Video: Identity finder for PCI-DSS 2.0

Protecting Payment Card Industry (PCI) data is a necessity to prevent data breaches. Primary Account Numbers (PANs) leak out of the most secure systems and find their way into employee emails, hard drives and backups. Identity Finder DLP for PCI gives you the tools to discover, mask, shred, and secure PANs no matter where they’re hiding in (and out of) your cardholder data environment.


Video: Identity Finder Enterprise Architecture

Identity Finder’s architecture is flexible, and can be configured to adapt to your unique business needs. You have the option to centrally manage your deployment using the Identity Finder DLP Enterprise Console, and receive centralized reporting from all devices through your entire enterprise network.
If you wish to empower your end users to maintain their own systems, Identity Finder is installed on each laptop, desktop, PC, Mac, or server. You may configure the endpoints, and the results of Identity Finder searches and End Users’ actions are presented to the end user for remediation or reported back to the DLP Enterprise Console.
You can also search other computers, web servers, or database servers without installing Identity Finder, using Agentless Searching. From a single administrative workstation you can remotely search other desktops, file servers, or any network device with a hard drive, without installing Identity Finder on those machines. As always, the agentless search policies may be set, monitored, and controlled by the centralized DLP Enterprise Console.


Video: Identity Finder for Enterprise

All data security is a balance of two principles- keeping bad guys away from target data, and decreasing the value of the target. As you store more sensitive information on your computers and networks, they become more valuable targets to hackers, viruses, thieves, spyware, botnets, dishonest insiders, physical intrusion, and social engineering.
Firewalls, anti-virus software, secure passwords, physical safeguards, laptop locks, and anti-spyware help you defend your perimeter, but it’s only a matter of time before a threat penetrates your system. Identity Finder decreases the value of the target data by finding and neutralizing sensitive information on computers, devices and networks.
Identity Finder performs in-depth searches of your data where it is stored. Identity Finder will search your hard drive and show you all of the locations with sensitive data. If you don’t need the file, you can permanently shred it.
If you need to keep a text file, but wish to redact the sensitive information inside it, just click the “Scrub” button. Identity Finder will automatically redact sensitive information, such as social security numbers or credit card numbers. Or you may quarantine or encrypt the file. Your information is now protected. Identity Finder searches and cleans all of the sensitive data at its source. You can rest easier knowing that you won’t have a data breach, should the computer ever be lost, stolen, or hacked.


Video: Software Security vs. Data Security

Holistic data security is when people and technology work together to protect customers and intellectual property. Data security is not a software product. Data Security is an attitude and a corporate culture where people know what information they need to protect. Data Security is when people know where the sensitive information is stored. And Data Security is when people have the right tools and training to protect sensitive information.
The built-in security of a software program is designed to let authorized people in, and keep unauthorized people out. But authorized employees regularly export information outside the application just to do their jobs. Once the information is outside the application, it can be saved, copied, emailed, printed, posted, stored, backed up and shared with any number of people. After it’s been copied to multiple places, malicious outsiders can more easily steal the information.
Application security is important, but insufficient. No software program can protect information once it’s been exported.
Identity Finder will search for all of the unauthorized copies of sensitive data across your entire network and give you the tools to delete the data. This can save you tens of thousands of dollars in audit and compliance costs.
Identity Finder does in-depth searches of your data where it’s stored. Identity Finder will search your hard drive and show you all of the locations with sensitive data.


Video: Verified HIPAA Compliance

Even if you use only HIPAA- compliant software applications, hospitals, healthcare systems, business associates and clinics can still violate HIPAA and have a breach. Protected Patient Health Information (PHI) and Electronic Health Records (EHR) is exported by employees each day, just to do their jobs. These unprotected Excel reports, PDF files and other copies sit on email servers, file servers and local computers completely unprotected, and are the source of 2/3 of all breaches.
Identity Finder for Healthcare will help you find all of the extraneous copies of PHI and EHRs through your entire enterprise network, and give you the tools to redact, encrypt, destroy, or quarantine the files.


Using Identity Finder for the First Time

Using Identity Finder for the first time is easy. Identity Finder’s powerful validation algorithms and intuitive interface allow you to find social security numbers, credit card numbers, passwords, usernames, email addresses, PCI data, HIPAA-protected PHI, and other personally identifiable information (PII) with the click of a button.
After you see how easy it is to use Identity Finder, you’ll want to check out Identity Finder’s more powerful features.


Video: Verified HIPAA Compliance

Surgeons, doctors, physicians, pharmacists billing managers, supervising radiologists, and managing nurses are allowed nearly unlimited access to subsets of PHI and often export various PHI fields from Health Information Systems to conduct analysis and issue reports.
These exported copies are never properly deleted and are the source of most PHI breaches. This use case demonstrates how a fictional, but representative healthcare system implemented Identity Finder to find copies of PHI and EHRs outside the secure health information system, and secure them before they became breaches.