Discover, Remediate and Monitor over 200 types
of sensitive data from a single platform.
Hackers can’t steal sensitive personal data if YOU no longer store it.
Enterprise Recon enables your organisation to find and secure sensitive personal data across the broadest range of structured and unstructured data types.
It’s a purpose-designed sensitive data discovery solution for GDPR, PCI DSS, CCPA and any data security initiative that requires you to know where personal data is.
Its low impact design enables Enterprise Recon to co-exist with, complement and strengthenyour Data Loss Prevention (DLP) capabilities.
The Ground Labs tool is the first of its kind to discover what we don't know we have within our environment.
Head of Cyber APAC - BAE Systems Applied Intelligence
30 Minute deployment
Pre-configured with over 200+ personal data types means that there are no boxes to ship and no onsite engineers. Install a Virtual Machine and start finding sensitive data straight away.
Enterprise Recon is extremely light weight on your network and systems for finding personal data compared with any alternative. Its unique design enables full control of system resources and minimal data transfer.
Achieve Compliance Sooner
Enterprise Recon will significantly reduce the time required to become compliant with major data security standards when compared to a stand alone approach.
Search across your entire organisation for sensitive data
Enterprise Recon natively supports Windows, macOS, Linux, FreeBSD, Solaris, HP-UX and IBM AIX using Agent and Agentless options.
Enterprise Recon will also search within a broad range of data storage repositories using remote scanning capabilities including an EBCDIC option for Mainframes.
DISCOVER 200+ TYPES OF PERSONAL DATA FROM 50 COUNTRIES
Do you need to comply with GDPR, PCI DSS, HIPAA, Australian Privacy or any other PII data security standard?
Enterprise Recon comes ready to use with the largest number of PII data types you can select and search for immediately.
PII data type examples include Credit Card, Driver’s License, Passport, Name, Address, Phone Number, Date of Birth, National ID, Health Data and more.
Finding the data
is half the story
Enterprise Recon takes its capabilities beyond simply identifying your data storage risks, by empowering you with remediation options to take affirmative action on sensitive data.
Find Sensitive Data in Structured and Unstructured Locations
Enterprise Recon offers the power to search hundreds of file types including images across your unstructured file storage on servers, workstations, email and cloud storage including Office 365, Google, Azure, or Amazon AWS.
More importantly, Enterprise Recon also performs accurate data discovery on your large structured databases. 9 major database vendors are supported.
Want to find out more?
View Full Specifications
No Java or .NET prerequisites
MASTER SERVER VIRTUAL APPLIANCE – ISO
Direct installation (bare metal)
END-POINT SUPPORT (AGENT, AGENTLESS, REMOTE)
Solaris x86 Intel
Remote / Legacy Unix (ssh/scp/sftp)
EBCDIC Mainframes (ssh/scp/sftp)
Unix File Shares (ssh/scp/sftp)
Windows File Shares (cifs/smb)
DATA TYPES – PCI DSS
All PCI brands – American Express, Diners Club, Discover, JCB, Mastercard, Visa
Non PCI brands – China Union Pay and more
Prohibited Data – Track1 / Track2 detection
Consumer, Premium, Corporate, Prepaid, Postpaid, Debit, Credit
All known lengths – 13, 14,15,16,17-19 digits
Over 120 known PAN storage structures
DATA TYPES – PII / PHI / SPI
National ID Cards: SSNs, TFNs, NI and more from 50+ countries
Patient Health Information: Medicare, national insurance and more
Financial Data: Bank account number, SWIFT Code, IBAN, ISO8583
Personal Information: Names, address, phone number, DOB, drivers license, passports and more
Custom Data – Unlimited data patterns, combinations of data types, confidential information, financial reports, formulas, business sensitive intellectual property, fraudulent behaviour flags, honeypot data, customer reference IDs, member details.
Media access control (MAC) addresses
NATIVE FILE FORMATS
Below is a summarised list representing hundreds of individual file formats natively supported without additional configuration:
All Microsoft Office (97 onwards + pre-office legacy)
Open Source – Star Office / Open Office / Libre Office
Open standards – PDF, RTF, HTML, XML, CSV, TXT
File Databases – Access, DBase, SQLite, MSSQL MDF & LDF
Backup – Microsoft Binary / BKF
Images – JPG, GIF, BMP, PNG, TIFF, PDF (embedded), FAX
Audio (DTMF) – Mp3, WAV PCM 8bit & 16bit 8/16/44 kHz mono/stereo
Compressed TAR, ZIP (all types), Gzip (all types), Bzip2
Generic binary and ASCII text file support – all other file types will be inspected regardless of file format or extension.
Hangul Word Processor (HWP) files
EMAIL FILE FORMATS
MS Outlook (PST, OST, MSG, DBX) 32/64 bit variants
Exchange EDB / STM Information Store (non clustered)
MBox (Thunderbird, Sendmail, Postfix, Exim, Eudora and more)
Maildir (Qmail, Courier, Exim, Postfix, and more)
MIME encapsulated file attachments
Quoted-printable MIME encodings
Base64 MIME encodings
Lotus Notes NSF
Office 365 Mail
Gmail for business
Lotus Notes / Domino
Any IMAP enabled server
Microsoft SQL Server
Amazon AWS (S3)
Microsoft Azure BLOBs, Tables, Queues
Dropbox (for individuals)
Rackspace Cloud Files
CLOUD APP SUITES
Office 365 – Exchange, Tasks, Calendar, Onedrive, Sharepoint
Google Apps – Gmail, Tasks, Calendar, Google Drive
ADVANCED DETECTION ENGINE CAPABILITIES
Load prioritisation for production systems
Automatic pause for designated time frames
Manual speed throttling per schedule
High-performance custom pattern matching engine
Enhanced storage I/O pipeline
False positive elimination post-processor offering 99+% accuracy
Quarantine with Secure Delete
In-file Data Masking / Obfuscation
Encryption – AES / Strong Cryptography
Email and attachment deletion for Exchange
Email and attachment deletion for Office 365 Exchange
Become globally compliant with Enterprise Recon
Watch the video to see how we are keeping up
with your changing environments: New features
CONFIGURE AMAZON S3 TARGETS BASED ON AWS USER ACCOUNTS
This updated and simplified approach will allow you to automatically include all accessible Buckets with given AWS user accounts, or specific S3 Buckets.
CUSTOMISABLE TOMBSTONE MESSAGES
This new feature gives Global Admins or System Managers the flexibility to customise the text within the tombstone files.
Watch the Release video where we will talk you through some of the new features.
Allows users to exclude metadata from a saved report so that reports only contain essential information.
Support to add users with the same login name across multiple domains. Notification alerts for easier remediation navigation. Increased security.
The authenticator app will now display a unique Master Server identifier alongside the user name and Master Server hostname allowing multiple users to register.