iDISCOVER

Locations - Code - User = Innovation & Compliance

Data SheetRequest Demo

iDiscover-Locations™
Included in the MENTIS Platform, iDiscover-Locations™ allows for discovery of sensitive data to the location level. iDiscover-Locations™ provides deep scanning of your enterprise databases to automate the search for all locations of sensitive data. MENTIS iDiscover-Locations™ is automated and repeatable so you can run on an ad hoc or a regular schedule to keep up with application and database changes.

iDiscover-Locations™, the catalyst of the MENTIS Platform™, has 4 basic steps: 1)CHOOSE a database; 2) CREATE the Template - selecting either standard or custom data classifications to be scanned; 3) RUN Discovery - an automated scanning of data discovery and data-simple scan code; and 4) REVIEW the Results - report on any sensitive data locations to document and better understand your company’s potential points of exposure.

iDiscover-Code™
Prevent compliance problems before source code is mgrated to production. iDiscover-Code™ provides a quick, dynamic review of code written into application access objects (such as forms, reports, and JSP, .Net, PL-SQL, etc.). Once sensitive data is uncovered, it’s often not clear how the sensitive data found it’s way to that particular table. MENTIS iDiscover-Code™ identifies all source code that uses sensitive data. iDiscover-Code™ also acts as your security acceptance test -- by scanning all code before it enters production and alerting you when sensitive data is being used.

A valuable compliance and pre-production step, iDiscover-Code™: determines if a piece of code could inappropriately expose users to sensitive data; classifies all data affected by the code so it can be compared to both the legislative and the compliance requirements; reviews source code automatically in all application access objects; provides templates that compliance can customize to any law applicable to your organization; and works with both old and new code, creating a comprehensive digital library of your source code.

Compliance code from development to production - Automatically.

iDiscover-User™
This optional iDiscover™ option tracks users with access to sensitive data and reports specific users access to sensitive data. Often, sensitive data reveals itself in unexpected places, iDiscover-User™ creates a safe-guard against the unique and unpredictable instance of sensitive data being visible by unauthorized individuals and in unexpected situations. iDiscover-User™ can run a source code to determine if any sensitive data is present - if no code shows up, the “User” will help identify where to “look” or where the vulnerability actually exists.