Falcon FileVantage

File integrity monitoring that boosts compliance and offers relevant contextual data.
Download Data Sheet

Benefits

Why Choose Falcon FileVantage

  • Central Visibility

    Central Visibility

    Gain central visibility into all critical file changes with relevant, intuitive dashboards displaying valuable information on what changes, who changed it, and how the files and folders were changed.

  • Added Insight from Threat Intelligence Data

    Added Insight from Threat Intelligence Data

    FileVantage provides IT staff additional context with added threat intelligence and detection data. Staff can quickly target file change data with any relevant adversary activity.

  • Increase Overall Efficiency

    Increase Overall Efficiency

    Oversee all file changes with summary and detailed view dashboards - reduce alert fatigue by quickly targeting changes to critical files and systems.

Technical Features

Central Visibility For All Critical Assets

Fulfill Compliance Requirements

Fulfill Compliance Requirements

Falcon FileVantage Enables Organizations to Meet Policy Needs

  • Meet PCI, CIS Controls, Sarbanes-Oxley Act and other regulatory bodies to fulfill monitoring requirements.
  • See unauthorized modifications to all relevant critical system, configuration and content files.
  • Gain instant visibility on all critical folders and registry changes.
  • Maintain integrity of critical hosts with continuous, active monitoring.
Reduce Alert Fatigue

Reduce Alert Fatigue

  • Use pre-defined and custom policies to gain added efficiency and reduce alert volume.
  • Create new policies based on all critical files, folders and registries, as well as users and processes.
  • Set severities for each policy created.
  • Enable or disable policies, and add granular inclusions and exclusions to control false alarms.
Use Detection Data for Added Insights

Use Detection Data for Added Insights

  • Quickly target file, folder and registry changes and see how they relate to active detections.
  • Pivot into threat intelligence to learn how asset changes relate to adversary activity.
  • Use added detection data to prioritize remediation around affected files.