PrivacyFinder Web™

  Sensitive Data Protection

PrivacyFinder Enterprise
  • Processing results
  • Pattern support
  • Create report

 Contact Us

Summary

  • PrivacyFinder Web allows seamless implementation of obligations for privacy protection in accordance of Privacy Protection Act.
  • Prevents leaks of customer data or other sensitive data.
  • Allows establishment of effective enterprise information management policy by managing sensitive and confidential information.

Features

PrivacyFinder is software that meets requirements stipulated in Technical protection standard of Privacy Protection Act allowing the tracing of sensitive data as well as legal evidence in cases of sensitive data breaches.

System Env.

  • Support for various Windows Oss (Windows XP/Vista/7, 32/64 bits)

Follow-up action

  • Encryption and encrypted isolation of detected files
  • Wipe detected files
  • Preview, view and list detected files

Support pattern

  • Detect sensitive data and patterns including resident identification number, account number, telephone number, passport number, address, mobile number, email, etc
  • Integrity check to prevent errors or excessive/missing detection

Support for various file formats

  • Documents: Support for almost every document format used in Korea including MS-Office, HWP, Open Office, Hunminjeongeum, Arirang, etc
  • Compressed files: Support for zip, rar, lzh, etc
  • Emails: Support for Outlook, EML, MSG, Lotus Notes, etc
  • Text files: General formalized and Unicode text files
  • Databases: Support for MDB, ACCDB, dBASE DB, etc

Stats and report

  • Daily, weekly and monthly sensitive data trend analysis
  • Provide reports in various formats including Word/Excel/PPT, PDF, HTML, etc

Forensic analysis

  • Detect deleted files
  • Detect file(s) with forged or modified extensions
  • Check DRM settings
  • Check whether a file is encrypted

Main Function

Function

Description

Agent-less

Operate whenever necessary or during inspection periods without running agent and transfer the detection results to server

Policy based operation

Detects sensitive data in accordance with security policy by each department

History management

Monitor and understand sensitive data usage by individual/department via on-going history management of sensitive data detection

Check incompletely deleted file

Checks list of restorable files which have been incompletely deleted

Pattern search

Supports search of information patterns such as residence ID/credit card no./card no./ phone no. (Syntax based)

File encryption

Encryption of files containing sensitive and confidential data (DRM Support)

File wiping

Completely wipes expired sensitive data so that it cannot be restored or leaked

Search of various types of OA file

Supports search of data contained in various types of files such as Office/ HWP/ Hunminjeongeum/ PDF/ email/ compressed files, etc.

Set up campaign

Sets up sensitive data check-up campaign and send email to target group to prompt sensitive data check-ups

Statistics

Create statistics on sensitive data storage and processing by all/department/user to establish security policy

Various reports

Provide report console and integrated report by rule/policy/agent to allow real time monitoring

Process

Operation Chart

Version Comparison

  PrivacyFinder Enterprise PrivacyFinder WEB PrivacyFinder Standard

Operation

  • Install agent to monitor current sensitive data status and encrypt files in real-time
  • User logs in for sensitive data server to run check-up program and store the current sensitive data status on server
  • Inspector connects check-up USB into target PC and run inspection programs

Features

  • Real time check up of sensitive data status on PC
  • Real time sensitive data alert and auto-encryption/decryption
  • No loading on PC since it checks data without running an agent
  • Alert function for monthly sensitive data check-up
  • Connect USB when required for check up
  • Operate without interruption of daily work

Application

  • When real-time action required
  • When instant search required
  • When on-going monitoring required
  • When necessary to operate without installing agent on user PC
  • When necessary to inspect sensitive data status on a regular basis
  • When perform offline inspection by administrator necessary
  • When network connection is not available

Qator
Qator Enterprise


SecuIn Enterprise


SecuMaster


evEraser