Data Discovery

Data Discovery

Why It's Important

Data breaches are the largest source of identity theft and the cost of reacting to a breach is far more expensive than preventing one. Because today's organizations rely so heavily on collecting, storing and analyzing data, it is critical to protect this data just like any other valuable business asset.

How We Can Help

The first step in protecting data is to understand what data needs safeguarding by discovering where sensitive data resides within your organization and protecting it from malicious activity. CompliancePoint’s Data Discovery service allows you to search everywhere and find anything!

The comprehensive Data Discovery process identifies where specific sensitive data resides within your organization as well as within any mobile and remote devices used by company employees. CompliancePoint delivers detailed reporting on the specific location and number occurrences where data was found.

The types of sensitive data that the Data Discovery Service identifies include:

  • Personally identifiable information (PII) such as social security numbers
  • Payment card information (PCI)
  • Protected health information (PHI)
  • Intellectual Property & Custom Data

The Data Discovery Service scans all data within the organization including the following:

  • All Files, Archives and Images

    Search unstructured data in any file type or image, stored locally or remotely on File Servers, SANs, NAS devices, and desktops running Windows, Mac, and Linux. In addition, Mobile devices such as iPhones, iPads, Android phones and tablets can also be scanned for sensitive data.

  • E-Mail and System Areas

    Search message content and attachments in Outlook, Thunderbird, Lotus Notes, Apple Mail and others. Search Browsers, Previous Versions (Shadow Volumes), and system configuration areas.

  • Enterprise Apps, Network, and Cloud

    Search Databases, Exchange, Office365, Web Servers, SharePoint, Dropbox, Skydrive, Amazon Cloud Drive, and more.

Our Areas of Expertise

Our assessors and consultants are experts in the focus areas as they pertain to information security and protecting data assets.

Learn More >>

Webinar: Color Theory as a New Approach to Data Security
Receive Updates, Alerts & Holiday Reminders