

Guardian Content Monitoring
Don’t leave internal cybersecurity to trust

Your critical content is probably walking out of the door, but you'll never know until it's too late...
- You worry about the business and financial impact of information being leaked
- You aren’t aware of the extent of the issue
- You don't know who the bad actor is until it’s too late
- You turn a blind eye and assume it’s not an issue that will affect you
- You are concerned about being sued by clients whose data has been leaked
Your internal cyber security shouldn’t rely on trust alone.
You’re not alone when it comes to internal cyber security. We understand the size and scale of the problem and have been working with OpenText customers to solve it for over a decade.
Predictive analytics and monitoring
Expanded control, alerts and visibility
Automatic violation remediation
Protect against insider threats in OpenText eDOCS & Content Server
Stay ahead of internal threats
Guardian brings continuous verification to your OpenText environment, with real-time monitoring with predictive thresholds
Guardian continuously tracks user actions — downloads, exports, check-outs, prints, and more.
It establishes baseline behavior, then compares live activity against those norms — detecting anomalies before they become leaks. Each rule can trigger alerts and even automatic account lockdowns based on severity
- no manual threshold setting — AI defines “normal” per user
- unlimited customizable rules with multi-level alerting or locking
- automatic notification via email/SMS and immediate account disablement
- works across OpenText eDOCS and Content Server environments
Granular protection and easy event monitoring
Guardian combines custom activity limits and automated responses, with simple event triage
Guardian’s admin interface allows you to set rules at library, group, or user level. Monitor dozens of activity types (e.g., download, email, export), and configure two-tier thresholds: one for alerting and one for disabling access.
It even resets counts over defined intervals, like daily or weekly.
- 80+ activity types tracked (check-out, email, print, export, etc.)
- set separate notify and block thresholds per user or group
- automatic user lockout until reviewed by security
- configurable reset schedules (daily, weekly, etc.)
Insider threats don’t wait — and neither should you
Book a demo
Try it yourself
Shut-down threats
Trusted by the world’s most security-conscious organizations


