While it is important to protect files against
rogue employees and outside attacks, it is equally as important to
provide an audit trail of who accessed what information. While basic
audits are mandated by most regulatory agencies, tiCrypt
goes beyond this minimum requirement and offers detailed, secure audits combined with forensic tools to analyze the logs.
Using secure hashing (SHA-256), log entries are
chained much like Bitcoin transactions. Because the hash values are known, the system ensures
that the history cannot be changed or forged by admins or hackers.
Should anybody change the log entries, the hash of the modified
block will have a discrepancy, making the change detectable upon
running a log audit.