- Low Total Cost of Ownership
- Legal and Regulatory Compliance
- Unmatched Accuracy
- Powerful Reporting
- Data Inventory
- Intuitive Interface
- Improves Business Processes
- Agentless Search and Remediation
- Empowered End User Searching and Remediation
- Hybrid Searching and Remediation
- AnyFind Technology
- Centralized Policies & Granular Control
- Managed Distribution
- Social Security Numbers
- Credit Card and PCI Data
- Protected Health Information
- Bank Account Numbers
- Dates of Birth
- Phone Numbers
- Driver License Information
- Personal Addresses
- Canadian Social Insurance Number
- Australian Tax File Number
- United Kingdom National Insurance Number
- United Kingdom National Health Service Number
- Passport Numbers
Low Total Cost of OwnershipIdentity Finder is easy to install and set up, eliminating the need for expensive professional services. Identity Finder has an MSI installer for Windows and a graphical application we call "msibuilder" that allows easy customization. The Endpoint Client may then be rapidly deployed via Group Policy (Active Directory) or any other Patch Management system (such as LanDesk). The Mac Endpoint Client (in .PKG format) may be deployed similarly. These allow for silent, network propagated installations or direct user installations without the need for complicated manual services. Once deployed, the DLP Console can be configured to automatically upgrade Endpoint Clients directly from our website or via your custom installer.
With an intuitive interface, extensive Knowledge Base and responsive Technical Support, most of our customers spend just a few hours installing Identity Finder. Identity Finder searches for FERPA data, PCI data, HIPAA data, and every other regulation or compliance data type, with no configuration needed and at no extra cost.
Sensitive data leaks out of secure systems on a daily basis. With each email, Excel spreadsheet or instant message, the number of devices in your secure data environment grows, and your audit and compliance costs go through the roof. Identity Finder will reduce audit and compliance costs by deleting all of those copies, shrinking the size of your secure data environment. Once you combine the tens of thousands of dollars you'll save in audit and compliance costs with easy installation and maintenance, it's clear that Identity Finder has a very low total cost of ownership.
Legal and Regulatory ComplianceIdentity Finder is a key component to several legal, agency, and industry regulations, including: PCI-DSS 2.0, HIPAA and HITECH, State Breach Notification Laws, Red Flag Rules, Sarbanes-Oxley, FERPA, and the Gramm-Leach-Bliley Act.
Unmatched AccuracyIdentity Finder is so accurate that our customers report a false positive rate of 2% or less; up to 25 times more accurate than our competitors. To achieve these unprecedented results, Identity Finder's AnyFind™ technology utilizes advanced proprietary algorithms incorporating contextual analysis, proximity checks, validations, industry checksums, minimum counts, and a variety of user customizable settings.
For specific file types, such as Microsoft Excel, Identity Finder knows that while a cell might display 123-45-6789, different versions of Excel store numbers in different ways internally. Identity Finder intelligently adjusts its validation algorithms based on file type so that cells in CSVs include commas, Excel 2007 and later files include XML tags, and Excel 2003 and below include carriage returns, and trailing decimals.
Identity Finder takes further steps by looking for keywords, negative keywords, context, minimum counts, and a variety of user customizable settings allow Identity Finder to only match the information that is real PII. Once potential PII is found, Identity Finder’s AnyFind™ tool can validate the number against additional rules, such as Social Security Administration rules to ensure that an SSN could have been issued. It passes potential credit card numbers through the Luhn algorithm, and compares the number against definitions from issuing banks and financial institutions. These few examples of intelligent, real-time and context-aware search features maximize accuracy and drastically reduce false positive results.
Powerful ReportingIdentity Finder allows results to be reported in a wide variety of ways for both users on the Endpoint Client and administrators from the central DLP Console. Our out-of-the-box reports can be tailored for high-level decision-makers who need an enterprise-wide risk analysis, technologists who must implement remediation, or end-users trying to improve behavior and understand their own systems.
Data InventoryIdentity Finder creates and tracks a detailed data inventory so you can see what has changed over time. You will be able to measure progress toward compliance and know which assets were compromised should a device become stolen or lost. Having an up-to-date data inventory aids compliance with several regulations, and enables a quick, surgical response in case a breach ever occurs.
Intuitive InterfaceIdentity Finder's award-winning, wizard-based interfaces for both finding and remediating sensitive data are approachable and intuitive for non-technical and advanced users.
Improves Business ProcessesIdentity Finder improves business processes and employee behavior by making them aware of the underlying problems that lead to data leakage and breaches. Identity Finder's detailed analysis empowers decision-makers and employees to identify and fix broken or risky business practices and prevent future sensitive data leakage.
Agentless Search and RemediationIdentity Finder offers agentless or remote searching, remediation and reporting. As long as the Identity Finder process has proper credentials, the Endpoint Client can scan any remote location mounted and visible on the network regardless of file system format. UNC paths, IP Addresses, NETBIOS Names, and Fully Qualified Domain Names are searched no differently than the local file system – without the need to deploy an additional Endpoint Client to those remote endpoints. This will allow IT staff to conduct manual or automated scans of any remote endpoint on the network without notification to the local user of that endpoint.
Empowered End User Searching and RemediationIn contrast to Agentless Search, end users may be empowered to search and remediate their own devices. Experience has shown that data owners are often in the best position to evaluate the how useful information is. Consequently, Identity Finder may be deployed on each end point and configured to allow end users to search and remediate their own systems through a series of simple, streamlined, and intuitive wizards.
Hybrid Searching and RemediationMost commonly Identity Finder is deployed using a hybrid approach of Empowered End Users and Agentless searching. Using the granular controls provided in the Identity Finder DLP Console, any feature or control may be delegated to end users or managed centrally. Power users or IT staff can take advantage of our Advanced Interface to have full access to our entire package – including all identity types, custom searches, multiple-criteria searches, advanced locations, and even remote searches.
AnyFind TechnologyIdentity Finder’s AnyFind™ searching engine uses a variety of complimentary methods to positively identify PII (such as credit card and social security numbers). It goes well beyond using simple regular expressions to match delimited SSNs with the specific patterns in traditionally formatted SSNs. Identity Finder also finds formats unique to certain file types as well as finding unformatted, or non-delimited 9-digit social security numbers.
ConsoleIdentity Finder DLP Console provides centralized reporting and remote administration, remediation, and scheduling. Its simple and powerful interface generates reports, customizes and controls end points.
Centralized Policies & Granular ControlIdentity Finder understands that your organization has distinct business and regulatory requirements and a unique network topology. Some organizations allow their employees to have complete control over their own systems, while others require centralized control of the scanning and remediation process. Some organizations require independent verification and scheduled scans, some will allow limited end-user action, while others require only compliance monitoring. Some organizations have robust software distribution methodologies and others that have no process or tools whatsoever.
The DLP Console allows you to set pre-defined policies and criteria for multiple Endpoint Clients at the same time. These can be used to control every single feature of an Endpoint Client from a single location. The search criteria, custom identity types, remote endpoint targets, available remediation options, and more can be set and assigned for one, multiple, or all endpoints from within the DLP Console’s interface. DLP Console administrators may ensure that certain roles only have access to certain features, reports, or subset of endpoints. This type of drill-down administration separates Identity Finder from many of the competitors in the marketplace. Regardless of your needs or network topology Identity Finder provides granular policy control, making it easy to deploy upgrades, push new policies, schedule searches, review results, and generate reports.
Managed DistributionOur Endpoint Client software uses a standard installation package that can be easily customized or not used at all; and our application can be used with a full user interface or via a command line.
Data at Rest SearchFor companies which need to protect sensitive customer and employee personal information, or comply with a state and federal security regulations, Identity Finder is a sensitive data discovery and Data Loss Prevention (DLP) software product that finds and secures sensitive Personally Identifiable Information (PII) quickly, accurately, and affordably.
Unlike traditional data-in-motion DLP products which try block information as it passes over a network, Identity Finder searches for and protects PII at its source. Because Identity Finder takes a data-at-rest approach to DLP, our software finds and secures forgotten PII on every inch of your hard drive, stoping leaks well before they reach an egress point. Whether your computer is infected, lost, stolen, or hacked, Identity Finder ensures your data is safe. The unmatched accuracy of our data-at-rest AnyFind™ technology is at least 25 times more accurate than data-in-motion DLP because it utilizes advanced proprietary algorithms incorporating contextual analysis, proximity checks, validations, industry checksums, minimum counts, and a variety of user customizable settings.
Optical Character Recognition (OCR)Identity Finder DLP’s OCR Module enables Identity Finder to search inside PDF images, BMP, DCX, JP2, JPG, JPF, JPM, JPX, PCX, PNG, and TIFF files seamlessly and with unprecedented accuracy. This is of critical importance since many e-fax services store faxes as TIF or PDF image files. Additionally, many PDF forms are scanned and stored on disk or in e-mail attachments after being signed.
EncryptionIdentity Finder will secure or encrypt files in three ways, directly through the Endpoint Client. 1) Identity Finder offers native application encryption for Adobe PDF, Office, Zip, and other files. 2) Identity Finder provides its own proprietary 256-bit AES whole-file encryption option for all file formats. 3) In the event you already use an encryption product, Identity Finder enables you to encrypt files using that product. Identity Finder utilizes command line controls to maximize compatibility with third party encryption applications.
Scrubbing and RedactionIdentity Finder will redact or "scrub" sensitive data within a file, replacing sensitive data with non-sensitive characters, without disturbing the other data in the file. This feature is especially useful for PCI-DSS 2.0 compliance, which often requires masking or truncation. Other financial data or other files containing a combination of confidential and non-confidential information may be quickly and efficiently redacted.
ShreddingFile destruction or "Shredding" uses the Department of Defense’s 5220-22.M deletion standard to ensure that data cannot be recovered using software-based forensic tools. This action is available both for users interacting with the Identity Finder Endpoint as well as for administrators using the Identity Finder DLP Console.
QuarantineQuarantine allows users with an Identity Finder Endpoint Client and administrators with the Identity Finder DLP Console to securely move files containing sensitive data to a local or remote location that has been deemed secure. Identity Finder can leave a customized text file to let users know where the file was moved, or containing other instructions.
Searching All File TypesIdentity Finder finds PII in any file type Identity Finder first searches files based on its own broad library of proprietary filters, including Office documents, database filters, images and scanned pdf filters. Identity Finder also utilizes Windows file filters, and will search any unknown file type as plain text.
Searching Any Network DeviceIdentity Finder will remotely search any device accessible through any network, even without installing Identity Finder on that device.
Regular ExpressionsIdentity Finder allows you to search custom and proprietary data with no restrictions, leveraging the full Regular Expression suite in order to ensure you can quickly and accurately find any data type beyond what we include out-of-the-box.
Information SearchedThe secret behind Identity Finder's comprehensive searching techniques is our AnyFind™ technology. AnyFind version 70.0.0, gives you the ability to automatically search for any Social Security Numbers, Debit and Credit Card Numbers, Bank Accounts, and Passwords. You can even automatically find Tax File Numbers, Social Insurance Numbers, National Insurance Numbers, and National Health Service Numbers. We are constantly improving our AnyFind technology through AnyFind Definitions updates. The updates help improve your results by eliminating false positives while keeping true identity matches.
Social Security NumbersIdentity Finder discovers United States Social Security Numbers and performs the industry’s strongest validations and analyses to maximize accuracy and eliminate false positive results.
Credit Card NumbersIdentity Finder finds a wide range of Payment Card Industry (PCI) Information including the Primary Account Number (PAN), CCV numbers, expiration dates and other relevant PCI data for MasterCard, Visa, Discover, American Express, Diners Club, Carte Blanche, JCB/Enroute, and Australian Bankcards.
Protected Health InformationHIPAA requires covered entities to find and protect combinations of data. Identity Finder is the only product in the market that allows healthcare related organizations find unstructured Patient Health Information (PHI).
Bank Account NumbersIdentity Finder finds bank account information such as checking and savings account numbers.
PasswordsIdentity Finder finds passwords, such as those that users store in text files, emails, browsers and other areas users often don't even know exist.
Dates of BirthIdentity Finder can find Dates of Birth by performing detailed contextual analysis on the data, distinguishing a date of birth from other dates.
Phone NumbersIdentity Finder will find every North American phone number in a data set, or just particular user-defined phone numbers.
Driver License InformationIdentity Finder finds Driver Licenses, including scanned images. Our software will let you limit your search to selected states or search for all drivers licenses.
Personal AddressesIdentity Finder finds Personal Addresses in many different formats.
Canadian Social Insurance NumberIdentity Finder finds the Canadian Social Insurance Number (SIN). Canadian businesses and individuals can achieve the same level of protection as American enterprises.
Australian Tax File NumberIdentity Finder finds the Australian Tax File Number (TFN). Australian businesses and individuals can achieve the same level of protection as American enterprises.
United Kingdom National Insurance NumberIdentity Finder finds the United Kingdom National Insurance Number (NINO). British businesses and individuals can achieve the same level of protection as American enterprises.
United Kingdom National Health Service NumberIdentity Finder finds the United Kingdom National Health Service Number (NHS). British businesses and individuals can achieve the same level of protection as American enterprises.
Passport NumbersIf you are concerned about your Passport Number being exposed, Identity Finder will find it on your system to help you protect your identity.
Network DrivesIdentity Finder will search any share or network drive agentlessly, as long as the machine running Identity Finder has sufficient privileges to read the drive.
Windows DesktopsIdentity Finder can search Windows desktops both locally and remotely for sensitive data. Identity Finder DLP Endpoint may be installed on: Windows XP with SP1 or higher, Windows Vista, Windows 7, and Windows 8.
Mac DesktopsIdentity Finder is the only data leakage prevention company on the market that has developed a native Mac application that can search Mac desktops locally. Identity Finder DLP Endpoint may be installed on: Mac OS X 10.5, 10.6, and 10.7 (Intel Hardware).
Windows ServersIdentity Finder can search Windows servers remotely in an agent-less mode, or locally for personally identifiable information. Simply enter in remote connection details, including authentication credentials, to search remote machines like Windows servers. Identity Finder DLP Endpoint and Console may be installed on: Windows Server 2003, Windows Server 2008, and Windows Server 2008 R2.
Exchange Server & EmailIdentity Finder scans local Outlook profiles (OSTs) as well as archives (PSTs) and email attachments to discover sensitive information that may have been accidentially sent to (or received from) third parties via email. In addition Identity Finder searches Thunderbird e-mail, MBOX mail file format files and Lotus Notes NSF database/e-mail files. Identity Finder will search: Exchange Server 2007 and Exchange Server 2010.
Redhat LinuxIdentity Finder can agentlessly search any Linux/UNIX based system (including Redhat Enterprise Linux 4.0) that is visible from a Windows or Mac operating system list above. This can be accomplished via Samba, NFS, or any other protocol that Windows can read via a remote procedure call (RPC).
Database SearchIdentity Finder Enterprise Edition's Database Search module will scan any database with an OLE DB connection, including SQL Server, Oracle, MySQL, DB2, etc.
WebsitesIdentity Finder's Website Search Module can crawl websites to find any private information that has been unintentionally posted.
BrowsersIdentity Finder searches browsers and system areas for sensitive confidential data like credit card numbers that may have been stored without your knowledge.
Removable DrivesSimply tell Identity Finder to search removable drives, and if any are attached Identity Finder will automatically search them for personal information.
Windows Shadow VolumesWindows contains a technology called "Shadow Volumes," that contains previous versions of files that most employees forget about until a leak occurs. Identity Finder automatically scans and remediates Shadow Volumes out-of-the-box.
- Windows 7
- Windows Vista
- Windows XP with SP1
- 50MB hard drive space
- Mac OS X 10.8 Mountain Lion
- Mac OS X 10.7 Lion
- Mac OS X 10.6 Snow Leopard
- Mac OS X 10.5 Leopard
- Intel-based hardware platforms
- 50MB hard drive space