Discover and secure your customers’ personal information so it can't be stolen.
Data Recon is a sensitive data discovery tool that assists you in complying with global privacy laws and other compliance requirements by finding Personally Identifiable Information (PII) including Social Security Numbers (SSNs), Tax File Numbers (TFNs), passport numbers, national ID numbers, Medicare information, personal names, addresses and more.
Data Recon can be used to search for sensitive personal information on servers, workstations, and other supported storage devices to help you avoid becoming the next privacy data breach headline.
1 year standard license (USD)
1 target$179.00per target
3 targets$119.00per target
10 targets$109.00per target
25 targets$99.00per target
50 targets$89.00per target
100 targets$79.00per target
Data Recon performs sensitive data discovery to help you comply with requirements for data privacy and data breach notification. By finding and securing sensitive data, including PII, you're ensuring the safety of your customers’ personal information and helping yourself avoid becoming the next headline about a data breach.
Data Recon knows how to find more than 80 types of Personally Identifiable Information used in more than 50 countries.
Examples include personal names and addresses, credit card data, passport numbers, national ID cards, and more.
You don't need to be an IT security expert to use Data Recon.
With Data Recon’s intuitive user interface, you can begin a search for sensitive data out-of-the-box without any complex configuration or fine-tuning.
Data Recon searches for sensitive data within online and offline storage locations, such as file servers, desktops, NAS and SAN devices, Exchange, Gmail, Lotus Notes, Oracle, Amazon AWS Cloud and more.
Data Recon understands what's inside your files, including emails, databases, images, audio files, and documents, and even inspects unknown file types.
Data Recon reports specify the file, document, email and/or database table where sensitive personal information was found, so you can address problem areas and secure them.
Reports can then be exported in PDF, CSV, XML and text.
After Data Recon finds sensitive customer data, you can easily address findings by using the powerful remediation features to ensure that sensitive data is quarantined or permanently deleted.
Data Recon can be run from anywhere, even a USB drive, without installation or third-party software. Data Recon supports Windows, Linux and EBCDIC mainframes, including multiple kernels and distributions.
Data Recon uses only minimal memory and other CPU resources, so you can run it on your systems without noticeable impact on users or production applications.
If your bank requires you to be PCI DSS compliant, Data Recon can help. Data Recon finds card numbers issued by ten major card brands, with additional support for test numbers, custom BIN ranges and Track1/2 magnetic stripe detection.
Data Recon includes all the PCI compliance capabilities we offer in our Card Recon data discovery tool.
Are you storing your customers’ national identity number? Data Recon can find more than 50 types of national IDs, including Social Security numbers (SSNs) and Tax File Numbers (TFNs) from most of Africa, Asia, Europe, Middle East, Oceania, North America and South America.
Are you a healthcare provider complying with HIPAA and other medical industry compliance initiatives?
Data Recon finds many types of PHI, including Medicare, national insurance and national provider identifier data types from multiple regions.
If your business handles personal banking information or business customer information, Data Recon can improve your data security compliance.
Data Recon offers the ability to identify stored bank account numbers, SWIFT Codes, IBANS, BSBs, GST and VAT information.
If your business stores customers’ personal information, Data Recon can improve your data privacy.
Data Recon can accurately detect your customers’ name, address, phone number, date of birth, and other elements which, when used together, could be used to commit identity theft.
Does your business store sensitive IDs and reference numbers that are specific to your business?
Data Recon offers a unique feature enabling you to build custom definitions of sensitive data. You can also build definitions to find specific combinations of sensitive and personal data.
When you need to perform sensitive data discovery across millions of files and terabytes of data, accuracy is critical. Find out why Data Recon is unbeatable on any accuracy measurement.
Data Recon is preconfigured to accurately identify sensitive data using its purpose-built discovery algorithm. It has been designed to analyse each possible finding hundreds of times at lightning speed to save you time while identifying genuine security risks.
If you've tried an alternative, open-source product, you already know that searches can yield a high number of false positives. Data Recon uses a built-in false positive elimination algorithm that scrutinises every finding and delivers a filtered set of results with minimal false positives.
Data Recon attempts to inspect every object, regardless of the file name or type. To reduce false positives, many alternative solutions skip up to 80% of unrecognised files. In contrast, Data Recon ensures that each object is inspected for the possibility of stored sensitive data.
How many file formats is your business storing? Data Recon identifies and reads the contents of hundreds of file formats, including MS Office documents, text files, compressed files, databases, emails, images and audio files. Furthermore, Data Recon is capable of inspecting all other files, including those that are not natively understood, to provide the most thorough scan available in the data discovery market.
Sensitive data can infiltrate every part of your network, including development and test environments. Data Recon lets you define the difference between test data and live data so that your team can focus on the real problems while ignoring non-sensitive internal test data sets.
Do you need to completely exclude certain locations or number ranges within your company? With Data Recon, you can enhance the accuracy of your search even further by applying filters to handle certain data locations differently. Features permit re-categorising numbers and including or excluding data by range, location, prefix and suffix. Data Recon also includes a post-processing LUA script feature for power users.
All Microsoft-supported versions of 32- and 64-bit Windows systems, including Windows 2000, Windows XP, XP Embedded, Windows Vista, Windows 7, Windows 8 and Windows Server 2000/2003/2008/2012 on Intel x86 CPU architectures.
All modern distributions of Linux supporting Kernel 2.4 and 2.6, including but not limited to Centos, Debian, Fedora, Redhat, Slackware, SUSE and Ubuntu on Intel x86 CPU architectures.
Mid-range and mainframe systems, with full support for IBM's Extended Binary Coded Decimal Interchange Code (EBCDIC) to read files copied from mainframe systems such as AS/400, S/390 and iSeries and searched them in their native form without modification.
Data Recon supports hundreds of file formats to ensure maximum depth when searching for sensitive data.
Any text and markup language formats, including TXT, RTF, HTML, XML, and many more
Popular file types within Microsoft Office 95 / 97 / 2000 / XP / 2003 / 2007 / 2010 / 2013, Star Office, Open Office, Libre Office and Neo Office.
All the major and minor compression types in use today, including 7zip, Bzip2, Gzip, LZMA, LZMA2, Ar, LZW (.Z), .EXE Self Extracting Executables, Microsoft Tape Backup Format, RAR, XZ, ZIP and all legacy codecs including implode, deflate, deflate64, bz2, lzma and ppmd.
Search live and offline databases with Data Recon to discover where sensitive data is stored. Live search eliminates any downtime or impact on offline/detached databases and their backups. Reports display the table name and, where available, column name. Data Recon also detects data stored as binary large objects (BLOBS).
Supported databases for live search include DB2, MySQL, Microsoft SQL Server, Oracle, PostgreSQL, and SAP Sybase.
Supported databases for offline, file-based search include Microsoft Access, SQLite, DBase, Microsoft SQL Server (MDF and LDF), and Microsoft Tape Binary backup (BKF) of an MSSQL server.
Data Recon can scan enterprise mail systems in live or offline mode. An email search includes attachments and produces detailed offline reports showing the sender, receiver and other important details to identify how sensitive customer information is being stored and transmitted.
Offline file support includes Microsoft Outlook PST, OST (2003 - 2010), Outlook Express, Lotus Notes NSF, Thunderbird, Eudora, Exim, Courier, Postfix, QMail, Maildir, Sendmail, DBX, MBox, and all standard MIME data formats.
Live mail scanning includes Microsoft Exchange, Gmail for Business, Lotus Notes and any email server supporting IMAP.
Is your system storing scanned images or customer information?
Some software solutions are unable to identify these data security risks, but Data Recon has built-in image decoding and optical character recognition (OCR) capabilities to read the content of image files and discover typed and handwritten sensitive data with impressive accuracy.
Does your business operate a call centre IVR that uses call recording?
Data Recon understands common audio file formats and recognises sensitive data entered using a telephone keypad (DTMF tones) from pay-by-phone and IVR transactions that have been recorded inadvertently. Supported formats include WAV PCM 8/16bit mono/stereo.
The locations where sensitive customer data might be stored are unlimited. Data Recon offers multiple ways to help you identify almost every instance, so you receive a complete picture of every instance of personally identifiable information that may be stored in your system.
To ensure the safety of your customers’ personal information, you must identify every possible location where might be stored. Data Recon offers multiple ways to identify every instance so you receive a complete picture of all sensitive data being stored.
Search all local storage on a desktop, laptop, workstation or server, including fixed drives, removable drives and any accessible location where data can be stored.
Do your employees discard sensitive data simply by deleting it? If so, you inadvertently may be storing sensitive data that can be recovered easily by commonly available tools. Data Recon solves this problem by searching all the free space on a local system for deleted files and identifying any remaining sensitive data.
Windows automatically backs up file changes to a hidden area of your computer called a shadow volume. Most people aren't aware that large volumes of sensitive data may be hiding there.
Data Recon helps you address this potential security risk by searching all shadow volumes for sensitive data.
Given the increasing use of memory scraping malware, your company needs the ability to audit the memory usage of applications for protection against data breaches. Data Recon simplifies this process by enabling auditing of memory for any sensitive data across any supported end-point.
Is your business storing data on centralised SAN or NAS devices?
With Data Recon, it isn’t a problem. Data Recon enables remote scanning of network drives with advanced controls to reduce network impact by limiting the speed of data transfer.
Are you running mission-critical enterprise databases?
Data Recon enables live searching of the most popular enterprise database servers, including Oracle, DB2, Microsoft SQL Server, SAP Sybase, MySQL and PostgreSQL.
Would you like to scan a user mailbox on a live email server?
Data Recon can scan most popular email services live via a standard IMAP connection including Microsoft Exchange, Gmail and more. When scanning a mailbox, Data Recon searches every email within your chosen mailbox(s) and any attachments, including multilayered compressed files.
The Cloud is everywhere. Does that mean your customers’ personal information is stored everywhere too?
Cloud data storage is proliferating, so it must be searched for sensitive data. Data Recon remotely searches popular Cloud platforms, including Amazon AWS and Google Apps (Calendar, Drive, Mail, and Tasks).
Strong functionality is of little use without clear, readable results. Data Recon’s reporting choices provide maximum visibility of weaknesses in your data security.
Immediately see your total risk position, including separate identification of sensitive data that is considered prohibited for storage.
Data Recon displays a complete breakdown by target type, showing you the highest-risk areas of all the searched targets, so you know precisely where each set of findings is located.
If Data Recon finds multiple types of sensitive data, the report will include a breakdown.
View a detailed breakdown of every finding on each end-point, including every file, database, and email containing sensitive data, along with a complete count of data types.
If Data Recon finds emails containing sensitive data; the report will identify which emails were detected including the sender, recipient(s), subject and timestamp. The report will also list attachments containing sensitive data, if applicable.
Data Recon details the contents of any recognised databases, displaying the table names and, when possible, the column names of locations where sensitive data was found.
Data Recon displays reports on-screen, via email and as an offline results database so you can review the results on a separate system. Available report formats include HTML, text, CSV and PDF.
What happens after you have discovered findings? Data Recon’s advanced remediation capabilities help you clean up and remove any data security risks.
If you don't need to retain any of the data, Data Recon’s Secure Delete feature permanently erases any trace of a file stored on disk, rendering it completely unrecoverable by undelete and forensic tools.
If you want to keep the data, but store it more securely, Secure Quarantine lets you move accessible files to a secure location while permanently erasing it from the location where it was found.
If Data Recon finds sensitive PAN data, the Cardholder Data Masking feature enables masking of each PAN within text based log files, configuration files and other simple files types stored on disk. For example, 1234000000005678 becomes 123400xxxxxx5678, thus rendering the data PCI compliant.
Do you have a business-justified reason to be storing sensitive data, yet can’t afford to let it fall into the wrong hands? Secure sensitive yet important data via encryption, locking the files down with a password only relevant parties will know.
Data Recon is packed with many more features to support your company’s data security compliance efforts.
When Data Recon finds sensitive data, it displays the exact location. Data Recon displays the contents of a file and highlights exactly where the data was discovered. This simplifies the verification of results.
As you review each finding, you can tag it with an appropriate classification marking. Then you can enhance the Data Recon report by displaying a breakdown by classification markings.
Do you want to generate results on one host and view the reports from another? You can do this with Data Recon’s Results Database, which uses AES 128-bit encryption to ensure that your result data remains secure.
With Data Recon, you can suspend a search during a particular time window, perhaps to create a backup or perform maintenance. Data Recon has an automatic Suspend Search feature that can be used to halt a Data Recon search during specific times when high-load tasks are running.
Do you want to limit who can run Data Recon within your organisation? Data Recon offers online and offline authentication options. In online mode, Data Recon access can be restricted to require a username and password, or you can opt for simplified authentication using a scan activation token. Alternatively, an offline license can be used for systems operating in a locked-down network DMZ.
Data Recon makes it simple to specify multiple locations and formats when saving search results for multiple users.