STEALTHbits’ sensitive data criteria editor is flexible and robust, providing direct access to hundreds of preconfigured criteria sets that can be copied or customized, as well as created from scratch to accommodate keywords and patterns specific to your organization.
After sensitive data has been identified, automated tagging and integration with alternative solution providers is available to keep your classifications persistent.
Sensitive data can exist virtually anywhere in an organization – in shared repositories like file shares and SharePoint sites, O365, Dropbox accounts, Exchange mailboxes, SQL and Oracle databases, and even desktop and server infrastructure.
With the ability to scan the contents of over 400 different file types, as well as databases, STEALTHbits provides the broadest visibility into all the most common places sensitive data exists.
When responding to Data Subject Access Requests (DSARs) or needing to know where a particular type of sensitive data exists, STEALTHbits’ makes searching your sensitive data results as easy as your favorite internet search engine.
Find everywhere your match exists across all scanned repositories along with who has access, how, and who has accessed the data.