Discover and secure your customers’ personal information so it can't be stolen.

Data Recon is a sensitive data discovery tool that assists you in complying with global privacy laws and other compliance requirements by finding Personally Identifiable Information (PII) including Social Security Numbers (SSNs), Tax File Numbers (TFNs), passport numbers, national ID numbers, Medicare information, personal names, addresses and more.

Data Recon can be used to search for sensitive personal information on servers, workstations, and other supported storage devices to help you avoid becoming the next privacy data breach headline.

Data Recon
Pricing Overview
  • 1 year standard license (USD)
  • 1 target
    $179.00
    per target
  • 3 targets
    $119.00
    per target
  • 10 targets
    $109.00
    per target
  • 25 targets
    $99.00
    per target
  • 50 targets
    $89.00
    per target
  • 100 targets
    $79.00
    per target
Data Recon Features
Built for Sensitive Personal Data

Data Recon performs sensitive data discovery to help you comply with requirements for data privacy and data breach notification. By finding and securing sensitive data, including PII, you're ensuring the safety of your customers’ personal information and helping yourself avoid becoming the next headline about a data breach.

Built for Sensitive Personal Data
Many PII Data Types
Many PII Data Types

Data Recon knows how to find more than 80 types of Personally Identifiable Information used in more than 50 countries.

Examples include personal names and addresses, credit card data, passport numbers, national ID cards, and more.

Easy to Use

You don't need to be an IT security expert to use Data Recon.

With Data Recon’s intuitive user interface, you can begin a search for sensitive data out-of-the-box without any complex configuration or fine-tuning.

Data Recon Easy to Use
Search Almost Anything
Search all Storage

Data Recon searches for sensitive data within online and offline storage locations, such as file servers, desktops, NAS and SAN devices, Exchange, Gmail, Lotus Notes, Oracle, Amazon AWS Cloud and more.

Data Recon understands what's inside your files, including emails, databases, images, audio files, and documents, and even inspects unknown file types.

Detailed Reporting

Data Recon reports specify the file, document, email and/or database table where sensitive personal information was found, so you can address problem areas and secure them.

Reports can then be exported in PDF, CSV, XML and text.

Data Recon Detailed Reporting
Data Recon Remediate and Fix Problems
Remediate and Fix Problems

After Data Recon finds sensitive customer data, you can easily address findings by using the powerful remediation features to ensure that sensitive data is quarantined or permanently deleted.

Multiple Platforms

Data Recon can be run from anywhere, even a USB drive, without installation or third-party software. Data Recon supports Windows, Linux and EBCDIC mainframes, including multiple kernels and distributions.

8 Platforms with No Installation Required
Low CPU Usage
Low CPU

Data Recon uses only minimal memory and other CPU resources, so you can run it on your systems without noticeable impact on users or production applications.

Next up: PII Data Types
Credit and Debit Card Numbers

If your bank requires you to be PCI DSS compliant, Data Recon can help. Data Recon finds card numbers issued by ten major card brands, with additional support for test numbers, custom BIN ranges and Track1/2 magnetic stripe detection.

Data Recon includes all the PCI compliance capabilities we offer in our Card Recon data discovery tool.

Credit and Debit Card Numbers
National ID Cards
National ID Cards

Are you storing your customers’ national identity number? Data Recon can find more than 50 types of national IDs, including Social Security numbers (SSNs) and Tax File Numbers (TFNs) from most of Africa, Asia, Europe, Middle East, Oceania, North America and South America.

Patient Health Information (PHI)

Are you a healthcare provider complying with HIPAA and other medical industry compliance initiatives?

Data Recon finds many types of PHI, including Medicare, national insurance and national provider identifier data types from multiple regions.

Patient Health Information (PHI)
Financial Data
Financial Data

If your business handles personal banking information or business customer information, Data Recon can improve your data security compliance.

Data Recon offers the ability to identify stored bank account numbers, SWIFT Codes, IBANS, BSBs, GST and VAT information.

Personal Information

If your business stores customers’ personal information, Data Recon can improve your data privacy.

Data Recon can accurately detect your customers’ name, address, phone number, date of birth, and other elements which, when used together, could be used to commit identity theft.

Custom Data
> 160 PAN Formats
Custom Data

Does your business store sensitive IDs and reference numbers that are specific to your business?

Data Recon offers a unique feature enabling you to build custom definitions of sensitive data. You can also build definitions to find specific combinations of sensitive and personal data.

Next up: Accuracy

When you need to perform sensitive data discovery across millions of files and terabytes of data, accuracy is critical. Find out why Data Recon is unbeatable on any accuracy measurement.

Built-in Accuracy

Data Recon is preconfigured to accurately identify sensitive data using its purpose-built discovery algorithm. It has been designed to analyse each possible finding hundreds of times at lightning speed to save you time while identifying genuine security risks.

Built for Accuracy
Low False Positives
Minimal False Positives

If you've tried an alternative, open-source product, you already know that searches can yield a high number of false positives. Data Recon uses a built-in false positive elimination algorithm that scrutinises every finding and delivers a filtered set of results with minimal false positives.

Thorough Inspection

Data Recon attempts to inspect every object, regardless of the file name or type. To reduce false positives, many alternative solutions skip up to 80% of unrecognised files. In contrast, Data Recon ensures that each object is inspected for the possibility of stored sensitive data.

Inspects Everything
Hundreds of File Types
Support for Hundreds of File Types

How many file formats is your business storing? Data Recon identifies and reads the contents of hundreds of file formats, including MS Office documents, text files, compressed files, databases, emails, images and audio files. Furthermore, Data Recon is capable of inspecting all other files, including those that are not natively understood, to provide the most thorough scan available in the data discovery market.

Recognition of Test Data

Sensitive data can infiltrate every part of your network, including development and test environments. Data Recon lets you define the difference between test data and live data so that your team can focus on the real problems while ignoring non-sensitive internal test data sets.

10 Card Brands
Recognition of Test Data
Powerful Search Filters

Do you need to completely exclude certain locations or number ranges within your company? With Data Recon, you can enhance the accuracy of your search even further by applying filters to handle certain data locations differently. Features permit re-categorising numbers and including or excluding data by range, location, prefix and suffix. Data Recon also includes a post-processing LUA script feature for power users.

Next up: Platform Support
Windows

All Microsoft-supported versions of 32- and 64-bit Windows systems, including Windows 2000, Windows XP, XP Embedded, Windows Vista, Windows 7, Windows 8 and Windows Server 2000/2003/2008/2012 on Intel x86 CPU architectures.

Windows
Linux
Linux

All modern distributions of Linux supporting Kernel 2.4 and 2.6, including but not limited to Centos, Debian, Fedora, Redhat, Slackware, SUSE and Ubuntu on Intel x86 CPU architectures.

EBCDIC for Mainframes

Mid-range and mainframe systems, with full support for IBM's Extended Binary Coded Decimal Interchange Code (EBCDIC) to read files copied from mainframe systems such as AS/400, S/390 and iSeries and searched them in their native form without modification.

EBCDIC for Mainframes
Next up: File Formats

Data Recon supports hundreds of file formats to ensure maximum depth when searching for sensitive data.

Text Files

Any text and markup language formats, including TXT, RTF, HTML, XML, and many more

Text Files
Office Documents
Office Documents

Popular file types within Microsoft Office 95 / 97 / 2000 / XP / 2003 / 2007 / 2010 / 2013, Star Office, Open Office, Libre Office and Neo Office.

Compressed Files

All the major and minor compression types in use today, including 7zip, Bzip2, Gzip, LZMA, LZMA2, Ar, LZW (.Z), .EXE Self Extracting Executables, Microsoft Tape Backup Format, RAR, XZ, ZIP and all legacy codecs including implode, deflate, deflate64, bz2, lzma and ppmd.

Compressed Files
Live and Offline Databases
Live and Offline Databases

Search live and offline databases with Data Recon to discover where sensitive data is stored. Live search eliminates any downtime or impact on offline/detached databases and their backups. Reports display the table name and, where available, column name. Data Recon also detects data stored as binary large objects (BLOBS).

Supported databases for live search include DB2, MySQL, Microsoft SQL Server, Oracle, PostgreSQL, and SAP Sybase.

Supported databases for offline, file-based search include Microsoft Access, SQLite, DBase, Microsoft SQL Server (MDF and LDF), and Microsoft Tape Binary backup (BKF) of an MSSQL server.

Live and Offline Email

Data Recon can scan enterprise mail systems in live or offline mode. An email search includes attachments and produces detailed offline reports showing the sender, receiver and other important details to identify how sensitive customer information is being stored and transmitted.

Offline file support includes Microsoft Outlook PST, OST (2003 - 2010), Outlook Express, Lotus Notes NSF, Thunderbird, Eudora, Exim, Courier, Postfix, QMail, Maildir, Sendmail, DBX, MBox, and all standard MIME data formats.

Live mail scanning includes Microsoft Exchange, Gmail for Business, Lotus Notes and any email server supporting IMAP.

Live and Offline Email
Images and Forms
Images and Forms

Is your system storing scanned images or customer information?

Some software solutions are unable to identify these data security risks, but Data Recon has built-in image decoding and optical character recognition (OCR) capabilities to read the content of image files and discover typed and handwritten sensitive data with impressive accuracy.

Audio Files

Does your business operate a call centre IVR that uses call recording?

Data Recon understands common audio file formats and recognises sensitive data entered using a telephone keypad (DTMF tones) from pay-by-phone and IVR transactions that have been recorded inadvertently. Supported formats include WAV PCM 8/16bit mono/stereo.

Audio Files
Everything Else
Everything Else

The locations where sensitive customer data might be stored are unlimited. Data Recon offers multiple ways to help you identify almost every instance, so you receive a complete picture of every instance of personally identifiable information that may be stored in your system.

Next up: Target Types

To ensure the safety of your customers’ personal information, you must identify every possible location where might be stored. Data Recon offers multiple ways to identify every instance so you receive a complete picture of all sensitive data being stored.

Local Storage

Search all local storage on a desktop, laptop, workstation or server, including fixed drives, removable drives and any accessible location where data can be stored.

Local Storage
Deleted Files
Deleted Files

Do your employees discard sensitive data simply by deleting it? If so, you inadvertently may be storing sensitive data that can be recovered easily by commonly available tools. Data Recon solves this problem by searching all the free space on a local system for deleted files and identifying any remaining sensitive data.

Shadow Volumes

Windows automatically backs up file changes to a hidden area of your computer called a shadow volume. Most people aren't aware that large volumes of sensitive data may be hiding there.

Data Recon helps you address this potential security risk by searching all shadow volumes for sensitive data.

Shadow Volumes
Memory
Memory

Given the increasing use of memory scraping malware, your company needs the ability to audit the memory usage of applications for protection against data breaches. Data Recon simplifies this process by enabling auditing of memory for any sensitive data across any supported end-point.

Network Storage

Is your business storing data on centralised SAN or NAS devices?

With Data Recon, it isn’t a problem. Data Recon enables remote scanning of network drives with advanced controls to reduce network impact by limiting the speed of data transfer.

Network Storage
Database Servers
Database Servers

Are you running mission-critical enterprise databases?

Data Recon enables live searching of the most popular enterprise database servers, including Oracle, DB2, Microsoft SQL Server, SAP Sybase, MySQL and PostgreSQL.

Email Servers

Would you like to scan a live email server or a specific user mailbox?

Data Recon can scan most popular email services live via a standard IMAP connection. Native support is included for Microsoft Exchange, Lotus Notes and Gmail. When scanning a mailbox, Data Recon searches every email and any attachments, including multilayered compressed files.

Email Servers
The Cloud
The Cloud

The Cloud is everywhere. Does that mean your customers’ personal information is stored everywhere too?

Cloud data storage is proliferating, so it must be searched for sensitive data. Data Recon remotely searches popular Cloud platforms, including Amazon AWS and Google Apps (Calendar, Drive, Mail, and Tasks).

Next up: Reporting

Strong functionality is of little use without clear, readable results. Data Recon’s reporting choices provide maximum visibility of weaknesses in your data security.

Clear Summary

Immediately see your total risk position, including separate identification of sensitive data that is considered prohibited for storage.

Data Recon Summary Report
Data Recon Target Report
Breakdown by Target Location

Data Recon displays a complete breakdown by target type, showing you the highest-risk areas of all the searched targets, so you know precisely where each set of findings is located.

Breakdown by Sensitive Data Type

If Data Recon finds multiple types of sensitive data, the report will include a breakdown.

Data Recon Sinsitive Data Type Report
Data Recon File Format Report
File Format Breakdown

View a detailed breakdown of every finding on each end-point, including every file, database, and email containing sensitive data, along with a complete count of data types.

Email Breakdown

If Data Recon finds emails containing sensitive data; the report will identify which emails were detected including the sender, recipient(s), subject and timestamp. The report will also list attachments containing sensitive data, if applicable.

Data Recon Email Breakdown Report
Data Recon Database Breakdown Report
Database Breakdown

Data Recon details the contents of any recognised databases, displaying the table names and, when possible, the column names of locations where sensitive data was found.

Multiple Viewing Options

Data Recon displays reports on-screen, via email and as an offline results database so you can review the results on a separate system. Available report formats include HTML, text, CSV and PDF.

Multiple Viewing Options
Next up: Remediation

What happens after you have discovered findings? Data Recon’s advanced remediation capabilities help you clean up and remove any data security risks.

Secure Delete

If you don't need to retain any of the data, Data Recon’s Secure Delete feature permanently erases any trace of a file stored on disk, rendering it completely unrecoverable by undelete and forensic tools.

Secure Delete
Secure Quarantine
Secure Quarantine

If you want to keep the data, but store it more securely, Secure Quarantine lets you move accessible files to a secure location while permanently erasing it from the location where it was found.

Mask Cardholder Data

If Data Recon finds sensitive PAN data, the Cardholder Data Masking feature enables masking of each PAN within text based log files, configuration files and other simple files types stored on disk. For example, 1234000000005678 becomes 123400xxxxxx5678, thus rendering the data PCI compliant.

Mask Cardholder Data

Please note: Not all file formats or target types allow remediation actions to be performed.

Next up: Want More ?

Data Recon is packed with many more features to support your company’s data security compliance efforts.

On-Screen File Viewer

When Data Recon finds sensitive data, it displays the exact location. Data Recon displays the contents of a file and highlights exactly where the data was discovered. This simplifies the verification of results.

On-Screen File Viewer
Mark and Classify Findings
Mark and Classify Findings

As you review each finding, you can tag it with an appropriate classification marking. Then you can enhance the Data Recon report by displaying a breakdown by classification markings.

Portable Results

Do you want to generate results on one host and view the reports from another? You can do this with Data Recon’s Results Database, which uses AES 128-bit encryption to ensure that your result data remains secure.

Portable Results
Suspend Search Schedule
Suspend Search Schedule

With Data Recon, you can suspend a search during a particular time window, perhaps to create a backup or perform maintenance. Data Recon has an automatic Suspend Search feature that can be used to halt a Data Recon search during specific times when high-load tasks are running.

User Authentication

Do you want to limit who can run Data Recon within your organisation? Data Recon offers online and offline authentication options. In online mode, Data Recon access can be restricted to require a username and password, or you can opt for simplified authentication using a scan activation token. Alternatively, an offline license can be used for systems operating in a locked-down network DMZ.

User Authentication
Command Line and GUI
Command Line and GUI

Data Recon offers a powerful, yet simple graphical user interface (GUI) for Windows platforms. Power users may prefer the command line version, which is available for all platforms.

Multiple Reports

Data Recon makes it simple to specify multiple locations and formats when saving search results for multiple users.

Multiple Reports
Next up: Full Screen Tour