1. Permissions Discovery
Help ensure that only authorized individuals can access sensitive data.
• Inappropriate permission discovery
• Support for multiple file types
• Granular permission scans
• Information on leaked or stolen data
2. Personally Identifiable Information and Protected Health Information Discovery
Safeguard sensitive personal data from attack.
• Personally identifiable information discovery
• Payment data discovery
• Deep scans in hard-to-find persistent storage
• Customizable scans
3. Risk Intelligence Reports
View reports on the potential financial impact of your at-risk data.
• Credit card data discovery
• Establishing a data breach risk baseline
• Vulnerability trend report
• Data breach risk trend report
• Per-device breakdowns of insecure data
• Custom report branding
4. Vulnerability Scanning
Locate Security Holes in Your Systems.
• Host-based scanning
• Lightweight scans
• Emerging threat discovery
• Cross-device search
• Unpatched software
• Mac and Windows operating systems vulnerabilities
• Threats from VPN connections
5. Payment Data Discovery
Protect credit card data and help ensure PCI DSS compliance.
• PCI DSS required scans
• Multiple supported device types
• Encryption for data-in-transit and data-at-rest
• Extensive file types for multiple technologies
• Cross-platform compatibility