Track File Use and Stop File Theft with ByStorm FileSure

Share Article

ByStorm FileSure 2.0 adds Defense option. Premier file auditing software extended to prevent file misuse with simple rules.

ByStorm Software announced today the immediate availability of FileSure Version 2.0. FileSure provides best-in-class Windows file auditing and defense, enabling Windows administrators to identify who has accessed, modified, deleted, or renamed files. The new release adds "Defend" - a unique enforcement facility allowing administrators to control how files can be used across servers and workstations.

FileSure permits administrators to precisely monitor and control the use of vital data on servers, desktops, and latops, preventing many common errors and providing protection against inadvertent and deliberate misuse of information assets. Administrators can prevent patient records from being mailed with personal web mail services, stop P2P programs from inadvertently sharing proprietary CAD files, keep financial data from being copied to USB memory sticks, and more. A simple rules engine includes built-in support for common issues while permitting precise control for unique needs.

"Our customers saw what was happening to their data and asked for control," said Gene Allen, ByStorm president. "We're thrilled with the response from our beta customers to this new release."

"I knew that FileSure was a winner within a few minutes after installing it," said Joe McDaniel, Director of Information Services for the Arkansas Foundation for Medical Care. "Our compliance officer values the real time display showing access of critical data and the defense rules in Version 2.0 ensure that proprietary data remains private. It's the only thing we found that meets our needs."

FileSure Version 2.0 is available immediately from Pricing starts at $995.

About ByStorm Software LLC
ByStorm Software was founded in 2003 and focuses on delivering "Software that works for you." For more information please visit or call 877-BYSTORM.


Share article on social media or email:

View article via:

Pdf Print

Contact Author

Gene Allen
Visit website