Spider scans your hard drive, web site, or other collection of files to identify confidential data such as social security, credit card, or bank account and routing numbers.
Use the information in the log file to protect confidential data by encrypting the files, moving the files to a secure server or offline storage, or other secure methods. Choosing the correct protection strategy is a combination of business needs, local policy and technology, user education, and other factors.