Thales Trusted Cyber Technologies   Contact Us | Careers

Thales File Activity Monitoring (FAM) Now Available

Thales File Activity Monitoring (FAM) Now Available

July 1, 2025

Thales File Activity Monitoring, a newly launched solution within CipherTrust Data Security Platform, provides enhanced visibility and control over unstructured data. It enables organizations to monitor file activity in real time, detect misuse, and ensure regulatory compliance across their entire data estate. This offering enables Thales Trusted Cyber Technologies (TCT) to provide U.S. Federal agencies with comprehensive monitoring and auditability for data types that were previously difficult to track.

U.S. Federal agencies must gain tighter control over unauthorized access and misuse of unstructured data. File Activity Monitoring enables security teams to analyze and monitor the activity of unstructured data, including unexpected copying, downloading, and sharing of files such as emails, chat logs, media files, and application logs that can contain sensitive data. Real-time alerts, analytics, and encryption tracking further accelerate threat insights and protect sensitive data across the enterprise. This reduces exposure risks, supports compliance, and strengthens agencies’ overall data security posture.

File Activity Monitoring strengthens Data Security Posture Management by enabling security teams to:

  • Discover, classify, observe, and control sensitive data across on-premises, hybrid, and multicloud environments
  • Pinpoint where sensitive data resides, who has access, and whether it’s properly secured, in real time, allowing detection of suspicious behavior including unauthorized copying, downloading, or sharing
  • Transform static classification into dynamic risk intelligence through behavioral context
  • Apply strong encryption and other remediation techniques, including reconstruction of incidents quickly with audit logs in the event of a breach or policy violation and enabling strong encryption, to protect compromised or at-risk data

To further simplify compliance and security operations, File Activity Monitoring includes a Generative AI-powered Data Security Assistant. This integrated chatbot helps teams query audit data, generate custom reports, and streamline compliance workflows, reducing the burden on IT and security professionals and making it easier to meet regulatory obligations.

About Thales Trusted Cyber Technologies

Thales Trusted Cyber Technologies, a business area of Thales Defense & Security, Inc., is a trusted, U.S. provider of cybersecurity solutions dedicated to U.S. Government. We protect the government’s most vital data from the core to the cloud to the edge with a unified approach to data protection. Our solutions reduce the risks associated with the most critical attack vectors and address the government’s most stringent encryption, key management, and access control requirements.

For more information, visit www.thalestct.com