View all newsletters
Receive our newsletter - data, insights and analysis delivered to you
  1. Technology
  2. Software
September 19, 2008

Identity Finder launches data leakage prevention products

Identity Finder, a provider of security and privacy technologies, has released version 3.5 of Identity Finder Enterprise Edition and its newest product, Identity Finder Monitoring Console.

By CBR Staff Writer

Developed to address the needs of small and large organizations, Identity Finder Enterprise searches computers for Personally Identifiable Information (PII) and helps employees clean the data it uncovers, protecting themselves and their employers from confidential data loss.

According to the company, one of the biggest challenges to preventing data leakage is discovering all the places data exists. It can easily become buried anywhere on a computer such as within a hidden column in a spreadsheet from years ago. To meet this challenge, Identity Finder has launched a new Monitoring Console product and updated their Enterprise Edition. Identity Finder Enterprise searches users’ files, e-mails, hidden web browser data, and other system areas on desktops, servers, databases, websites, and other remote computers.

The company claims that using proprietary search algorithms to automatically locate PII regardless of format and syntax, Identity Finder can locate huge repositories of social security numbers, credit and debit cards, bank accounts, passwords, dates of birth, and telephone numbers. After it locates sensitive data that could lead to identity fraud, Identity Finder assists users with permanently shredding, redacting, encrypting, or quarantining the unprotected information.

The Monitoring Console provides a centralized, enterprise view and dashboard into all PII results, allowing administrators to report on their risk posture and ensure that employees are taking action to clean their systems, said Identity Finder.

Todd Feinman, CEO of Identity Finder, said: Organizations can no longer rely on simple anti-virus suites to protect information as there are an ever increasing number of threats that steal personal data – from viruses, worms, and Trojans to spyware, botnets, and malicious web application exploits. Even file sharing programs, voluntarily installed by many individuals, have become a large source of data loss and full hard disk encryption cannot protect against sensitive data exposure in these scenarios. Tools such as Identity Finder are required.

Content from our partners
How businesses can safeguard themselves on the cyber frontline
How hackers’ tactics are evolving in an increasingly complex landscape
Green for go: Transforming trade in the UK

Websites in our network
Select and enter your corporate email address Tech Monitor's research, insight and analysis examines the frontiers of digital transformation to help tech leaders navigate the future. Our Changelog newsletter delivers our best work to your inbox every week.
  • CIO
  • CTO
  • CISO
  • CSO
  • CFO
  • CDO
  • CEO
  • Architect Founder
  • MD
  • Director
  • Manager
  • Other
Visit our privacy policy for more information about our services, how New Statesman Media Group may use, process and share your personal data, including information on your rights in respect of your personal data and how you can unsubscribe from future marketing communications. Our services are intended for corporate subscribers and you warrant that the email address submitted is your corporate email address.
THANK YOU