Curtain LogTrace - keeps a thorough log of user file activities - including File creation, Copying, Moving, Renaming, Deleting, Printing, and inserting and removing USB devices - that complements the shortcomings of operating system default logging, and also makes it easier for administrators to monitor and manage document-related operations, helps to ensure that 1) the business complies with internal audit requirements and data security guidelines. 2) keeping an eye on, recognizing, and recording anomalous user behavior 3) sending out notifications, enabling management to respond quickly to protect company data, and supporting the early discovery and remediation of potential security incidents.
Tracking and detecting abnormal user behavior and document activity, making early warnings
Helps ensure that the company complies with internal audit requirements and data security guidelines
Centralized log records, easier for records management and generating different reports
Help management detect and mitigate potential security incidents early
Free version available for commercial use
Service Packages and Offerings
Freebie
Curtain LogTrace (Freemium)
Curtain LogTrace 文件審計日誌 (免費使用)
Service Packages and Offerings
Curtain LogTrace is a shareware that you can download it to use for free.
If you want to record more file activities, including Rename, Print, Save, Save as, also Application log, such as Open and Close, our paid version offers these complement solutions for you.
Service packages and offerings are subject to dedicated terms and conditions, please contact the service providers directly for further details
Details
Curtain LogTrace - keeps a thorough log of user file activities - including File creation, Copying, Moving, Renaming, Deleting, Printing, and inserting and removing USB devices - that complements the shortcomings of operating system default logging, and also makes it easier for administrators to monitor and manage document-related operations, helps to ensure that
1) the business complies with internal audit requirements and data security guidelines.
2) keeping an eye on, recognizing, and recording anomalous user behavior
3) sending out notifications, enabling management to respond quickly to protect company data, and supporting the early discovery and remediation of potential security incidents.