apacciooutlook logo

Nuix Sensitive Data Finder 2.2 to Avert Data Breaches More Precisely and Faster

Thursday, June 9, 2016

content-image

FREMONT, CA: Nuix, a provider of cybersecurity software and solutions, announces the release of Nuix Sensitive Data Finder 2.2, an upgrade of the product that is designed to enhance its performance and efficiency. The new upgrade also includes analysis features and visualizations to better streamline routine tasks and identify high-risk information faster. With the Nuix Sensitive Data Finder 2.2 software, organizations can find, manage and protect data from data breaches and other security risks faster and more precisely.

The Nuix Sensitive Data Finder 2.2 includes features that provide faster, more secure data management, powerful visualizations, query building and includes profiles and scripts.

Faster, more secure data management

 Nuix Sensitive Data Finder now stores collected text in encrypted text files rather than database table entries. This improves database performance and scalability, and avoids creating a new source of business risk.

Powerful visualizations

Customers can quickly identify items and areas of greatest concern using visualizations that arrange search results by names of people and other extracted entities, timelines, statistics, relationships, access permissions, and other relevant criteria.

Query builder

 Customers can create complex search queries using a simple interface and then save and reuse those queries across time, data sets, and repositories.

Profiles and scripts

Nuix Sensitive Data Finder comes with metadata profiles, filter criteria presets, entity definitions, and risk profiles to simplify or automate common searches. Customers can write scripts to apply risk ranking to responsive items.

“Complying with regulations around data privacy, personal information, and data breach notification is practically impossible unless you have comprehensive insights into what data you have, where it is, who has access to it, and what obligations you have toward managing it,” says Julie Colgan, Vice President, Information Governance Solutions at Nuix. “Unauthorized and poorly protected copies of sensitive data are a serious business risk and easy pickings for cybercriminals and malicious insiders.”

Leaders Speak

Andy Nallappan, VP & CIO,

The Industry Demands Quick Upgrade into Cloud

By Andy Nallappan, VP & CIO,

Global Information Technology, Avago Technologies

Steven Weinreb, CIO & EVP, Technology & Operations, Asia, MetLife

Embracing Advanced Tech-enabled Solutions that Foster Innovation and Growth

By Steven Weinreb, CIO & EVP, Technology & Operations, Asia, MetLife

Anil Khatri,

Trends that are on Every CIO's Watch-list

By Anil Khatri,

Head IT-South Asia,

SAP

James F. Hanauer, CTO, VP Engineering and Art Saisuphaluck, Solutions Architect, R&D Lead, CTSI-Global

Simplifying Infrastructure Management with Microsoft Solutions

By James F. Hanauer, CTO, VP Engineering and Art Saisuphaluck, Solutions Architect, R&D Lead, CTSI-Global

Mickey Bradford, VP-IT/CTO, Exchange; & Jay McCartin, VP-Logistic Operations,  Army & Air Force Exchange Service

Embracing Cloud Hosting Benefits

By Mickey Bradford, VP-IT/CTO, Exchange; & Jay McCartin, VP-Logistic Operations, Army & Air Force Exchange Service

Featured Vendors