OpenText Content Sentry Webinar
syntergy
View Recording

Content Sentry

for OpenText Content Server

  • Overview
  • Specifications
  • Resources
  • Free Trial

Detecting strange and unusual activity in Content Server is one of the biggest concerns for Administrators and Content Owners. With the Edward Snowden case in the forefront of anomalous activity stories, Admins must take every precaution to make sure that valuable company secrets are kept secure and away from competitors and those looking to profit from the distribution of valuable information.

And with new laws such as European Union General Data Protection Regulation (GDPR), valuable information now includes private personal information such as social security numbers, employee personal data and other private personal data.

Use Cases

  • Monitor Content Server for anomalous activity
  • Identify and secure sensitive content in libraries
  • Prevent data breaches to avoid negative impact on the corporate brand and lawsuits
  • Ensure your customer’s data is securely being handled inside your organization
  • Bulk scan content prior to migrating to Content Server or OpenText Cloud
  • Perform ad-hoc scans to detect sensitive content during E-Discovery or Audit

Key Benefits

  • Real-time user activity monitoring e.g. login activity, file downloads, DLP violations
  • Anomaly detection e.g. excessive downloads, after-hour activity, unauthorized access to sensitive content
  • Detect sensitive content in Libraries
  • Configure thresholds and policies
  • Analyzes activities of privileged users such as user add, user delete, security settings, password policies and more
  • Machine learning for content detection and analysis - machine learning enables identification of patterns beyond complexity that humans can assume
  • Data driven - machine learning models are created by data and not by intuition
  • Accuracy - machine learning can control rates of false positives and false negatives
  • Variety of remediation actions to govern content
  • Flexible content scanning options – On Demand, Scheduled, Real-Time
  • Use of threshold settings to minimize false positives
  • Instant, advanced remediation e.g. encrypt file, log, reduce permissions
  • Out-Of-The-Box DLP controls and policies that can detect potential violations of PHI, PII, PCI, GLBA, or other regulations – No DLP Consulting Services required
  • Control uploads of files based on file types for compliance reasons
  • On-premises, Online and Hybrid implementations
Component Requirement
Browsers
  • All standard browsers
Servers
  • Content Server® 10.x, 16.x, 2X.x on UNIX® and Windows®
Databases
  • Oracle®
  • SQL*Server®
Resource Download
Content Sentry Overview View Video
Content Sentry - How To Monitor High Risk Users and Sensitive Content View Video
Syntergy Webinar: Your Content Server Data is at Risk View URL
It's 4:00AM and Someone Just Downloaded 50GB from your Content Server! View URL
The Best Tool for Managing Sensitive Content View URL

Request a Free Trial

First Name*
 
 
 
 
Last Name*
 
 
 
 
Title*
 
 
 
 
Company*
 
 
 
 
Email*
 
 
 
 
Phone Number*
 
 
 
 
Country*
 
 
 
 
Content Server Version*
 
 
 
 
 
 
 
 
 
 
 

Detecting strange and unusual activity in Content Server is one of the biggest concerns for Administrators and Content Owners. With the Edward Snowden case in the forefront of anomalous activity stories, Admins must take every precaution to make sure that valuable company secrets are kept secure and away from competitors and those looking to profit from the distribution of valuable information.

And with new laws such as European Union General Data Protection Regulation (GDPR), valuable information now includes private personal information such as social security numbers, employee personal data and other private personal data.

  • Implement a Data Loss Prevention (DLP) strategy for Content Server
  • Detect anomalous activity in Content Server
  • Automatically take action upon detection of suspicious activity
  • Enforce corporate compliance lifecycle on sensitive content residing in Content Server
  • Identify sensitive content prior to migrating your networked file shares to OpenText Content Server or OpenText Cloud
  • Know which libraries contain sensitive content
  • Implement a real-time content shield to instantaneously detect sensitive content when adding new content to Content Server
  • Automatically take action upon detection of sensitive information
  • Respond to audit requests quickly regarding who accessed your sensitive content during the last week or month
  • Safeguard Personal Identifiable Information (PII)
  • Safeguard Protected Health Information (PHI)
  • Safeguard Payment Card Industry (PCI) data
  • Be in compliance with the European Union General Data Protection Regulations (GDPR)