Maintain Regulatory Compliance
This level of transparency not only helps maintain compliance with internal security policies but also supports regulatory standards such as CCPA, GDPR, HIPAA, and ISO. Administrators can use these analytics to ensure that sensitive data is handled according to compliance rules and organizational protocols, with automatic logging of access events and file-sharing actions.
The real-time nature of Locktera’s engagement analytics also plays a crucial role in security by enabling the early detection of suspicious activity or potential security risks. Whether it’s abnormal user behavior, unauthorized access attempts, or unusually frequent downloads, the platform alerts administrators, giving them the opportunity to take immediate action to mitigate risks.
Engagement Insights
In addition to security, these engagement insights also help enhance productivity and collaboration by showing which documents are most frequently accessed or used by teams. This information helps businesses optimize document sharing practices, identify bottlenecks, and improve workflows based on actual usage patterns.
With Locktera’s detailed analytics, you always maintain full control over your documents, ensuring that your organization stays secure, compliant, and operationally efficient.
Seamless Integration with SIEM Tools for Enhanced Security Monitoring
Locktera seamlessly integrates its detailed analytics data with leading SIEM tools such as Splunk, Microsoft Sentinel, and other security monitoring platforms, providing a centralized view of all document-related activities. By exporting real-time audit logs and user engagement data, Locktera ensures that your security team can monitor, analyze, and respond to potential threats or anomalies across your document management ecosystem. This integration allows for automated incident detection, correlation with other security events, and compliance reporting, helping organizations maintain robust security postures and meet regulatory requirements while reducing the risk of data breaches or unauthorized access.
Locktera Reports
All Reports have functions to search, sort, filter and export. This functionality allows users to easily find specific data, apply filters to refine results, and export the information for further analysis or reporting purposes, enhancing the overall user experience and data management efficiency.
Report Name | Report Objective |
---|---|
Engagement Reports | |
Content Files Accessed Per Month - Graph | Presents a graphical representation of content file activity, displaying the count of files accessed each month, files shared and not accessed per month. This visual overview helps analyze trends in file engagement and sharing patterns over time, providing insights into document usage and identifying areas where engagement may be lacking. |
Content Files Accessed Most - Table | Provides a list of the top 5 most accessed content files within a specified time frame. This helps identify the most engaged documents, offering insights into user interest and content performance over the designated period. |
Content Access Summary - Table | This summary report provides an overview of data file access activity, including the number of authorized viewers, user engagement (such as views, opens, and downloads), and the timeline of access events. It also offers filtering within a designated time frame, allowing for a focused assessment of document security, usage, and compliance with access controls during specific periods. |
Content Access Detail - Table | This report provides comprehensive documentation of every content file access, detailing each viewer's interactions, including first and last access timestamps, duration of access, and number of downloads. The report also includes filtering and analysis by specific content files, enabling a thorough review of user engagement and ensuring compliance with security protocols for all shared documents. |
Container Status - Graph | The report analyzes and visualizes the distribution of containers across different statuses (active, blocked, expired, locked) within a specific time frame. It aims to provide insights into the status trends and help monitor container management or system performance. |
Container Interaction - Graph | The report analyzes and presents data on container interactions during a designated period. It focuses on three key metrics: the number of containers secured, the number accessed, and the number of containers downloaded. This helps in understanding usage patterns, user engagement, and the level of activity related to containers over the specified timeframe. |
Container Status - Table | The report provides a detailed overview of each container's status and associated data. It includes information on the container's structure, the date it was secured, the number of authorized viewers, the number of content files, the number of container downloads, and containers with references. This analysis helps in understanding the security, distribution, and usage patterns of containers, offering insights into their accessibility, viewer engagement, and how often they are referenced or downloaded. |
Access Denied - Table | The report provides detailed information about instances where access to containers was denied. It includes data such as the viewer's identity, IP address, location (city, state, country), timestamp of the denial, and the reason for the denial. This helps to identify potential security issues, track unauthorized access attempts, and analyze patterns of access denial to improve container management and security protocols. |
Share Not Accessed - Graph | The report visually compares the number of containers that have not been accessed with the total number of containers secured. This graph helps in identifying the proportion of containers that remain unviewed after being secured, offering insights into engagement levels, content effectiveness, and potential barriers to access. It is useful for assessing the overall performance of content distribution efforts and guiding decisions to improve user interaction and engagement with secured containers. |
Shared Not Accessed - Table | The report lists containers that have been shared but not accessed, providing data such as the container name, content file, status, and the date the container was secured. The report can be filtered by time and is useful for identifying unengaged recipients. It helps in taking action to renew interest, such as resending the containers for follow-up, improving engagement strategies, and ensuring that important content is being accessed by its intended audience. |
Viewer Information - Table | The report provides a detailed record of each viewer who accessed containers, capturing their identity, IP address, location (city, state, country), and timestamps for both their first and last access to the platform. This helps track viewer activity, monitor usage patterns, and ensure security by identifying repeated access and potential unusual behavior over time. |
Viewer Content Files Opened - Graph | The report visually represents the top 10 viewers who accessed the highest number of content files. This graph highlights user engagement and activity levels by identifying the viewers who interacted with the most content. It provides insights into user behavior, helps assess the level of interest or involvement with the content, and can inform decisions related to content distribution, user management, or targeted follow-up actions. |
Viewer Duration Viewing Files - Graph | The report visually presents the top 10 viewers who spent the most time viewing content files. By highlighting the viewers with the longest viewing durations, the graph provides insights into user engagement, helping to identify individuals who may have shown greater interest or conducted more in-depth reviews of the content. This information can be useful for understanding content consumption patterns, assessing viewer focus, and making decisions about content strategy or user follow-ups. |
Viewer Downloads - Graph | The report visually presents the top 5 viewers who downloaded the most files. This graph highlights the users most actively downloading content, providing insights into engagement levels and potential interest in the material. It helps track file distribution, monitor user activity, and can inform decisions related to security, content access, or user behavior analysis. |
Viewer Files Not Opened - Graph | The report visually presents the top 10 viewers who did not open the content files that were shared with them. This graph helps identify users who received content but did not engage with it, providing insights into potential issues such as lack of interest, technical difficulties, or disengagement. It can be used to improve follow-up strategies, assess the effectiveness of content distribution, and ensure important files are being accessed by intended recipients. |
Viewer Audit - Table | The report tracks and documents each instance when a viewer accessed a content file, providing key metrics such as the content file name, date secured, percentage of the file completed, number of pages viewed, duration of access, location (city, state, country), and timestamps for start and end times. The data can be filtered by user, offering a detailed view of all files accessed by a single viewer over a designated period of time. This report is useful for monitoring user activity, analyzing engagement patterns, and documenting compliance with regulatory or internal policies. |
Content File Audit - Table | The report provides comprehensive details of each viewer's interaction with a designated content file. It collects detailed data including the viewer's name, email, pages accessed, duration on each page, location (city, state, country), and timestamps for the start and end of their access. The report allows for filtering by content file, providing insights into all viewers that engaged with a specific data file. This helps to monitor user behavior, analyze content engagement, and identify trends or patterns in content access. This report is helpful in documenting all data file access for compliance purposes. |
Containers Blocked - Table | The report tracks and documents the details of containers that were blocked and subsequently unblocked. It collects information such as the container name, current status, date sent, recipients, action taken (blocked or unblocked), the reason for the action, and the date of the action. This report helps monitor the lifecycle of containers, provides insights into why and when containers were restricted or restored, and ensures proper management and accountability in container handling processes. It can also assist in auditing and compliance efforts. |
Containers Deleted - Table | The report documents all instances where secured containers have been deleted from a user's library. It gathers data such as the user's email, user name, container name, timestamp of deletion, location (city, state, country), and IP address. This report is useful for tracking container management, identifying when and where containers are removed, and ensuring compliance with data retention policies. It helps maintain oversight of user actions and enhances security by monitoring container deletions. |
Containers Downloaded - Table | The report tracks and documents all secured containers that have been downloaded to a local device. It collects data such as the user’s email, user name, container name, timestamp of the download, location (city, state, country), and IP address. This report helps monitor container distribution, identify where and when containers are being downloaded, and ensure security by tracking the movement of secured containers across devices. It can also be useful for auditing, compliance, and security purposes. |
Compliance Reports | |
User Change Log - Table | The report documents and tracks all changes made to user provisioning, including the addition of new users and updates to existing user information, such as names, phone numbers, and roles. It also captures the credentials of the person responsible for making these changes. This report provides a detailed audit trail of user management activities, ensuring accountability, transparency, and security in the process of assigning or modifying user access and roles. It is useful for compliance, security monitoring, and administrative oversight. |
User Access Log - Table | The report documents each instance when a user accesses and exits the platform. This report tracks user logins, providing a record of platform access events. It helps monitor user activity, ensure security, and analyze usage patterns for compliance, auditing, or performance evaluation purposes. |
Address Book Change Log - Table | The report documents and tracks all changes made to the address book, including the addition of new users and updates to user information such as names, emails, and phone numbers. It also captures the credentials of the person responsible for making these changes. This report provides a detailed audit trail of modifications to the address book, ensuring accountability and security in the management of contact information. It is useful for compliance, monitoring, and maintaining the integrity of user data. |
Usage Report - Table | The report documents and analyzes platform usage across the organization. This report tracks various metrics related to user activity, interactions, and system engagement, providing insights into how frequently and effectively the platform is being utilized by the organization. It helps assess overall usage trends, identify active or inactive users, monitor system performance, and support decision-making regarding resource allocation, and platform optimization. |
Container Access Permission Change Log - Table | The report documents and tracks all changes made to access permissions for flexible containers. This includes detailing any modifications to the access rules, as well as the credentials of the person making these changes. The report provides an audit trail for security and compliance purposes, ensuring transparency and accountability in the management of container access. It helps monitor permission adjustments to maintain control over sensitive content and ensure authorized access. |
Dashboard Reports | |
Read Notifications | The report documents the read notifications sent to users when their shared content files are viewed. The report includes details such as the timestamp of when the content was accessed, the viewer's identity, the content file name, and a link to the container's analytics. This report provides users with real-time feedback on who is engaging with their content, enabling them to track viewership, assess the effectiveness of content sharing, and review detailed analytics for further insights into user interactions. |
Viewers Locked Out | The report documents instances where viewers have been locked out of a shared container after exceeding the allowed number of password attempts. The report includes details such as the timestamp of the lockout, the viewer's identity, the content file name, and a link to unlock the container so the viewer can attempt to access the content with the correct password. This report helps monitor security measures, provides a way to manage access issues, and ensures that locked-out viewers can be given another opportunity to access the content securely. |
Shared Not Accessed | The report lists containers that have been shared but not accessed by the recipients. It includes details such as the timestamp when the container was shared, the viewer's identity, the content file name, and a link to the container's analytics. This report helps users track which containers have not been engaged with, enabling follow-up actions to encourage content access, improve engagement strategies, and ensure important files are being viewed. |