How Actifile Guardrails Works
Don’t take our word for it
CEO, Choice CyberSecurity
Actifile Guardrails Customer Examples
Community Hospital
As a result of installing Actifile, the community hospital was able to:
- Discover existing PHI on the hospital’s endpoints.
- Transparently encrypt all hospital related PHI on roaming endpoints (such as the BYOD Doctor endpoints)
- Create audits and report on PHI usage.
Financial Services
- Support provisioning of laptops to their employees.
- Enable the protection of data at subcontractors (such as printers, lawyers, HR/benefits, etc.).
- Demonstrate compliance
As a result the financial services company was able to control the data without risking scanning employee private data and/or other financial institutions’ customer data.
Diagnostics Lab
- Run a risk assemssent to discover and audit all PHI that is outside the LIMS
- Evaluate the workflows and optimize that ones that result in liability
- Execute controls to substantially reduce the liability associated with data
Benefits Administrator
Using Actifile the benefits administrator was able to:
- Run a risk assessment to discover PII and financial data
- Create a working audit of all the data at all times
- Provide controls that help reduce the liability associated with the data without interrupting the workflows
Contractor
By pointing Actifile to their project repository, Actifile was able to help the company protect their assets transparently – ensuring that authorized personnel were able to get their job accomplished – but in a protected manner.
Duty-Free Retailer
Actifile helped the retailer’s IT to:
- Figure out what was on those endpoints.
- Ensure that European customer information is protected for GDPR.
- Ensure that the corporate information is protected.
Actifile Features
Built in Regulatory Templates
Risk Dashboard and Reporting
Data at Rest Discovery
Data Risk Heatmap
Transparent Encryption for Parked Data
Cloud Based Management
Blacklist and whitelist controls
Supports All
Flavors of BYOD
Our Blog
Actifile Information Security and Compliance Suite Overview
Simplifying DLP for data compliance and protection
Insider Threat at The Age of No Perimeter
Traditional IT security defenses such as antivirus, backup, and firewalls are fairly effective for protecting companies against cyberattacks coming from the ‘outside’, and they definitely have a role to play in securing the perimeter of your clients’ networks. Your...
Managed Service Provider? Work with us
centralized, and well-integrated offering