Identity Finder, a provider of security and privacy technologies, has released version 3.5 of Identity Finder Enterprise Edition and its newest product, Identity Finder Monitoring Console.
Developed to address the needs of small and large organizations, Identity Finder Enterprise searches computers for Personally Identifiable Information (PII) and helps employees clean the data it uncovers, protecting themselves and their employers from confidential data loss.
According to the company, one of the biggest challenges to preventing data leakage is discovering all the places data exists. It can easily become buried anywhere on a computer such as within a hidden column in a spreadsheet from years ago. To meet this challenge, Identity Finder has launched a new Monitoring Console product and updated their Enterprise Edition. Identity Finder Enterprise searches users’ files, e-mails, hidden web browser data, and other system areas on desktops, servers, databases, websites, and other remote computers.
The company claims that using proprietary search algorithms to automatically locate PII regardless of format and syntax, Identity Finder can locate huge repositories of social security numbers, credit and debit cards, bank accounts, passwords, dates of birth, and telephone numbers. After it locates sensitive data that could lead to identity fraud, Identity Finder assists users with permanently shredding, redacting, encrypting, or quarantining the unprotected information.
The Monitoring Console provides a centralized, enterprise view and dashboard into all PII results, allowing administrators to report on their risk posture and ensure that employees are taking action to clean their systems, said Identity Finder.
Todd Feinman, CEO of Identity Finder, said: Organizations can no longer rely on simple anti-virus suites to protect information as there are an ever increasing number of threats that steal personal data – from viruses, worms, and Trojans to spyware, botnets, and malicious web application exploits. Even file sharing programs, voluntarily installed by many individuals, have become a large source of data loss and full hard disk encryption cannot protect against sensitive data exposure in these scenarios. Tools such as Identity Finder are required.