Aiming to establish corporate compliance and identify sensitive information stored on the local and cloud repositories? P11Scanner is at your service.

P11Scanner is a XaaS AI-driven data scanner designed to assist corporate IT to mitigate security risks by identifying sensitive information within corporate and computing environments.

P11Scanner can identify sensitive information on cloud and domain repositories, domain nodes, and emails. Our advanced engine can quickly scan through any un-encrypted file formats to identify PI information.

  • Regulatory Compliance
  • Data Patterns Scanned
  • Scanning Capabilities

P11Scanner solution can address the following compliances.


GDPR HIPAA HITECH CIS Controls COPPA
PCI DSS SOX CISPASOX AICPA SOC2
NIST FedRAMP ISACA FERPA CCPA
GLBA FISMA ISO ITAR NERC CIP
Contact Us

P11Scanner scans the following data patterns


PI information Foul Language Image/Video Processing Semantic Analysis
CCN - Credit Card Numbers Cyber Bullying Facial Recognition ID text with sexual content
Bank Account Information SOXRace or Gender offenses Race or Gender offenses ID text with intimidating content
MRN - Medical Record Number Sexual Bullying and Harasment PII/PHI identification from images of credit cards, passports (any other personal identification document) and handwritten notes ID content categorized as harassment (sexual, physical, emotional)
HICN - Medicare Beneficiary's Identification Number
MBI - Medical Beneficiary Identity
Person Name
Private Address
Other PI types under PII and PHI
CONTACT US

P11Scanner process scans on un-archived repositories include


NFS Amazon S3 MS Exchange Node Drives
CIFS Azure Storage O365 Mobile Devices
SMB Google Storage Gmail Pro Slack and other
CONTACT US

Perfomance Calculator


Allocated Node 24 CPU, scanning 500GB of data takes 5 hours to process
To measure P11Scanner perfomance, enter:

Engagement Process

During this stage, P11
representatives
processing
engagement
documents
Engagement
Once pre-requisites
met, P11 personal
provides link to
download P11
docker and
documentation
Docker
Download
Scanning
repositories
paths and SA
entered, scanning
performed, data patterns identified
Scan and
Report
Generation
Client's IT
personal
issues VPN/SSH
access to P11
personal to finish setup
Remote
Access



Get estimate

P11 Team is in a process to initiate a campaign and starting the P11 XaaS public services on April 1st, 2020 | New feature, gmail-to-eml capabilities

Advantages


P11Scanner is an AI-Driven solution that helps you to mitigate risks by identifying unprotected sensitive data in the corporate environment.

Wide Regulatory Compliances Pattern Selection

P11Scanner allows full scanning of the files (images, movies, audio, any text, PDF, Excel, Word and Emails) to identify:

PI Information:

  • - CCN (Credit Card Numbers)
  • - BA (Bank Account Information)
  • - MRN (Medical Record Number)
  • - HICN (Medicare Beneficiary's Identification)
  • - MBI (Medical Beneficiary Identification)
  • - Personal Name
  • - Private Address
  • - Other information ID'd under PII/PHI

Foul Language:

  • - Intimidating words used in Cyber Bullying
  • - Race or Color Offensive
  • - Sexual Bullying and Harassment

Image/Video Processing:

  • - Facial Recognition
  • - Nudity Detection
  • - PII/PHI Identification from images of Credit Cards, Passports (Any Personal Identification Document), handwritten notes

Sematic Analysis:
(Identification of the “Feel” of the text based message)

  • - ID text message with sexual content
  • - ID text with intimidating content
  • - ID content categorized as harassment
    (sexual, physical, emotional)

Easy Deployment Process


P11Scanner is a solution designed to be deployed in minutes at the client’s computing environment via Docker Container. Docker is a platform for developers and sysadmins to build, share, and run applications with containers.

Minimum System Requirements (Recommended)
OS – Linux CPU CPU - 16 and up
RAM – 15GB and up Remote Access incl. ssh

Risk Mitigation and Reporting


P11Scanner configured to erase/replace and substitute any file containing PI.

P11Scanner configured to build a final report identifying the type and location of the PI violation, including the last date modified and last user access. Result delivery supported in widely used formats, including XLS, PDF, CSV, JSON, dmp files.

P11Scanner offers custom configuration patterns and reporting based on customer requirements.

18

Organizations

254

Scanned TBs

126

Scanned Hours

99.6%

Accuracy

48K

ID'd Threats