New Readers

 Home News and World Report Buyers Guide Global Excellence Technology Case Studies Editorial Awards About Info Security
 
Solving the Data Loss Prevention Problem at its Source

CURRENT THREAT SCENARIO

Over 11 million Americans had their identities stolen last year and over a quarter billion sensitive data records have been exposed since 2005. In response, federal and state governments as well as industry regulators have enacted laws requiring organizations to improve their handling of sensitive data and have stipulated monetary penalties for organizations that violate these rules. Despite increased focus and expenditures, many organizations are unclear exactly what problem they are trying to solve and therefore data breaches continue to occur. From Social Security Numbers, Credit Card and PCI data, to Patient Health Information (PHI), there is a tremendous amount of personally identifiable information (PII) that must be secured against hacking and inadvertent disclosure. File and e-mail servers, desktops, and databases store a multitude of historical documents that have been saved for backup purposes and businesses often forget that these files have their employee’s and customer’s personal data. Regulations vary from a reactionary “notification of breach” to requiring proactive cleaning of systems such as by Massachusetts’ 201 CMR 17.00.

The most effective prevention strategy is to clean the data at its source by finding the information and securing or shredding it. The first major challenge is to find all the locations containing sensitive information as the data itself exists in multiple formats and can be stored in various file and message types. The next challenge is to create an actionable set of results that isn’t overwhelmed by false positives allowing users to quickly perform remediation and reduce risk.

Tomorrow's Technology Today
Information Leak Prevention

WHAT DOES THIS TECHNOLOGY DO?

Identity Finder surpasses the competition in every aspect. The easy to use client interface is available for both Windows and Mac allowing organizations to empower their employees to take responsibility for protecting their own systems and PII. No training is required, allowing organizations to minimize costs. The client can also be run as a service, behind the scenes, for organizations that want centralized control. Identity Finder’s greatest advantage is its ability to minimize the amount of time required for users to spend solving this problem by providing more true positives and fewer false positives. This streamlined approach helps changes user’s behaviors because they can quickly and easily see real unsecured, sensitive data. The software uses validation algorithms to ensure that any result presented to the user is indeed a true identity match. By using advanced and proprietary search technology, Identity Finder is not only far more accurate, but also much faster. The Identity Finder Data-At-Rest approach allows organizations to find data at the source - where it is stored. Alternative approaches, such as preventing the same file from repeatedly being attached to an email message and blocking it at an egress point is expensive, time consuming, prone to false positives and false negatives, and doesn’t educate the user on what they are doing wrong. Identity Finder can search any file type and has advanced text extraction capabilities for the most common file types. Identity Finder can search files, emails, system areas, web browsers, file servers, databases, websites, and remote machines.

The easy to use client interface is available for both Windows and Mac allowing organizations to empower their employees to take responsibility for protecting their own systems and PII. No training is required, allowing organizations to minimize costs. The client can also be run as a service, behind the scenes, for organizations that want centralized control. Identity Finder’s greatest advantage is its ability to minimize the amount of time required for users to spend solving this problem by providing more true positives and fewer false positives. This streamlined approach helps changes user’s behaviors because they can quickly and easily see real unsecured, sensitive data. The software uses validation algorithms to ensure that any result presented to the user is indeed a true identity match. By using advanced and proprietary search technology, Identity Finder is not only far more accurate, but also much faster. The Identity Finder Data-At-Rest approach allows organizations to find data at the source - where it is stored. Alternative approaches, such as preventing the same file from repeatedly being attached to an email message and blocking it at an egress point is expensive, time consuming, prone to false positives and false negatives, and doesn’t educate the user on what they are doing wrong. Identity Finder can search any file type and has advanced text extraction capabilities for the most common file types. Identity Finder can search files, emails, system areas, web browsers, file servers, databases, websites, and remote machines.

CONCLUSION:

The security concerns and regulatory requirements of many industries place a clear emphasis on securing sensitive data and Personally Identifiable Information (PII). Identity Finder currently provides the leading software solution for sensitive data discovery and data leakage prevention at the endpoint level. With the recent release of Identity Finder Enterprise Suite 4.5, the biggest differentiators are speed, accuracy, minimization of false positives (via advanced validation algorithms), and an intuitive client front end for both Windows and Mac operating systems. Identity Finder specializes in working with organizations of all sizes and across all industries. The approach is easy, affordable, and unique because it allows the searching unstructured data to locate the source of unprotected personal information. Enterprises are no longer required to constantly inspect and block communication at all of their egress points because Identity Finder allows them to discover and protect their sensitive information at the source.

Identity Finder, LLC
250 West 57th St
Suite 1400
New York, NY 10107 USA

Bookmark and Share  

Follow us on twitter   Join us on LinkedIn   Photos on flickr   Watch us on YouTube   Become our fan on Facebook   Google   

Volunteer To Be A Judge
Apply today to be a preliminary-round judge for the 2011 awards. If you qualify, you'll be assigned categories based on your experience and industry. Apply now to be a Judge>>
More Tomorrow's Technology Today...
Current threat scenarios and how technologies are providing solution Learn more>>