Enterprise Recon helps ensure compliance with global privacy laws, featuring 300+ preconfigured personal data types for on-demand scanning.

Enterprise Recon ensures fast, accurate data discovery and management with custom patterns, instant remediation, and access governance to reduce data exposure.

Enterprise Recon delivers clarity to any data management strategy with comprehensive compliance reporting, data classification and advanced analytics.

Enterprise Recon offers unparalleled data discovery scanning with no impact on performance, across on-premises and cloud environments.


McDonald's
Thales
Verifone
BP
UNICEF Australia
The Ritz-Carlton
Hallmark
Oxfam
CDC: Centers for Disease Control and Prevention

Data discovery for structured and unstructured stores of data across on-premises platforms, databases, email and archive storage

Comprehensive cloud scanning compatible with all major cloud solutions providers, including Amazon AWS, Microsoft, Rackspace, Box and more

Instant remediation for rogue data, including redaction, secure erasure, quarantine and encryption

View file access restrictions identifying users or groups and level of access, and revoke unauthorized access

Integrate with Microsoft Purview to apply data classification as persistent metadata, supporting more effective data loss prevention

Discover where sensitive data is and who has access to it, and investigate the security posture of host systems

Apply risk scoring to discovery scan data, enabling risk profiling and prioritization for remediation and data management

Easy integration with ODBC-compatible applications and business intelligence platforms, for detailed data analytics

Market-leading data discovery for PCI DSS scoping and remediation

Targeted discovery, remediation and management solution for privacy and compliance

Enhanced visibility and integration capabilities offering streamlined data management for all critical data



Data made visible with GLASS Technology™

GLASS Technology™ is the quickest and most accurate discovery software on the market, enabling rapid data discovery, risk scoring, data classification and remediation-in-place across the broadest set of platforms.

Introducing GLASS Studio™

GLASS Studio

Getting started with custom data types just got easier with GLASS Studio™

Now available for Enterprise Recon PII and Enterprise Recon Pro, GLASS Studio provides an intuitive interface for building custom data types enabling discovery of all proprietary and non-standard critical and sensitive data.

Using a guided visual builder, GLASS Studio offers a no-code alternative for rapid deployment of bespoke data patterns, complete with pattern templates and an instant test feature to ensure accurate and error-free customization.

GLASS Studio in action
Key feature differences
DeploymentAppliance, server and cloud deployment options
Pre-configured agentsER CloudER CloudER Cloud
Data patternsCardholder data discovery for PCI DSS
PII data discovery for privacy compliance*
Customizable data patterns
GLASS Studio™
Platform scanningAgent, agentless and distributed scanning
On-premises and cloud scanning
Broad platform coverage**
Full file scanning
Structured and unstructured data scanning
OCR, image and audio scanning
In-memory scanning
RemediationIn situ data remediation
Delegated remediation
Data access management
ReportingSingle and multi-scan reporting
Investigate page for deeper analysis
Data managementData classification with MS Purview
Risk scoring and labeling
ODBC integration with PowerBI, Tableau and more
AdministrationRole-based access control (RBAC)
Customizable notifications and alerts
Rest API for automated access
SupportInstallation assistance
Online knowledgebase
Email, telephone and video support
Complimentary proof-of-concept

click to view the full list of pre-configured PII data types
** click to view the full list of supported platforms

A security shield on a network concept background representing data discovery for ISO27001 compliance

The value of data discovery for ISO27001

The international standard ISO27001 is one of the longest-standing and most widely recognized benchmarks for cybersecurity and privacy protection worldwide. Introduced initially as BS 7799 in 2995 and updated to ISO27001 in 2005, the standard establishes an information security management system (ISMS), delivering a comprehensive framework for organizational security and information risk management.  The standard…

a globe surrounded by model people of all races on a green background representing privacy law compliance

Mastering privacy compliance with PII discovery and data management

The number of data protection and privacy laws in place globally have increased dramatically over the last decade. According to the latest UNCTAD figures, 137 countries have enacted privacy laws protecting personal data rights of residents. Almost 80% of the world’s population is protected by privacy legislation – around 6.3 billion people.  While historically, data…

A union jack flag and judges gavel representing UK Data Use and Access Act 2025 – What you should know

UK Data Use and Access Act 2025 – What you should know

The UK Data Use and Access Act 2025 (DUAA) passed through both parliamentary houses and received Royal Assent on June 19, 2025. The bill is an important milestone for data protection legislation in the UK.  In this post, we’ll explain what you should know about the DUAA and its implications for businesses, enforcement timelines and…

a lightbulb stands out against a dark blue background with network nodes formed in a globe representing the strategic role of data discovery in digital transformation

The strategic role of data discovery in digital transformation

Modern businesses are operating in a rapidly evolving digital world, and risk failure if they are unable to keep pace with their peers. The increasingly online nature of our personal and business lives is forcing organizations toward strategic digital transformation at break-neck speed. Whether it’s automating legacy systems, enhancing customer experience or reforming business processes…

a padlock is displayed on a background of purple blocks representing cybersecurity starts with data discovery for a safer digital future

Cybersecurity starts with data discovery: Strategies for a safer digital future

Organizations today must prioritize cybersecurity to protect themselves in the face of an ever increasing barrage of cyber-threats. Whether this comes from cybercriminals seeking data for sale or extortion or to cause disruption, or from internal sources including disgruntled staff members and trusted suppliers – data is the primary target.  As organizations generate and store…