For instance, a compliance officer can learn how much data is potentially on hold across all enterprise systems or what potential policy violations are occurring. Navigational tools allow you to drill down to explore different areas of policy application.
![controlpoint security manager driver controlpoint security manager driver](https://infohub.delltechnologies.com/static/media/1686825f-0701-4a3b-b7cb-c384585166ed.png)
![controlpoint security manager driver controlpoint security manager driver](https://www.driversdownloader.com/images/dell/laptop-latitude-z600-overhead-relativesized-500.jpg)
Review and approve policy application and execution.
![controlpoint security manager driver controlpoint security manager driver](https://data2.manualslib.com/product_thumbs/1/4/366/36523_a03_product.png)
Maintain audit trails of policy selection criteria and execution.Generate reports on items marked for deletion.A range of tools and reports support a policy-driven and compliant clean-up process, enabling you to: This file analysis allows you to understand the breakdown of data types and categories across the enterprise or specific repositories. Three-dimensional spectrographs display how clusters change over a period of time, and provide insight about the evolution of your enterprise information to use in training policies or in applying defensible disposal management rules.ĬontrolPoint summary pages present the analysis of indexed data graphically with statistical summaries and data categorization.You can click on the graph to see the underlying documents within that zone. Two-dimensional cluster maps show heat zones of information grouped by concepts.Advanced, graphical visualization of information clusters based on meaning make it easy for executives to identify trends or popular concepts and themes.Role-based security allows you to delegate different tasks to reduce the likelihood of errors and bottlenecks, and can be used to control user access to repositories, policies, IDOL categories, and administrative tasks.ĬontrolPoint provides a range of file analysis capabilities, including: There is no need for source-specific policies, which become difficult to manage and unify across the enterprise, and no need for staff to learn multiple system tools and user interfaces. A dashboard-style display provides valuable business insight into the themes, locations, and value of your information.Īn advanced file analysis tool facilitating information governance for connected data sources, ControlPoint simplifies the definition and application of policy-regardless of data format or location. ControlPoint helps you to categorize and apply policy to content indexed by IDOL. ControlPoint uses the Intelligent Data Operating Layer (IDOL) Connector framework to identify, analyse and control diverse types of information stored in enterprise repositories and dark data. With Micro Focus Information Governance and file analysis solutions, you can connect and better manage the data in your systems to gain control over information assets across your enterprise.
![controlpoint security manager driver controlpoint security manager driver](https://assets.pelco.com/media/b74a924c-1841-470c-8037-9edc0a53bc32/ds-controlpoint-product-shot-480.png)
Identify, connect, and control data across your systems Time is wasted looking for a specific document that has not been managed appropriately-and you may not be fully aware of what other information you actually have. If your business is like most today, you store data in a number of systems and information repositories - an approach that has become the norm over the past two decades with rapid advancements in information technology.īut as data volumes continue to increase, you face significant business risks and loss of efficiency because you simply can't control all the information contained in siloed repositories.