August 25, 2015|
How to Get the Most out of the Vera Dashboard
This is the fifth installment in our How-To series: an ongoing set of posts full of tips and tricks for getting the most out of Vera. For the next few weeks, we’ll shift our focus to some of the great tools available to our awesome admins.
In our recent posts, we’ve described some simple techniques for improving the security and accessibility of your information with Vera, whether it’s watermarking, recalling email attachments, or tracking files everywhere you go.
Today, we’re switching our focus to the Vera Dashboard. The Dashboard gives our admins full visibility and control over their secure files, no matter where they’re stored, or how they’re shared.
When we designed the Dashboard, our goal was simple: give security teams fast access to information about adoption and engagement, data security, and system integrity. Let’s look at how you can use the Dashboard to measure each of those for your business:
First, we wanted to make it easy for our customers to measure adoption and engagement. We’ve surfaced this information in four key reports: Files Secured, Accessed, Requested, and Files by Domain. Clustered together, they give you a sense of how effective your deployment is, how engaged employees are, and how frequently secured information is accessed. My personal favorite is the Files Accessed by Domain report. At a glance, I can see if I have a healthy level of collaboration at my company, or if there are files shared with untrusted domains. Click into any of those bars, and you can see exactly who’s getting access to files.
Second, we built tools to help you detect which information might be at risk. It’s not uncommon for a company to produce thousands of new documents every day, many of which contain sensitive information. So, we developed a security health check for data in use. The chart below, a standard Vera report, shows the files with the most unauthorized access attempts. A quick scan of this report will let you find data that might be under attack.
Finally, we wanted to provide a monitor for system integrity. In Vera, no activity goes unmonitored and unlogged. And, when it’s notable, we publish these events to the top of the dashboard. You can see major changes to the system, from policy changes, to user role changes, to key configuration changes. It’s a great way to track the status of your deployment and potentially spot trouble before it happens.
Next time, we’ll talk through some tips for creating effective data classifications in Vera. Until then, what kind of reports and alerts would be useful to your business? Shoot me a note at email@example.com, and I’ll share the insights with our product team.