Smartcrypt Data Discovery
Find, protect, and control sensitive data
As enterprise data volumes continue to increase, cloud services and mobile devices are fundamentally changing the way we store and access information. With each step we take into our new digital environment, we create new opportunities for sensitive information to fall into the wrong hands.
Traditional solutions like network and device security are all but obsolete when an organization’s network is the internet itself. A new approach to information security—based on intelligent data discovery and persistent data encryption—is the key to remaining secure and competitive in a rapidly-changing world.
Until now, however, data discovery technology has provided limited value to the companies that use it. Discovery products that simply generate lists of files containing sensitive data leave organizations searching for additional solutions that can actually protect the information.
Integrated discovery and encryption
PKWARE’s Smartcrypt combines data discovery and encryption into a single workflow, making it easier than ever before to find and secure your organization's critical data. Whether sensitive information is stored on file servers or user devices, Smartcrypt can identify and encrypt it as soon as it appears, ensuring that only authorized users will be able to access it.
When discovery is integrated with encryption, each process becomes more effective and easier to manage. Discovery becomes more than a simple reporting function, and encryption can be automated, eliminating extra steps and the possibility of human error.
How it works
Smartcrypt uses a software agent to continuously monitor storage locations for sensitive information. Each time a file is added or modified, Smartcrypt initiates a scan based on the organization’s definition of sensitive data. If the data fits one of the defined patterns, the system can apply encryption using a pre-defined encryption key. Smartcrypt also provides the option to remediate data by deletion.
Data discovery can be configured to monitor network storage locations and employee devices like laptops and tablets. The discovery and encryption process is transparent to end users, while PKWARE’s Smartkey technology ensures that the organization maintains complete control over encryption activity.