PA File Sight

by Power Admin

0 reviews
Free Trial Pricing
PA File Sight

Who Uses This Software?

Fortune 500, City, State and Federal Government, Private Companies and Educational Institutions.

Average Ratings

  • Overall
  • Ease of Use
  • Customer Service
  • Features
  • Value for Money

Product Details

  • Starting Price $199/one-time
  • Free Version No
  • Free Trial Yes, get a free trial
  • Deployment Installed - Windows
  • Training Live Online
    Documentation
  • Support Business Hours

Vendor Details

  • Power Admin
  • https://www.poweradmin.com/
  • Founded 2003

About PA File Sight

PA File Sight is a file monitoring software that will help you detect file copying, protect the server from ransomware attacks, and allow auditing of who is reading, writing and deleting important files. It can also tell who is deleting or moving folders. If the user has the optional File Sight Endpoint installed, you can also be notified of file copying activity. The user account, and their IP address is reported.

PA File Sight Features

  • Compliance Management
  • Dashboard
  • Exceptions Management
  • Internal Controls Management
  • Issue Management
  • Multi-Year Planning
  • Risk Assessment
  • Archiving & Retention
  • Audit Trail
  • Controls Testing
  • Environmental Compliance
  • FDA Compliance
  • HIPAA Compliance
  • ISO Compliance
  • OSHA Compliance
  • Risk Alerts
  • Sarbanes-Oxley Compliance
  • Version Control
  • Anti Spam
  • Anti Virus
  • Audit Trail
  • Compliance Management
  • Database Security Audit
  • File Access Control
  • Financial Data Protection
  • Maintenance Scheduling
  • Real Time Monitoring
  • Security Event Log
  • Virus Definition Update
  • Vulnerability Protection
  • AI / Machine Learning
  • Behavioral Analytics
  • Endpoint Management
  • IOC Verification
  • Incident Management
  • Tokenization
  • Vulnerability Scanning
  • Whitelisting / Blacklisting
  • Anti Spam
  • Anti Virus
  • Email Attachment Protection
  • Event Tracking
  • IP Protection
  • Internet Usage Monitoring
  • Intrusion Detection System
  • Spyware Removal
  • Two-Factor Authentication
  • Vulnerability Scanning
  • Web Threat Management
  • Web Traffic Reporting
  • Access Control
  • Compliance Reporting
  • Exceptions Management
  • File Integrity Monitoring
  • Intrusion Detection System
  • Log Management
  • PCI Assessment
  • Patch Management
  • Policy Management