If Personally Identifiable Information is discovered, the exact PII string is not written back to the Retina Network Security Scanner User Interface or Retina CS (will require version 4.5; coming soon). This is intentional. Consider recording the finding and spreading the discovered PII across the network (due to the Data Discovery itself) and storing it again in yet another solution. The Data Discovery process itself made the PII data leak situation worse. Instead, Retina provides full details of the filename and path and the type of content that was discovered. This is illustrated below: The Retina Network Security Scanner has solved the problem of data discovery in a more secure and efficient method than the most common tools on the market. Using the advanced dissolvable scanning capabilities of RLSS, a vulnerability assessment scan can now find sensitive data, report on the asset, and identify the file, path, and type of data discovered. This answers the question of where my sensitive data is at rest and helps meet regulatory initiatives that require the identification and protection of personally identifiable information. Watch the product video now > For more information on the Retina Network Security Scanner or Retina CS, please click here.
- Privileged Password Management
- Discover, manage, audit, and monitor privileged accounts
- Endpoint Privilege Management
- Manage privileges on Windows, Mac, Linux, and Unix endpoints
Universal Privilege Management
Our innovative Universal Privilege Management approach secures every user, asset, and session across your entire enterprise.