox file formats (e.g. PST, OST, OLM, mbox). It’s also a popular solution for preparing mail ingestion into archival, eDiscovery and forensics platforms.
2. Investigator adds powerful search queries based on Gmail and Microsoft 365 syntax, native pre-acquisition filters and Python scripting. Use its forensic features to recover deleted and hidden email, and process corrupt or unknown mail formats.
3. Enterprise adds support for Google Vault, Mimecast, and Proofpoint exports. Use it to migrate your company mail to live accounts (IMAP, Microsoft 365, Gmail). You can integrate its CLI seamlessly with your own tools. Enterprise offers flexible licensing options including installation on a server or on a shareable flash drive.
Aid4Mail is used by Fortune 500 companies, government agencies and legal professionals around the world.
Learn more