A series of security-based Target-Driven policies let you protect high-value targets from unauthorized access. Notification policies notify you when access permissions have been updated. Fencing policies restrict access to certain users and groups, and Lockdown policies prevent new users from being granted access.
Instead of relying on the availability and judgment of IT personnel to recover archived data or remediate the location of sensitive data, designated Data Owners, who are familiar with the data, can perform these tasks quickly and efficiently.
Address compliance requirements for securing confidential and sensitive files by providing Data Owners the ability to remediate the location of these files. When File Reporter is combined with File Dynamics, Data Owners have the means of importing reports and then remediating problems. Data Owners can either move the files to a more secure location, delete the files, or change the ownership of the folder where the files are stored.
Automate data management to mitigate risk. Micro Focus File Dynamics policies ensure that you’re always managing your data assets properly. File Dynamics handles data privacy, rights and access analysis, data disposition, and protection of high-value targets through its policies.
File Dynamics helps you employ user identity information to either grant or deny access to sensitive data. Perform path analyses to view network access rights from any server or share to any particular folder. Archive data to the storage medium you specify so that you always have it for compliance audits. Limit the types of content users can store on your company network to protect yourself against liability claims.
Implement a File Analysis plan, taking action to remediate challenges pertaining to data access and growth. Through automated policies and administrator-initiated management actions, File Dynamics remediates these and other storage management tasks. These policies ensure that access rights are correct and helps you archive or dispose of data once they have completed their lifecycle.
Epoch Data Protection policies let you assure that high-value targets are securely protected to a nearline repository. Should the original files become lost, corrupted, or encrypted through ransomware, you can easily and quickly recover the files from the protected nearline repository.
In addition to identity-driven policies, target-driven policies in File Dynamics can automatically copy, move, and groom any file based on type, age, last access, and more. These operations are ideal for archiving or deleting orphaned files and removing temporary files.
Migrate data from one Active Directory Forest to another or even from an eDirectory tree to an Active Directory forest, while maintaining file ownership, permissions, and metadata.
Create policies that grant and restrict access based on users’ roles. To manage storage for group members, File Dynamics lets you create directory-services-based group policies that grant access to network storage areas and create personal folders in collaborative storage areas on the network.
If you have a large or dynamic user population, Micro Focus File Dynamics can help you generate a substantial ROI by automating storage tasks. That's because it automatically performs provisioning, rights settings, renames, storage transfers, vaulting, disposition, and reassignments.
Let user roles determine file and storage access. You establish the rules, Micro Focus File Dynamics enforces them. Set policies that control folders and dictate users’ access rights. Let File Dynamics implement the policies’ settings so that only authorized users can access potentially sensitive data.
Extend your identity management system. Because Micro Focus File Dynamics uses the same directory as your identity management system (Microsoft Active Directory), File Dynamics can take user storage action when your identity management system takes user account action.
Notifies administrators of any changes in access permissions to high-value targets.
Lets you lock down the access permissions of a high-value target by overriding any changes made to access permissions of the high-value target.
Lets you set limits on how access permissions may change over time by allowing or denying access to specified groups.