Content Sentry
for OpenText Content Server
Detecting strange and unusual activity in Content Server is one of the biggest concerns for Administrators and Content Owners. With the Edward Snowden case in the forefront of anomalous activity stories, Admins must take every precaution to make sure that valuable company secrets are kept secure and away from competitors and those looking to profit from the distribution of valuable information.
And with new laws such as European Union General Data Protection Regulation (GDPR), valuable information now includes private personal information such as social security numbers, employee personal data and other private personal data.
Use Cases
- Monitor Content Server for anomalous activity
- Identify and secure sensitive content in libraries
- Prevent data breaches to avoid negative impact on the corporate brand and lawsuits
- Ensure your customer’s data is securely being handled inside your organization
- Bulk scan content prior to migrating to Content Server or OpenText Cloud
- Perform ad-hoc scans to detect sensitive content during E-Discovery or Audit
Key Benefits
- Real-time user activity monitoring e.g. login activity, file downloads, DLP violations
- Anomaly detection e.g. excessive downloads, after-hour activity, unauthorized access to sensitive content
- Detect sensitive content in Libraries
- Configure thresholds and policies
- Analyzes activities of privileged users such as user add, user delete, security settings, password policies and more
- Machine learning for content detection and analysis - machine learning enables identification of patterns beyond complexity that humans can assume
- Data driven - machine learning models are created by data and not by intuition
- Accuracy - machine learning can control rates of false positives and false negatives
- Variety of remediation actions to govern content
- Flexible content scanning options – On Demand, Scheduled, Real-Time
- Use of threshold settings to minimize false positives
- Instant, advanced remediation e.g. encrypt file, log, reduce permissions
- Out-Of-The-Box DLP controls and policies that can detect potential violations of PHI, PII, PCI, GLBA, or other regulations – No DLP Consulting Services required
- Control uploads of files based on file types for compliance reasons
- On-premises, Online and Hybrid implementations
Component | Requirement |
---|---|
Browsers |
|
Servers |
|
Databases |
|
Request a Free Trial |
Detecting strange and unusual activity in Content Server is one of the biggest concerns for Administrators and Content Owners. With the Edward Snowden case in the forefront of anomalous activity stories, Admins must take every precaution to make sure that valuable company secrets are kept secure and away from competitors and those looking to profit from the distribution of valuable information. And with new laws such as European Union General Data Protection Regulation (GDPR), valuable information now includes private personal information such as social security numbers, employee personal data and other private personal data.
|