TechDogs-"Thales Launches File Activity Monitoring (FAM) To Strengthen Real-Time Visibility And Control Over Unstructured Data"

IT Security

Thales Launches File Activity Monitoring (FAM) To Strengthen Real-Time Visibility And Control Over Unstructured Data

Business Wire
Overall Rating
  • New capability gives instant visibility to detect misuse, enforce compliance, and strengthen data protection across on-premises, hybrid, and multicloud environments.
  • Continuous data discovery, classification, and monitoring forms the foundation of effective Data Security Posture Management, while simplifying compliance and flagging unauthorized activities that lead to data exposure.  
  • FAM’s built-in GenAI tools and centralized management streamlines audit reporting, accelerates threat response, reduces operational complexity across enterprise data lifecycle.

MEUDON, France--(BUSINESS WIRE)--Thales today announced the launch of Thales File Activity Monitoring, a powerful new capability within the Thales CipherTrust Data Security Platform that enhances enterprise visibility and control over unstructured data, enabling organizations to monitor file activity in real time, detect misuse, and ensure regulatory compliance across their entire data estate. As the only integrated platform provider that secures structured and unstructured data, Thales provides comprehensive monitoring and auditability for data types that were previously difficult to track.

In today’s evolving threat landscape, organizations must gain tighter control over unauthorized access and misuse of unstructured data, which according to IDC represents 90% of all worldwide data. File Activity Monitoring enables security teams to analyze and monitor the activity of unstructured data, including unexpected copying, downloading, and sharing of files such as emails, chat logs, media files, and application logs that can contain sensitive data. Real-time alerts, analytics, and encryption tracking further accelerate threat insights and protect sensitive data across the enterprise. This reduces exposure risks, supports compliance with standards like GDPR, HIPAA, and PCI DSS, and strengthens organizations’ overall data security posture.

“Thales’ innovative approach to File Activity Monitoring tackles key challenges like blind spots in hybrid environments, offering real-time visibility and smart anomaly detection — a potential game-changer for teams overwhelmed by false positives. By striking the right balance of depth and simplicity, FAM shows promise in helping us strengthen the SOC without added complexity. With tighter SIEM integration, it can sharpen response and let teams focus on what matters most. We’re excited to see how FAM evolves and enhances our data security,” Leila KUNTAR, Principal Information Security Engineer, Amadeus, said.

“As unstructured data grows rapidly across distributed environments, organizations need more integrated ways to track and safeguard their most sensitive information,” Todd Moore, Vice President of Data Security Products at Thales, said. “With File Activity Monitoring, Thales reinforces its leadership in enterprise data security by delivering real-time insight, intelligent automation, and unified visibility through a single, powerful platform.”

Thales has been a leader in digital security for decades in structured database activity. Building on this extensive expertise, customers can expect the same world-class experience that they’ve had with Thales, now extended to encompass unstructured data protection.

File Activity Monitoring strengthens DSPM by enabling security teams to:

  • Discover, classify, observe, and control sensitive data across on-premises, hybrid, and multicloud environments
  • Pinpoint where sensitive data resides, who has access, and whether it's properly secured, in real time, allowing detection of suspicious behavior including unauthorized copying, downloading, or sharing
  • Transform static classification into dynamic risk intelligence through behavioral context
  • Apply strong encryption and other remediation techniques, including reconstruction of incidents quickly with audit logs in the event of a breach or policy violation and enabling strong encryption, to protect compromised or at-risk data

Built-in GenAI tools simplify audits, boost response, and cut complexity

To further simplify compliance and security operations, File Activity Monitoring includes a Generative AI-powered Data Security Assistant. This integrated chatbot helps teams query audit data, generate custom reports, and streamline compliance workflows, reducing the burden on IT and security professionals and making it easier to meet regulatory obligations.

“As technology evolves rapidly, our controls must be flexible enough to keep pace without adding complexity,” Moore said. “Automation and intelligence help overwhelmed security teams scale operations and focus on what matters most. With tools like our chatbot, they can ask natural language questions and get instant, actionable answers, accelerating response times and improving operational efficiency.”

About Thales

Thales (Euronext Paris: HO) is a global leader in advanced technologies for the Defence, Aerospace, and Cyber & Digital sectors. Its portfolio of innovative products and services addresses several major challenges: sovereignty, security, sustainability and inclusion.

The Group invests more than €4 billion per year in Research & Development in key areas, particularly for critical environments, such as Artificial Intelligence, cybersecurity, quantum and cloud technologies.

Thales has more than 83,000 employees in 68 countries. In 2024, the Group generated sales of €20.6 billion.

PLEASE VISIT

Thales Group

Cloud Protection & Licensing Solutions | Thales Group

Cybersecurity Solutions | Thales Group


Contacts

Thales, Media Relations
Security & Cybersecurity
Marion Bonnet
+33 (0)6 60 38 48 92
marion.bonnet@thalesgroup.com

Frequently Asked Questions

What is File Activity Monitoring?

File Activity Monitoring is a feature within the Thales CipherTrust Data Security Platform that enhances enterprise visibility and control over unstructured data, enabling organizations to monitor file activity in real-time, detect misuse, and ensure regulatory compliance.

Why is File Activity Monitoring important?

It helps organizations gain tighter control over unauthorized access and misuse of unstructured data, which represents a significant portion of all worldwide data, reducing exposure risks and strengthening overall data security posture.

How does GenAI help with File Activity Monitoring?

Built-in GenAI tools simplify audits, boost response times, and reduce complexity by enabling teams to query audit data, generate custom reports, and streamline compliance workflows using natural language questions.

First published on Wed, Jun 11, 2025

Liked what you read? That’s only the tip of the tech iceberg!

Explore our vast collection of tech articles including introductory guides, product reviews, trends and more, stay up to date with the latest news, relish thought-provoking interviews and the hottest AI blogs, and tickle your funny bone with hilarious tech memes!

Plus, get access to branded insights from industry-leading global brands through informative white papers, engaging case studies, in-depth reports, enlightening videos and exciting events and webinars.

Dive into TechDogs' treasure trove today and Know Your World of technology like never before!

Disclaimer - Reference to any specific product, software or entity does not constitute an endorsement or recommendation by TechDogs nor should any data or content published be relied upon. The views expressed by TechDogs' members and guests are their own and their appearance on our site does not imply an endorsement of them or any entity they represent. Views and opinions expressed by TechDogs' Authors are those of the Authors and do not necessarily reflect the view of TechDogs or any of its officials. While we aim to provide valuable and helpful information, some content on TechDogs' site may not have been thoroughly reviewed for every detail or aspect. We encourage users to verify any information independently where necessary.

Join The Discussion

Join Our Newsletter

Get weekly news, engaging articles, and career tips-all free!

By subscribing to our newsletter, you're cool with our terms and conditions and agree to our Privacy Policy.

  • Dark
  • Light