FileSure Defend Features

Explore the comprehensive security features that make FileSure Defend the ideal solution for protecting your organization's sensitive data and legacy systems

Advanced Rules Engine

Powerful & Flexible Rule Creation

FileSure Defend's advanced rules engine allows you to create highly targeted policies that control file access based on multiple criteria. Create broad rules covering general conditions or narrow rules targeting specific scenarios, all with "include" and "exclude" capabilities for maximum flexibility.

Rules can be based on a wide range of criteria including:

  • File Operations - Control read, write, create, delete, rename, and security setting changes
  • File Location - Define rules for network drives, local drives, USB devices, CD/DVDs, and driveless (VSS) locations
  • File Characteristics - Apply rules based on file type, filename, file signature, and folder name
  • User Context - Create rules specific to username, group membership, program name, and machine name
  • Time Restrictions - Apply rules based on time of day, day of week, and date ranges

Rule Creation Examples

FileSure makes it easy to create powerful rules that offer protection without interfering with legitimate operations. Here are some examples of how our customers use the rules engine:

Block Program Files from Being Modified
Prevent malware by creating a rule that blocks any attempt to write, rename, or delete executable files (*.exe, *.com, *.dll, *.bat, *.ps1) on server and workstation drives. This blocks ransomware and malicious code from being installed while still allowing legitimate software installation when performed by IT administrators.
Restrict Access to Sensitive Financial Data
Create a rule that allows only authorized finance applications (like Excel or your accounting software) to access financial data files, blocking all other applications from reading these files. This prevents data exfiltration even if user credentials are compromised.
Prevent Data Copying to USB Devices
Block attempts to copy sensitive files to external USB storage devices while still allowing specific authorized users to perform legitimate transfers when needed. The rule can include a threshold to detect bulk operations that might indicate data theft.
Control Administrative Share Access
Allow administrators access to what they need through administrative shares while preventing access to sensitive folders or files, even for users with administrative privileges.

Data Loss Prevention

Comprehensive DLP Controls

FileSure Defend offers powerful data loss prevention capabilities by controlling how files can be accessed, copied, and transferred. Unlike traditional DLP solutions that rely on content scanning, FileSure works at the file system level to prevent unauthorized file operations with minimal performance impact.

Our approach allows you to:

  • Control Data Copying - Prevent unauthorized copying of files to USB drives, external hard drives, and cloud storage folders
  • Block Email Attachments - Detect and block attempts to attach sensitive files to webmail or email clients
  • Prevent Cut/Paste - Automatically clear the clipboard when users switch between applications to prevent data exfiltration
  • Control "Save As" Operations - Restrict where users can save copies of sensitive documents
  • Detect Bulk Operations - Identify and block bulk file transfers that may indicate data theft attempts

Application-Based DLP Controls

FileSure's unique approach to DLP includes program name filtering, allowing you to control which applications can access specific file types. This application-based control provides another layer of security by ensuring sensitive data can only be accessed through authorized applications.

For example, you can:

  • Protect Database Files - Allow only your authorized database application to access database files, preventing unauthorized tools from extracting data
  • Secure Document Access - Ensure that only authorized document management applications can access specific file types
  • Prevent Data Scraping - Block unauthorized applications from reading files even if users have legitimate access

This application-based control works even if users have full access rights to the files, providing an additional security layer beyond traditional access control lists.

Advanced Malware Protection

Zero-Day Protection for Legacy Systems

FileSure Defend provides powerful malware protection without relying on signature updates, making it ideal for securing legacy systems that can't run modern antivirus solutions. By controlling file operations at the system level, FileSure can prevent malware execution even when traditional security tools fail.

Our approach offers several key advantages:

  • Prevent Malware Installation - Block unauthorized executables from being written to protected systems
  • Stop File Modification - Prevent malware from modifying system files or configuration settings
  • Block Unauthorized Execution - Implement program whitelisting by controlling which applications can be read and executed
  • Prevent "Switchblade" Attacks - Block execution of malicious code from USB drives without preventing legitimate use

Ransomware Protection

FileSure Defend is particularly effective against ransomware attacks, providing multiple layers of protection to prevent encryption of your critical files. Our solution works on legacy systems where traditional ransomware protection methods may not be available.

  • Block program files from being written by applications commonly used in phishing attacks, such as PDF readers and office applications, preventing malware execution.
  • Stop commonly exploited applications from modifying your system files, preventing the encryption process that ransomware relies on.
  • Detect and block bulk file operations typical of ransomware attacks, stopping encryption before it can affect your entire system.

Centralized Management

Enterprise-Wide Policy Management

FileSure Defend includes a comprehensive management console that allows you to define, deploy, and monitor security policies across your entire organization from a central location. This centralized approach simplifies security administration while ensuring consistent protection.

Key management capabilities include:

  • Hierarchical Rule Management - Define parent and child nodes to create different rule sets for departments or divisions
  • Automatic Policy Distribution - Push rules automatically to protected servers and workstations
  • Local Override Options - Create local rules that take precedence over master policies when needed
  • Offline Protection - Workstations continue enforcing rules when disconnected from the server
  • Role-Based Administration - Control who can modify rules and view reports

Workstation Management

FileSure workstation agents operate silently to enforce your security policies while providing centralized visibility into file operations across your organization. The workstation component is designed to be lightweight and unobtrusive while providing robust security.

FeatureDescription
Silent OperationNo user interface visible to end users
Automatic Updates Pulls rules from the server every few minutes
Offline ProtectionContinues enforcing rules when disconnected from the network
Local CachingKeeps local copy of recorded data and pushes to server when connected
Reliable Communication Logs warning in Windows Application Event log if unable to connect to server
Scheduled SyncRetries connection on schedule (default: every 30 minutes)

Comprehensive Auditing & Reporting

Detailed File Access Auditing

FileSure Defend provides comprehensive auditing of all file operations, giving you complete visibility into who is accessing your data and what they're doing with it. Unlike native Windows auditing, FileSure allows you to target specific activities and filter out noise.

Our auditing capabilities include:

  • File Operation Tracking - Monitor reads, writes, creates, deletes, renames, and security changes
  • User Activity Monitoring - Track all access by username and group membership
  • Program Tracking - See which applications are accessing files
  • Privileged User Monitoring - Track access by administrators and privileged accounts
  • Session Tracking - Monitor logon/logoff activity and remote control sessions

Advanced Reporting Capabilities

FileSure Defend includes powerful reporting tools that help you analyze file activity, identify potential security issues, and demonstrate compliance. With over 50 report templates and customizable query options, you can quickly get the information you need.

  • Schedule reports to run automatically and have them emailed or saved to a folder in your preferred format (PDF, XLS, CSV, XML, HTML).
  • Apply multiple filtering criteria to isolate exactly the information you need, with flexible options for time periods, users, files, and operations.
  • Provide a lightweight interface for non-privileged users like auditors and management to run their own queries without access to FileSure administration.

FileSure's reporting capabilities make it easy to track user behavior, investigate security incidents, and satisfy auditor requests without sifting through massive log files.

Regulatory Compliance Support

Meet Compliance Requirements

FileSure Defend helps organizations meet the requirements of various regulatory standards, including HIPAA, NERC-CIP, PCI DSS, FISMA, FERPA, 21-CFR-11, SOX, and more. Our comprehensive file monitoring and access control capabilities provide the technical controls needed to satisfy auditors.

Key compliance capabilities include:

  • File Integrity Monitoring - Ensure files are not improperly modified or replaced
  • Access Control - Restrict file access based on job function and need-to-know
  • Privileged User Monitoring - Track what administrators are accessing and doing
  • Comprehensive Audit Trails - Document who accessed what data and when
  • Data Loss Prevention - Control how sensitive data can be accessed and transferred

Flexible Deployment Options

Enterprise Deployment

FileSure Defend is designed for flexible deployment in enterprise environments, supporting both centralized and distributed architectures. The solution can be configured to match your organization's structure and security requirements.

  • Central Server Deployment - Install on a central server to manage policies and collect audit data
  • Workstation Deployment - Deploy agents to workstations and servers that need protection
  • Hierarchical Deployment - Create multiple management servers for large distributed organizations
  • Silent Installation - Deploy workstation agents without user interaction
  • Group Policy Deployment - Use Group Policy to distribute and manage FileSure agents

Secure DataStore

FileSure Defend uses a secure, file-based datastore that doesn't require a separate database engine. This approach simplifies deployment while ensuring data integrity and security.

  • No Database Required - No need for SQL Server or other database engines
  • Encryption and Compression - All data at rest is encrypted and compressed
  • Simple Backup - Backup audit data using your existing backup solutions
  • Log Archiving - Archive logs to meet retention requirements
  • Historical Data Analysis - Search through archived log data by placing files back in the FileSure directory

Ready to Secure Your Enterprise?

See FileSure Defend in action and learn how it can protect your organization's sensitive data, ensure regulatory compliance, and defend against malware threats.