February 5, 2016, by
Posted in Product, Security

For companies that must abide by compliance standards like PCI, SOX, or FISMA, keeping a detailed log of file activities is a necessity. Tracking the deletion, editing, and transfer of credit card information or health records is vital in the event that records are lost or stolen. But knowing the “who, what, where and when” of users accessing enterprise data can be complicated; especially with the large amount of cloud file sharing applications being used.

Fortunately, Thru has built-in tracking features to view detailed activity logs of all file transactions. In this blog, we will show you how actions within shared files can be monitored from Thru Web.

In the image below, you can see that Company A has three folders in Thru created for Finance, Marketing and UI Assets. These folders are each shared by internal employees and external clients who have access to upload, download and edit information. By selecting a folder, a user who has granted access can view all transactions taken place with record of date/time, IP Address and what application was used. The example below shows two transactions made by an internal employee and an external client who both share files within the Marketing folder. This is very beneficial for project teams so that all actions can be easily referenced in the event of a lost or deleted file. Users can also easily run reports on transactions for files and folders by clicking on the Export button (as shown below).

Company Folders

Transactions 4

One company that greatly relies on monitoring file sharing activity is architectural design firm, HKS. As in the folders showed above, HKS has shared folders within their system for multiple different projects around the world. Since architects and building contractors both access the same folders, tracking each transaction helps to keep a single source of truth, a crucial need for large-scale architectural projects.