GDPR | HIPAA | HITECH | CIS Controls | COPPA |
PCI DSS | SOX | CISPASOX | AICPA | SOC2 |
NIST | FedRAMP | ISACA | FERPA | CCPA |
GLBA | FISMA | ISO | ITAR | NERC CIP |
PI information | Foul Language | Image/Video Processing | Semantic Analysis |
---|---|---|---|
CCN - Credit Card Numbers | Cyber Bullying | Facial Recognition | ID text with sexual content |
Bank Account Information | SOXRace or Gender offenses | Race or Gender offenses | ID text with intimidating content |
MRN - Medical Record Number | Sexual Bullying and Harasment | PII/PHI identification from images of credit cards, passports (any other personal identification document) and handwritten notes | ID content categorized as harassment (sexual, physical, emotional) |
HICN - Medicare Beneficiary's Identification Number | |||
MBI - Medical Beneficiary Identity | |||
Person Name | |||
Private Address | |||
Other PI types under PII and PHI |
NFS | Amazon S3 | MS Exchange | Node Drives |
CIFS | Azure Storage | O365 | Mobile Devices |
SMB | Google Storage | Gmail Pro | Slack and other |
During this stage, P11
representatives processing engagement documents
Engagement
|
Once pre-requisites
met, P11 personal provides link to download P11 docker and documentation
Docker
Download |
Scanning
repositories paths and SA entered, scanning performed, data patterns identified
Scan and
Report Generation |
Client's IT
personal issues VPN/SSH access to P11 personal to finish setup
Remote
Access |
P11Scanner is an AI-Driven solution that helps you to mitigate risks by identifying unprotected sensitive data in the corporate environment.
P11Scanner allows full scanning of the files (images, movies, audio, any text, PDF, Excel, Word and Emails) to identify:
PI Information:
Foul Language:
Image/Video Processing:
Sematic Analysis:
(Identification of the “Feel” of the text based message)
P11Scanner is a solution designed to be deployed in minutes at the client’s computing environment via Docker Container. Docker is a platform for developers and sysadmins to build, share, and run applications with containers.
OS – Linux CPU | CPU - 16 and up |
RAM – 15GB and up | Remote Access incl. ssh |
P11Scanner configured to erase/replace and substitute any file containing PI.
P11Scanner configured to build a final report identifying the type and location of the PI violation, including the last date modified and last user access. Result delivery supported in widely used formats, including XLS, PDF, CSV, JSON, dmp files.
P11Scanner offers custom configuration patterns and reporting based on customer requirements.
Organizations
Scanned TBs
Scanned Hours
Accuracy
ID'd Threats