PK Discovery


Where Sensitive Data Resides

Personal data is everywhere: on-premises and in the cloud, from file servers and databases to data warehouses and data lakes, to individual desktops and endpoints. Data is also shared among employees and partners, which means the same personal information may be stored in multiple repositories. Finding personal and sensitive data quickly, accurately, and completely is often more difficult than it appears.

Integrated Discovery for Improved Protection

Companies today gather so much data that it is virtually impossible to understand what sensitive data is in their possession without the help of an automated discovery solution. PKWARE and Dataguise have joined together to offer:

Icon designExtensive
Platform Support

Supported discovery for the most widely used data repositories.

Icon designOn-Demand

Run discovery scans continuously or scheduled at specific dates and times for different processes.

Icon designExecute
Retention Policies

Create rules to classify, archive, delete, or move data based on data type, last accessed, age, and more.

Icon designHighly

Discover on high volumes and/or high velocities of data.

Icon designMachine

Find information that may be semantically ambiguous using context and machine learning.

Icon designUncover
Hidden Data

Ensure sensitive data is continually identified as more data is amassed.

Icon designRisky

Locate identifiers, pseudo-identifiers, and quasi-identifiers.

Icon designContext
of Error

Minimize false-positives andeliminate false-negatives.

Icon designSensitive

Scan for pre-defined or unique sensitive types, and collect unique counts of impacted identifiers for breach reporting

Section design figure

Fast and Simple

No extensive integration or professional services work required to get started. PK Discovery doesn’t require a single line of code, and can deliver fine-grained and aggregated optics into what sensitive data you have and where it resides in minutes.

Integrate with

Knowing where data resides is a start. PK Discovery can find information stored on file servers, big data repositories, databases, endpoint devices, and across the enterprise. It then integrates with additional capabilities to encrypt, mask, redact, or otherwise remediate sensitive information.

Policy Enforcement

Continuously monitor endpoints, servers, and enterprise solutions for sensitive information. PK Discovery initiates regular scanning based on your organization’s definition of sensitive data. If the data fits a defined pattern, the system can automatically initiate the next steps.

PK Masking
Section design figure

PK Discovery in Action

watch now
Frequently Asked Questions
Yes. PK Discovery uses machine learning in instances where an expression is not enough, for instance in regard to managing global addresses with differing structures.
PK Discovery supports Windows, Mac, and Linux desktops, laptops, and servers, as well as wide platform support. While PK Discovery currently does not discover on mobile devices, PK Classify and PK Encryption are compatible with iOS and Android.

See a Customized Demo

Reach out and a PKWARE data security expert will help you take the fundamental first step of finding sensitive data within your organization. 

Request a Demo

Explore the PK Protect Suite

Data discovery and protection solutions that locate and secure sensitive data
Identify & Classify Sensitive Data
Find data wherever it lives in the enterprise
Categorize data for tagging and reporting
Learn More
Irreversible yet auditable protection
Learn More
File encryption for both protection and analytics
Learn More
Manage retention policies and fulfill DSAR
Learn More