Data sources, platforms and repositories can constantly be found in more and more locations; nearly everywhere, in fact. As a result, today’s most pressing security challenges include locating your sensitive information as well as understanding its history.
COVERTIX’s Security Crawler provides a unique and valuable solution for your security needs. It not only locates sensitive information within your organization, but it can also make this information trackable, thus enabling you to gain an in-depth understanding of how data flows through your organization.
While other security crawlers available on the market are also able to locate information, only COVERTIX’s solution can accurately map the movement of specific files both within and outside the organization. Used together with COVERTIX’s endpoint security tools, our Security Crawler will uncover insights about the files that will help you determine who accessed them, what was done with them, where and when they were accessed and other issues.
No on-premises installation is needed.
Classifying data helps an enterprise organize and categorize it. Categorization can be done either by using an easily available default classification program or by using an enterprise’s already existing Data Loss Prevention (DLP) system.
The COVERTIX Crawler searches for data in any file share location and analyzes the data for compliance with your designated policies and rules. Policies can apply to metadata, such as author, category, department, etc., file data types, file size and location and data content. Files reaching your policy’s prescribed security threshold will be tagged. Once a file has been found to meet or exceed the threshold, it can be classified and treated in accordance with company policy. The files can either be designated and managed as “Discovered,” and not encrypted, or as “Active, and encrypted.
Files classified as “Discovered” are not encrypted, but are tagged with a classification and a non-encrypted policy. This information is then delivered to the COVERTIX Management Console, where an auditor or system administrator can generate a report detailing all the discovered data, the location of the file or files, whether in a path or folder structure, and what policy and classification has been applied. Since the files will not be encrypted, the Crawler’s ”Discovery” action will not prevent anyone from opening the file. Typically, this step precedes a full rollout that entails encrypting the files, particularly in large organizations.
If the Crawler search results in an “Active” designation, the file or files are encrypted, tagged with a classification and become subject to an encryption policy. COVERTIX uses a FIPS 140-2 AES 128/256 CTR bit algorithm to wrap and protect the body and metadata of the file in its entirety. The Crawler then adds a customized header to the file or files containing a Public key, a Policy key, a Content key and the policy name. The file keys and policies essentially become embedded in the file, remaining in it wherever it travels. This information is then delivered to the COVERTIX Management Console, where an auditor or system administrator can generate a report detailing all the critical information about the encrypted data, included the location of the file or files, whether in a path or folder structure, and what policy and classification had been applied. Encrypted files require a COVERTIX Sensor in order to be opened. Access will be determined in accordance with the company’s policy and the assigned keys.