Security Audits
Find, manage and secure PII, PSTs and sensitive content

User generated content accounts for much of the sensitive data hidden in corporate data centers. Users can easily attach documents containing social security or credit card numbers to emails. Client credit reports can be inadvertently saved on hard drives and shared across the network. Patient medical records can be archived on legacy backup tapes without anyone knowing it. Over time sensitive content containing personally identifiable information (PII) is everywhere and available and it can easily escape the firewall during a data breach or theft. PSTs are also a source of security and legal challenges. Users can easily create mini-archives of email using PSTs and store them on the network without anyone knowing they exist. Sensitive content in documents and email pose a hidden liability that could cause future pain and expense when litigation arises.

Additionally, normal working files that are sensitive in nature are generated daily as part of normal business operations. These documents can easily be shared and copied across desktops and servers, and can carelessly be shared with those who should not have permission to access and view the content.

Index Engines supports the search and reporting on ACLs (access control lists) and the metadata surrounding file permissions and who has access to those files. This metadata is critical in supporting security and legal efforts by providing a granular view into permission and security of sensitive content. Index Engines supports indexing of ACL reporting on users read, write and browse permissions of data.

Securing and managing sensitive content containing PII and files accessible by unprivileged eyes is a major challenge for any security professional. Index Engines makes it easy to find, report and manage sensitive data in corporate networks, enterprise email and even legacy backup tapes through support of pattern and regex searches, and indexing of ACLs. Regardless of where it is, Index Engines can find it, manage it based on stored policies, and even archive it for secure and safe management.