We review vendors based on rigorous testing and research but also take into account your feedback and our affiliate commission with providers. Some providers are owned by our parent company.
Learn more
vpnMentor was established in 2014 to review VPN services and cover privacy-related stories. Today, our team of hundreds of cybersecurity researchers, writers, and editors continues to help readers fight for their online freedom in partnership with Kape Technologies PLC, which also owns the following products: ExpressVPN, CyberGhost, and Private Internet Access which may be ranked and reviewed on this website. The reviews published on vpnMentor are believed to be accurate as of the date of each article, and written according to our strict reviewing standards that prioritize professional and honest examination of the reviewer, taking into account the technical capabilities and qualities of the product together with its commercial value for users. The rankings and reviews we publish may also take into consideration the common ownership mentioned above, and affiliate commissions we earn for purchases through links on our website. We do not review all VPN providers and information is believed to be accurate as of the date of each article.
Advertising Disclosure

vpnMentor was established in 2014 to review VPN services and cover privacy-related stories. Today, our team of hundreds of cybersecurity researchers, writers, and editors continues to help readers fight for their online freedom in partnership with Kape Technologies PLC, which also owns the following products: ExpressVPN, CyberGhost, and Private Internet Access which may be ranked and reviewed on this website. The reviews published on vpnMentor are believed to be accurate as of the date of each article, and written according to our strict reviewing standards that prioritize professional and honest examination of the reviewer, taking into account the technical capabilities and qualities of the product together with its commercial value for users. The rankings and reviews we publish may also take into consideration the common ownership mentioned above, and affiliate commissions we earn for purchases through links on our website. We do not review all VPN providers and information is believed to be accurate as of the date of each article.

Actifile Data Centered Tracking Makes Outsourcing Safe

Ditsa Keren Technology Researcher

Actifile Data Security Suite is based on a cutting edge file-centric tracking, detection and prevention technology that helps organizations of all sizes to block insider threats, defend from cyber attacks and comply with regulations such as GDPR. We spoke to Co-founder and VP of Business development Guy Bavly to learn about the challenges that organizations are facing today when dealing with 3rd party data applications, and how Actifile helps to combat those challenges.

Actifile was founded 2 years ago, with the mission is to secure data usage for the enterprise workforce, for any application and every user, everywhere they work.

The main problem that our customers are facing today is that about 80% of the most sensitive or private files reside within applications like CRM, ERP, online services, corporate bank accounts, job recruitment services, warehouses, or any other data source being used by the organization, regardless of their location.

So with 80% of sensitive business data residing in those applications, users continue to be the weakest link, not because they are malicious, but because they are negligent. They overpass the rules without giving it a second thought. Once they extract the data, either by downloading files or copy-pasting them, Actifile SAAS smart agent solution will analyze and encrypt or redact it by default, without harming the continuity of the user's work.

What's unique about Actifile?

Actifile is a next-generation solution to data security that changes the paradigm in 3 levels:

Firstly, the shift from content classification to data source context: instead of classifying content, which is an error prone solution that generates too many false positives, we focus on the file source, so we can provide a more precise level of protection.

Second paradigm shift is from perimeter to everywhere. Usually what data security tools do is check the security perimeter and safeguard it. The problem is that not all data will go through the perimeter at all.

The adoption of cloud applications and external data sources is increasing by 20-30% each year. Furthermore, by 2020, it is expected that 43% of employees in the US market will be contingent, meaning part time employees working remotely or independent contractors that don't commit to the company as employees like it used to be. Those 2 trends make solutions like Actifile a crucial necessity for organizations that outsource their workforce.

When you're working from outside the organization, you are not protected by the security perimeter. Most data security tools are coming from the cloud, and if the employee is working remotely, data will move straight from the application to the external user, making perimeter security completely irrelevant.

At the device level, Actifile possesses the ability to secure data effectively. Our approach does not involve monitoring or surveilling employees, including their web browsing history or unrelated applications. Instead, we solely focus on tracking and monitoring pertinent information that is relevant to the employer.

We have seen use cases where companies are working with offshore employees, for obvious economic reasons, arousing difficult questions like whether or not they can actually employ people in certain countries where there are no data security regulations whatsoever. Data security compliance is difficult enough to enforce, let alone when your employees are on the other side of the globe.

And the third shift is from reactive to proactive mode, which is highly important when it comes to compliance. Actifile supports compliance with privacy regulations, dealing mainly with insider threats, so that eventually the organization will be able to safely employ people anywhere in the world, and that's a huge challenge which can be solved easily with Actifile.

What are the risks of using a data source like CRM, HR or BI  without Actifile?

The risk is that employees will extract sensitive information from applications, misuse it, misplace it or even steal it. It could be a contractor, a shipping officer or an HR administrator who will capture the customer or user data and exploit it for their own personal benefits.

Actifile draws a fine line between giving employees free access to the application, or blocking them completely, which will make them less productive in what they do.

If you choose not to authorize them, they will eventually find a way to get to the information in order to do their work, and you will have no control over how secure that process will be.

It's important to understand that although cloud applications are handling data security on their end, by classifying and redacting sensitive data, eventually there's a user at the endpoint, which cloud applications are blind to. Think about it as an applicative barrier or guardian.

Can Actifile be integrated with existing applications? What would be the benefit for service providers?

We currently have two roadmap directions and this is certainly one of them. We are versatile so we can work with any app, but we can make the impression deeper and more interesting using a Cloud Access Security Broker (CASB), which is a way to manage authorization and authentication to cloud applications. Organizations can then enable authorized and authenticated users to extract or download data, without being concerned about data leak.

Is Actifile enough for an organization to comply with GDPR?

Yes. More particularly, our built-in data protection analysis can help to comply with articles 32-34 and 35 of GDPR. The rest of the articles talk about how to protect the data, but if your content is encrypted, the technicalities become less critical, therefore we can eliminate the risk of non-compliance.

How do you expect GDPR to change the way modern business is done?

GDPR is already changing how people do business, first and foremost, at the awareness level. We can already see how organizations are starting to pay attention to how they handle private information and as a result, consumers are also more aware of their rights. This is where innovative software like ours can help, not only with compliance but also with creating trust between service providers and their customers.

We review vendors based on rigorous testing and research but also take into account your feedback and our affiliate commission with providers. Some providers are owned by our parent company.
Learn more
vpnMentor was established in 2014 to review VPN services and cover privacy-related stories. Today, our team of hundreds of cybersecurity researchers, writers, and editors continues to help readers fight for their online freedom in partnership with Kape Technologies PLC, which also owns the following products: ExpressVPN, CyberGhost, and Private Internet Access which may be ranked and reviewed on this website. The reviews published on vpnMentor are believed to be accurate as of the date of each article, and written according to our strict reviewing standards that prioritize professional and honest examination of the reviewer, taking into account the technical capabilities and qualities of the product together with its commercial value for users. The rankings and reviews we publish may also take into consideration the common ownership mentioned above, and affiliate commissions we earn for purchases through links on our website. We do not review all VPN providers and information is believed to be accurate as of the date of each article.

About the Author

Ditsa Keren is a cybersecurity expert with a keen interest in technology and digital privacy.

Did you like this article? Rate it!
I hated it! I don't really like it It was ok Pretty good! Loved it!
out of 10 - Voted by users
Thank you for your feedback

Please, comment on how to improve this article. Your feedback matters!

Leave a comment

Sorry, links are not allowed in this field!

Name should contain at least 3 letters

The field content should not exceed 80 letters

Sorry, links are not allowed in this field!

Please enter a valid email address

Thanks for submitting a comment, %%name%%!

We check all comments within 48 hours to ensure they're real and not offensive. Feel free to share this article in the meantime.