+90 (216) 599 00 50 / +90 (312) 265 00 72

Veriket Discovery Tool

Identify, Classify, and Protect Sensitive Data in Your Organization

Challenges of Data Distribution

Sensitive data resides in various environments such as computers, file-sharing platforms, email systems (Exchange, Outlook), and cloud services. Organizing, securing, and monitoring this data is a critical need. Managing file and folder access permissions manually is both cumbersome and time-consuming. Additionally, complying with legal standards such as PII, PHI, and PCI requires identifying not only structured data but also unstructured data.
Veriket helps organizations identify their sensitive data, analyze its usage, and take preventive measures against data breaches with its data discovery capabilities.

What is the Veriket Discovery Tool?

The Veriket Discovery Tool scans both structured and unstructured data to detect sensitive information across the following platforms:

  • Personal Computers (PCs)
  • File-Sharing Platforms
  • Email Systems (Exchange, Outlook, Gmail, OWA, Zimbra)
  • Cloud Services (Google Drive, OneDrive, Office 365, SharePoint)
  • Database Systems

Scanning processes can be run in batches, and the results are presented in detailed reports. These reports include information such as the location, type, handlers, and last accessed time of the files.

Key Advantages

  1. 1. No Additional Hardware Required
    • Managed centrally via the Veriket Management Console without the need for servers or additional hardware.
  2. 2. Automatic Data Classification
    • Automatically classifies files based on their content and location.
  3. 3. Centralized Policy Management
    • Securely controls structured and unstructured data pools through centralized management.
  4. 4. Online and Offline Support
    • The tool works seamlessly in environments with or without internet connectivity.
  5. 5. Fully Compatible with All Platforms
    • Compatible with Windows, Linux/Pardus, and Mac operating systems.
  6. 6. High-Performance Scanning
    • Scans data at a rate of 5 GB per minute using multi-threading technology.
  7. 7. Resource Management
    • Allows CPU usage to be limited during discovery; for example, it can be configured to use a maximum of 50%.
  8. 8. Integration with DLP and DRM Solutions
    • Integrates with DLP and DRM solutions to protect sensitive data.
  9. 9. Cloud-Based Deployment
    • Can be used via the SaaS model when needed.
  10. 10. Solution for Group Companies
    • Allows independent management of multiple subsidiaries from a single center (Tenant Management).
  11. 11. Scheduling and Tagging
    • Scans can be scheduled for specific dates and tags can be added to files simultaneously.
  12. 12. Remote Scanning Capabilities
    • Performs remote scans without installing agents on devices using FTP, SFTP, SSH, SMB protocols.
  13. 13. OCR Technology
    • Analyzes visual documents to identify text-based content.
  14. 14. Compressed File Support
    • Performs content analysis by scanning compressed files such as RAR, ZIP, 7ZIP, including all sub-levels.
  15. 15. Dynamic Tagging
    • Adds dynamic text (e.g., machine name, username, sensitivity level) to MS Office or PDF documents via headers/footers and watermarks.
  16. 16. Data Backup and Encryption
    • Ensures critical sensitive files are backed up and encrypted.
  17. 17. Data Masking
    • Applies masking to sensitive data when logged to ensure protection.
  18. 18. Error Detection
    • Detects potential typos in documents through syntax checking.
  19. 19. Control of Discovery Processes
    • Enables real-time management of scanning processes with Start, Stop, and Cancel options.

Conclusion

The Veriket Discovery Tool enables organizations to quickly, effectively, and securely identify, classify, and protect their sensitive data. Its user-friendly interface, high-performance scanning speed, and advanced features simplify your data security processes and provide centralized management capabilities.

Hemen Bilgi Alın