About us

Optrics is an authorized ManageEngine Partner with expertise in customized network solutions.

read more

Optrics Call Answer Guarantee
Toll Free: 1-877-386-3763
Direct: 1-780-430-6240

If you have any questions, call us during regular business hours, and you will always speak with a person.
Monday to Friday, 8am - 5pm MST

ManageEngine FileAnalysis Screenshot
ManageEngine
ManageEngine FileAnalysis

File Analysis Software

File Security and Storage Analysis Solution

  • Know when to free up space by monitoring storage space in every server and triggering low storage space alerts.
  • Sort enterprise files based on their types and categories to understand your file storage status.
  • View details on the size, location, owner, and other important attributes for every file in your storage environment.
  • Track the annual growth of file volume with information on the volume of junk files created each year.

File Analysis Tool Overview

Real Time File Server Auditing & Reporting Tool

Ensure data-driven decision making with FileAnalysis

Increase storage efficiency and reduce costs with the help of easy-to-comprehend graphs, charts, and reports.

ManageEngine FileAnalysis provides deep insights into enterprise file storage and security. It can:

  • List effective permissions to verify least privilege, and much more
  • Locate and delete duplicate files and optimize disk usage
  • Identify inessential data including stale, trivial, non-business, hidden, and orphaned files
  • Declutter primary storage with its junk file management capabilities
  • Detect overexposed files that have to be locked down by assessing permissions
  • Identify security vulnerabilities such as broken inheritances

But wait! There's a lot more than just file analysis software

File auditing

Audit, monitor, receive alerts on, and report on all file accesses and modifications made in your file server environment in real time.

Data risk assessment

Perform content inspection and contextual analysis to discover sensitive data in files, and classify it based on vulnerability.

Data leak prevention

Detect, disrupt, and respond to sensitive data leaks via USB devices, emails, printers, and more through real-time security monitoring.

Cloud protection (beta)

Track enterprise web traffic, analyze the use of shadow applications, and enforce policies to safeguard employees against inappropriate or malicious web content.

Get a Quote  or  Download Free Trial

Storage Insights

Here's how the file analysis tool works

Locate and manage ROT data to optimize file storage.

ROT data analysis

  • Reduce unnecessary storage expenses by managing redundant, obsolete, and trivial (ROT) files.
  • Locate unnecessary data like media files, orphaned files, empty folders, and more using FileAnalysis.
  • Get a consolidated view of all hidden files in Windows file servers, failover clusters, and workgroup servers.
  • Reclaim primary storage by locating and removing junk files from enterprise storage devices.

File Storeage Analysis

  • Know when to free up space by monitoring storage space in every server and triggering low storage space alerts.
  • Sort enterprise files based on their types and categories to understand your file storage status.
  • View details on the size, location, owner, and other important attributes for every file in your storage environment.
  • Track the annual growth of file volume with information on the volume of junk files created each year.

Duplicate File Management

  • Reduce storage redundancy, improve performance, and declutter disk space with the duplicate file finder.
  • Compare file names, sizes, and last modified times to precisely identify duplicated files.
  • List all copies of duplicated files along with information on their locations.
  • Select and remove multiple duplicates at once right from FileAnalysis' user interface.

Disk Usage Reporting

  • Easily locate old, stale, unmodified, hidden, and other nonessential files in enterprise storage.
  • Enable granular analysis with instant reports on all file shares, active sessions, open files, junction points, and more.
  • Monitor employees' storage patterns, and know who owns which files along with whose files take up what volume of organizational storage.
  • Spot storage policy violations such as employees storing large media files, stale files, or other trivial data with email notifications.

File Share Analysis

  • Locate every shared file and folder in your organization's file storage environment.
  • Analyze the size of your shares and the number of files and folders within the share.
  • Easily identify duplicates and other junk files within shared folders.
  • Better manage permissions by listing and reviewing the access rights associated with your file shares.
Get a Quote  or  Download Free Trial

Security Insights

Here's how the file analysis tool works

Locate permission vulnerabilities quickly to reduce the exposure of organizational files.

Security permission analysis

  • Ensure that organizational files are appropriately secured by periodically reviewing their NTFS and share permissions.
  • Identify and list all the privileged users who have access to critical files in your domain.
  • Track the owners of local and shared files in your enterprise storage environment.
  • Analyze file ownership statistics with reports on the number, volume, and location of files owned by each user.

Detection of overexposed files

  • Spot unsecured files that have to be locked down, such as the ones allowing unrestricted access to users.
  • Track the excessive or unwanted permissions assigned to a user based on your organization's internal security policy.
  • Detect open access files, i.e, files that can be accessed by everyone.
  • List the files that allow explicit full control access to a specific employee.

Effective permissions reporting

  • List effective permissions to know the cumulative permissions that a user or group has over a particular file.
  • Ensure that the principle of least privilege is maintained by verifying whether shares have the most restrictive permissions.
  • Achieve compliance with regulatory standards by affirming that only privileged users have access to business-critical files.
  • Reduce your security risks and attack surface by periodically checking effective permissions and making changes where required.

Permission hygiene assessment

  • Perform regular inspections of permissions associated with privileged users to ensure that they align with changing needs and job roles.
  • Locate active files owned by disabled or deleted users to reclaim them easily and ensure their availability to pertinent users.
  • Identify permission inconsistencies such as broken or improperly inherited permissions to enable quicker resolutions.
  • Spot orphaned files, and make quick business decisions on whether to reclaim or purge them.
Get a Quote  or  Download Free Trial

Pricing

FileAnalysis Professional Edition
Products
License Fee
AMS*
US$95
Included
US$145
Included
US$295
Included
US$495
Included
US$645
Included
US$745
Included
US$1,295
Included
US$1,495
Included
US$2,495
Included

* Annual Maintenance & Support Fee

  or  Download Free Trial
  Download Free Trial   Get A Quote   Contact Us