Identifying and finding personally identifiable information (PII)
Deep dive database analysis
A full-depth database extraction, PII data point recognition, indexing and analysis

Organisations worldwide need to be able to demonstrate to regulatory authorities that they have comprehensively appraised and are monitoring all the personal data in their possession. It is therefore an essential prerequisite for data law compliance that organisations establish, maintain and monitor a detailed inventory of their sensitive data and make it available for inspection by the required parties.

Are you seeking to build a searchable knowledge base of your sensitive data?

CONTACT US

Building a sensitive information knowledge base

Our database crawling, knowledge extraction and indexing technology creates enormous value by dynamically building knowledge bases to provide an essential foundation for GDPR compliance, database export, back-up, profiling, full-depth analysis and migration. DB crawl is capable of gathering and analysing information in hundreds of billions of rows of data in multi-terabyte size databases and organising it in a index for search and retreival.

Full-Depth Database Crawler

A deep dive database crawler that can be configured to crawl and extract the full content of your databases depending on your specific requirements. DBCrawl has been programmed to understand your requirement differences between Production, Test, and Development databases.


How we help our clients

Build and monitor your personal data -->

Ethel Intelligence Pipeline

For each entity type to be extracted, the Ethel Intelligence Pipeline selects the most appropriate entity extraction method for the best results from advanced statistical modeling, pattern matching and entity lists. DBCrawl can be configured to detect specific entity types for custom knowledge base building.


How we help our clients

Building your sensitive data inventory -->

Cryptographic Hash Function

A cryptographic hash function is an algorithm that can be run on data such as an individual file or a password to produce a value called a checksum. The main use of a cryptographic hash function is to verify the authenticity of a piece of data.


How we help our clients

Building your sensitive data inventory -->

Knowledge Base Indexer

A deep dive database crawler and indexing system equipped with configurable entity recognition and tokenisation technology to identify, extract and tokenise or encrypt personally identifiable information hidden in your databases and vast repositories of archive data.


How we help our clients

Building your sensitive data inventory -->

Engagement

Our engagements allow us work closely with you, your technical and data protection teams to understand your indexing requirements, and enables us to configure our technology to build a comprehensive inventory of your sensitive data and a foundation for subsequent compliance procedures.

Would you like to discuss your sensitive data indexing?