Risk Intelligence


Permissions Discovery

Help ensure that only authorized individuals can access sensitive data.

  • Inappropriate permission discovery
  • Support for multiple file types
  • Granular permission scans
  • Information on leaked or stolen data

Personally Identifiable Information and Protected Health Information Discovery

Safeguard sensitive personal data from attack.

  • Personally identifiable information discovery
  • Payment data discovery
  • Deep scans in hard-to-find persistent storage
  • Customizable scans
  • HIPAA compliant processes
  • Streamlined remediation

Risk Intelligence Reports

View reports on the potential financial impact of your at-risk data.

  • Credit card data discovery
  • Establishing a data breach risk baseline
  • Vulnerability trend report
  • Data breach risk trend report
  • Per-device breakdowns of insecure data
  • Custom report branding

 Vulnerability Scanning

Locate Security Holes in Your Systems.

  • Host-based scanning
  • Lightweight scans
  • Emerging threat discovery
  • Cross-device search
  • Unpatched software
  • E-mail
  • Mac and Windows operating systems vulnerabilities
  • Threats from VPN connections

Payment Data Discovery

Protect credit card data and help ensure PCI DSS compliance.

  • PCI DSS required scans
  • Multiple supported device types
  • Encryption for data-in-transit and data-at-rest
  • Extensive file types for multiple technologies
  • Cross-platform compatibility