Critical Data Protection
Smartcrypt Data Discovery applies a rigorous sequence of rules in order to minimize the possibility of false positives or false negatives.
• Each time a file is added or modified, Smartcrypt receives a file change notification from the operating system.
• If the new or modified file is in a location Smartcrypt has been configured to protect, the agent initiates a discovery scan.
• The file contents are unpacked and extracted as text (extraction is to device memory rather than to disk).
• The Smartcrypt agent inspects the file contents and applies pattern identification logic (including fuzzy logic) to determine whether the file contains sensitive data as defined in the organization’s policies.
Smartcrypt can scan any form of unstructured data that can be extracted to text, including ZIP files, files whose extensions have been modified or removed, and file metadata.
Logistics of Things (LoT)
We live in a global economy where the connection to other individuals, communities, and industries are not always well-documented, publicized and understood. These connections impact every aspect of the products we buy and have come to rely on.
Just like how technologies such as the Internet of Things keep us in touch with one another, logistics connects people and businesses in ways that are constantly changing and growing.
Three Sixty provides an outside counter-intelligence and counterespionage perspectives on these connections and the risks they poise to your organization.