RSS
Логотип
Баннер в шапке 1
Баннер в шапке 2

SearchInform DataCenter

Product
The name of the base system (platform): Circuit of information security of SearchInform (KIB SearchInform)
Developers: SearchInform (SearchInform, New Search Technologies, NPT)
Last Release Date: January, 2013

SearchInform DataCenter – a product for management of all infrastructure of the Circuit of Information Security includes an opportunity to manage on a centralized basis bases of modules DeviceSniffer, MonitorSniffer and FileSniffer how management of indexes is organized. It allowed to increase performance of search and to simplify management of KIB even more. Besides, the possibility of automatic removal of archive databases according to the configured criteria is available that allows to automate completely creation and removal of data warehouses is absolutely transparent for the user and also more effectively to use available resources of disk storages. Among other improvements of summer of 2012 it is possible to note optimization of interaction of KIB with DNS servers that allowed to reduce noticeably a flow of DNS of requests and, respectively, to reduce load of servers.

Updating of the beginning of 2013

In the new version of SearchInform DataCenter – a product for management of search indexes, - the feature for blocking of settings of transactions over indexes is added by the created applications intercepting traffic. It allows to manage more flexibly indexes thanks to restriction of the "parent" DataCenter settings and installation of new settings for creation of indexes of the similar data intercepted by different components of "A circuit of information security of SearchInform". Now, for example, indexes of mail can be created on the intercepted data through SearchInform NetworkSniffer and SearchInform EndpointSniffer.

The new feature of differentiation of access rights for security service specialists became one of the most important updates of DataCenter, the module which is responsible for management of all components of "A circuit of information security". It allows the user to control information streams on a certain object separately from others. So one security officer, for example, can control finance division, another – advertizing, the third – both advertizing, and financial.