1. Introduction 2. Standard Windows tooling 3. Largescale software packages 4. Focused commercial tooling 5. Freeware 6. Conclusion 7. Approach with Perdemia's Permission Analyzer 2. Standard Windows tooling 1. Introduction It is common knowledge that most cases of data theft occur within the organization. No hacks from the outside, but people within the organization who (accidentally) unfairly have access to sensitive data. Apart from the financial damage, damage to reputation, this leads in many cases to legal violations, loss of
Articles about Permission Analyzer have been published in several magazines and online news sites, see the article from Mark Gibbs on NetworkWorld, this news item on Processor.com, this great article about the application features, or the Editor’s review on DownloadsCenter saying Permission Analyzer will surprise you with its power and capabilities! Feel free to use the following press release in your magazine or news feed: Filter and Analyze NTFS Permissions with Permission Analyzer 2.0 Perdemia has released Permission Analyzer 2.0,
Permission Analyzer 2.0 has been released and we are very much interested in your feedback. Feel free to add comments about the usability, features, findings or any interesting results you have achieved using the application.