How it works: Monitor
Continuously tracking access, Torsion intelligently detects anomalies and vulnerabilities, and flags any issues to the right people.
Torsion runs continuously in the background, monitoring who has access to what.
If we detect access which doesn’t look right, we raise a quick notification to the information owner to take a look. Vulnerabilities are shut down in real time.
Intelligent vulnerability detection
Finding access to information that someone shouldn’t have, can be like looking for a needle in a haystack.
Torsion uses advanced Machine Learning to cleverly pinpoint inappropriate access.
It automatically determines who owns the information, and brings the vulnerability to their attention. And if they agree there is a problem, Torsion fixes it.
Stop Sensitive Files in Insecure Locations
Torsion automatically detects when sensitive documents are uploaded to insecure locations.
If sensitive information is uploaded to a folder with open permissions or a relaxed security policy, Torsion immediately detects that the file doesn’t belong here, and alerts the right person in the business to move it.
Prevent Inappropriate Sharing
Torsion allows you to create simple rules and policies which control who may have access to different types of information.
If a user attempts to share information with someone who shouldn't have it, Torsion actively prevents it.
Or if information is shared incorrectly through an external mechanism (e.g. domain groups, mobile apps), Torsion immediately alerts the correct person in the business, so they can review and correct the problem.