Safend Reporter is a data analysis and reporting tool that provides heightened visibility into removable device usage and policy enforcement. The solution reports on data accessed by removable storage devices and wireless ports, providing extensive security and operational reporting that enables data security and regulatory compliance.
Safend Reporter presents data in a clear and easy-to-understand dashboard format that can benefit all viewers, including non-technical personnel and executives. Through drill-down capabilities, Safend Reporter also delivers detailed reports to data security personnel within the organization. The security reporting tool enables easy detection of specific employees and departments that frequently disregard internal security policies, while the administrative reports assist in the deployment, policy distribution and overall visibility of endpoint activity within the organization.
Security incidents by incident type, users and organizational units
Allows Safend administrators to view security incidents by incident type as well as by which Organizational Units, specific users and computers are violating the corporate security policies or committing an extraordinary number of "allowed but suspicious" activities.
Enables administrators to view the entire range of security policies applied on the organization and its overall security policy. It also helps identify endpoints that do not have a valid policy applied to them.
It allows administrators to view the progress of the Safend Protector Agent deployment across the enterprise. The report shows the percentage of the organization's machines protected by the Safend Agent and provides a detailed list of the machines not yet protected.
It generates a detailed list of all physical devices that were used within a defined time frame. These devices can be copied to a policy White List in Safend Protector in order to simplify the policy creation process.
Runs reports periodically and sends results via email to predefined recipients. This facilitates the continuous tracking of the organization's security status.