DeviceLock Overview : DeviceLock Content Security Server
  
DeviceLock Content Security Server
DeviceLock Content Security Server is an optional component of DeviceLock DLP. It includes Search Server which provides full-text searching of logged data stored on DeviceLock Enterprise Server, and Discovery Server used to discover certain types of content existing on the computers and storage devices connected to the local network. The search capabilities of Search Server make it easier and more efficient to manage the increasing amount of data in DeviceLock Enterprise Server databases.
Discovery Server, in its turn, is part of DeviceLock Discovery product, which can be used separately from-, or as a part of DeviceLock DLP. Discovery Server is described in the DeviceLock Discovery User Manual (see also DeviceLock Discovery Overview).
DeviceLock Content Security Server includes the following features:
Full-text search capability support. Through the use of Search Server, DeviceLock Content Security Server allows you to instantly search for relevant text data based on various search criteria.
Ability to automate search operations. DeviceLock Content Security Server can run searches by schedule, with search results being automatically sent via e-mail.
Flexible configuration options. There is support for many different configuration options, enabling you to optimize the performance of DeviceLock Content Security Server for your unique installation.
You can use full-text searches to find data that you cannot find by filtering data in the log viewers. The full-text search functionality is especially useful in situations when you need to search for shadow copies of documents based on their contents.
You can operate DeviceLock Content Security Server by using the DeviceLock Management Console.
Use Case - Preventing leaks of confidential information
Security specialists who are tasked with keeping sensitive information confidential can regularly use Search Server to easily find, retrieve and analyze all shadow copies of files containing specific business-critical data, for example, customers or price lists. The log records associated with found shadow copies will help to determine when and by whom confidential information was copied. With this information, security specialists can take immediate steps to avoid possible information disclosure and distribution outside the company.