Take charge of your sensitive data
with DataSecurity Plus

30-day, fully functional free trial


File server auditing

Audit, monitor, receive alerts on, and report on all file accesses and modifications made in your file server environment in real time.

Learn more

Data leak prevention

Detect, disrupt, and respond to sensitive data leaks via USB devices, emails, printers, and more through real-time security monitoring.

Learn more

Data risk assessment

Perform content inspection and contextual analysis to discover sensitive data in files, and classify it based on vulnerability.

Learn more

File analysis

Analyze disk space usage, manage junk data, identify at-risk data, analyze file permissions, and more by analyzing file security and storage.

Learn more

Cloud protection

Track your organization's web traffic, scrutinize the use of shadow web apps, and enforce policies to block inappropriate or malicious web content.

Learn more

Data visibility and security in one package

DataSecurity Plus, the data visibility and data leak prevention component of Log360, helps fight insider threats, prevent data loss, and meet compliance requirements.

  • Data security
  • Data visibility

USB data theft protection

Secure and control access to USBs by creating block lists. Also, detect and respond to data theft attempts with instant responses.


Email security

Inspect email attachments for restricted content, warn employees against policy violations, and prevent leakage of confidential files via email attachments.


Ransomware response

Proactively detect and shut down the spread of potential ransomware attacks by isolating infected devices from the network with automated threat responses.


Insider threat detection

Monitor all file activities, removable device usage, data transfers, application use, and more 24/7 to spot and respond to anomalous activities.


File copy protection

Selectively block file copy actions across local or network shares to safeguard your organization's business-critical information from theft and exposure.


File integrity monitoring

Spot unusual file activities and unwarranted file transfers with real-time file activity monitoring. You can also trigger instant alerts and execute scripts in response.


Security incident response

Detect and automate immediate responses to ransomware attacks, data exfiltration attempts, file transfer anomalies, and more.


Application allow listing

Reduce the risk posed by malicious applications and ensure that only trusted and vetted applications are executed by enforcing application control.


Web content filtering

Scrutinize the use of shadow IT services and block productivity-draining cloud applications like social networking, e-commerce, and other websites with sensitive content.


File access auditing

Track all file accesses, including read, create, rename, copy, permission change, delete, and more in real time with details on who accessed what, when, and from where.


File copy auditing

Track and record every time a user presses Ctrl+C or right-clicks to copy a file from network shares, workstations, and removable storage devices like USBs.


Workstation monitoring

Gain visibility into file access patterns, data transfer activities, cloud upload and download information, and more with in-depth endpoint security monitoring.


Data discovery

Locate files containing sensitive personal data like PII, ePHI, and PCI using predefined data discovery policies, and demonstrate compliance to the GDPR, HIPAA, PCI DSS, and more.


Data classification

Enable content-aware protection by classifying files based on their business value and vulnerability level using automated and manual file tagging capabilities.


ROT analysis

Locate and delete data with little or no value to your business, such as old and stale files, duplicate copies, orphaned files, non-business files, and more.


Permissions analyzer

Examine file security permissions to identify those with permission hygiene issues and files with excessive access rights.


Disk space analysis

Gain in-depth, drive-based insights by analyzing employees' storage patterns and consumption rates. Trigger instant alerts when free space falls to critical levels.


Cloud app discovery

Track cloud application usage rates and record upload and download requests made across SharePoint, Exchange, OneDrive, Dropbox, Box, and other web services.


Explore DataSecurity Plus

Check out this datasheet to get a quick glimpse
of everything our unified data visibility and
security platform has to offer.

Pricing Details

  • File Server Auditing

    Starts at

    $ 745 /yr 2 Windows file servers $ 595 /yr1 CIFS server

    List of features included.

    • Audit all file accesses and modifications.
    • Monitor file integrity.
    • Detect and combat ransomware attacks.
    • Track file permission changes.
    Learn more
  • File Analysis

    Starts at

    $ 95 /yr

    List of features included.

    • Locate and manage ROT data.
    • Analyze disk usage patterns.
    • Examine file security permissions.
    • Identify files with permission hygiene issues.
    Learn more
  • Data Risk Assessment

    Starts at

    $ 395 /yr

    List of features included.

    • Discover sensitive personal data (PII, ePHI, PCI).
    • Catalog and classify high-risk content.
    • Enforce content-aware protection.
    • Comply with data security mandates of the GDPR, HIPAA, PCI DSS, and more.
    Learn more
  • Data Leak Prevention

    Starts at

    $ 345 /yr

    List of features included.

    • Prevent data leakage via USBs, email, cloud apps, and more.
    • Disable file copy actions across endpoints.
    • Audit and control the use of USBs.
    • Enforce application control.
    Learn more
Thank you

Your pricing quote will be sent to the registered email address.

Get a pricing quote

customized to your needs.

  • *
  • *
  • Select country
  • *
    Please select at least one Solutions
    Please select at least one Solutions
    Windows File Servers
    NAS devices
    Supported NAS devices: NetApp
    TB in Data size
    TB in Data size
  • By clicking 'Get quote', you agree to processing of personal data according to the Privacy Policy.

Resources you might be interested in 


Use our detailed guide to develop an effective data loss prevention strategy.



How to protect your organization from ransomware.


Best practices

10 best practices to prevent insider threats.



Data discovery: Your first step to GDPR compliance.


Get DataSecurity Plus easily
installed, configured and running within minutes.

Request Demo


Schedule a demo

  • *
  • By clicking 'Submit' you agree to processing of personal data according to the Privacy Policy.

Thank you for your interest in DataSecurity Plus!

Our team will be in touch with you shortly.

Email Download Link