The success of a truly intelligent IT solution depends on how easy it is to use. Daily interaction with the solution should be intuitive and learning how to perform common tasks must be easy. Results need to be immediate and useful. The DriveLock Control Center (DCC) meets all of these requirements. It is the primary tool that IT administrators use to gain valuable insight into all aspects of endpoint protection and all user activities. You can use the DCC to create reports from client event data that was added by the DriveLock Enterprise Service to a central database and to investigate client activity using dynamic queries. The DCC makes it easy to monitor the use of removable media, devices, data transfers or application use throughout your network.
That's not all you can do with the DCC. You can use it to get a quick overview of the status of all DriveLock Agents in your network, including the status of Full Disk Encryption and licensing.
If you need to investigate specific events or data breaches, the DCC's advanced forensic analysis tools let you gain important insights. Detailed information about security events and sophisticated drill-down capabilities make it possible to investigate security incidents and the context in which they occurred. It only takes a few clicks to find the computer from which a suspicious file was copied to a flash drive, whether this file is identical to other files with different names and which additional files were copied at the same time. One more click and the DCC displays all other computers where the same flash drive was used. When you use the DCC, forensic analysis is easier than you ever imagined.
If legal or organizational requirements make it necessary to store event data so it can't be linked to specific users or computers, you can prevent such data from being stored, but you can still create useful reports that illustrate network-wide trends.