ShareWatcher Description
ShareWatcher provides comprehensive monitoring of both local and remote Windows File Shares, allowing users to track who accessed the files and when, while also notifying them via email, sounds, custom commands, or Windows events about any new files that are added or deleted, with the added capability to automatically relocate new files through its QuickMove Action feature for any monitored directory. Additionally, this versatile tool extends its functionality to include FTP folder monitoring, ensuring that users stay informed about new file uploads.
ShareWatcher Alternatives
Curtain LogTrace File Activity Monitoring
In the daily work environment, companies often need to authorize their employees to access and use sensitive company data. However, most companies lack visibility into how their employees are actually utilizing this data, and whether any misuse is occurring. At the same time, companies have to meet internal audit requirements and comply with various data security regulations and policies. This creates a need for the IT department to find ways to effectively monitor and record how employees are accessing and using the company’s data resources.
Curtain LogTrace provides enterprise-wide file activity monitoring. It tracks user actions: create, copy, move, delete, rename, print, open, close, save. Includes source/destination paths and disk type. Perfect for monitoring user file activities.
Key Features:
- File log (create & delete file)
- File log (copy & move file)
- File log (print & rename file)
- App log (save, open & close file)
- Support MySQL & MS SQL
- Watermark for printout
- Central administration
- Integration with Active Directory
- Uninstall password for client
- Password management
- Admin delegation
- Self protection for the software
Learn more
Secure Eraser
Secure Eraser: Secure Data Deletion, Shredders Your Files & Folders.
Just because it has been removed from your hard drive doesn't mean that it is gone forever. Anyone can restore the information as long as it was not overwritten. It becomes more difficult if the computer has been resold, or given away.
Secure Eraser employs the most well-known method of data disposal. It overwrites sensitive information so that it cannot be recovered even with specialized software. Our award-winning solutions for permanently destroying data eliminate cross-references that may leave traces of deleted files within the allocation table of your hard disk.
This Windows software is easy to use and can overwrite sensitive data up to 35 times, regardless of whether they're files, folders or drives, recycle bins, or traces of surfing. You can also delete files that you have already deleted but not for good.
Learn more
Metro Commander
Metro Commander is a traditional file management application that enables users to handle their files and directories through the Modern Windows UI design. You can effortlessly create, open, preview, rename, copy, move, delete, search for, and share your files and folders with just a few clicks. The application enhances document browsing speed with navigation buttons for back, forward, and up, alongside thumbnail previews and shortcuts to your Images, Music, and Videos folders, while also allowing you to add links to your preferred directories. Additionally, you can manage your online files by signing into your SkyDrive account, ensuring that all your important documents are accessible. With its user-friendly interface, Metro Commander provides a quick and convenient way to navigate through your files and folders seamlessly. This makes it an excellent choice for anyone looking to streamline their file management process.
Learn more
CPTRAX for Windows
Server File Activity Tracking – Audit who is creating, accessing and moving your files and folders. Track file permission changes. Alerts in real-time about critical file activity Malicious activity containment (Ransomware and mass file deletions, etc.
Automatically stop threats to your Windows servers by calling PowerShell scripts so you can determine exactly what you want to have happen for each type of alert/threat.
Examples of containment:
Disable the user causing the threat
Block the remote IP causing the threat
Workstation File Activity Tracking: Audit who copies files to USB or other removable media. Track who uploads files via FTP or a browser. Block files being created on USB/removable devices. Notifications by email when a removable device connects.
Active Directory Auditing – Keep audit logs and receive real-time alerts about important Active Directory changes, without having to deal with SACLs or Windows Event Logs.
Server Authentication Auditing: Track authentications into Citrix sessions and Windows Servers. All failed logon attempts are reviewed.
Workstation Logon/Logoff Tracking: Get visibility on logons/logoffs at workstations, including locks, unlocks and password changes.
Learn more
Pricing
Pricing Starts At:
$29.99
Pricing Information:
Optional Plugins
Free Version:
Yes
Free Trial:
Yes
Integrations
No Integrations at this time
Company Details
Company:
CodeLine
Year Founded:
2011
Headquarters:
Australia
Website:
www.thecodeline.com/products/sharewatcher/
Recommended Products
Our Free Plans just got better! | Auth0
You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
Product Details
Platforms
Windows
Types of Training
Training Docs
Customer Support
Not Offered
ShareWatcher Features and Options
ShareWatcher User Reviews
Write a Review- Previous
- Next