THANK YOU FOR SUBSCRIBING
Nuix Sensitive Data Finder 2.2 to Avert Data Breaches More Precisely and Faster
The Nuix Sensitive Data Finder 2.2 includes features that provide faster, more secure data management, powerful visualizations, query building and includes profiles and scripts

By
Apac CIOOutlook | Thursday, June 09, 2016
Stay ahead of the industry with exclusive feature stories on the top companies, expert insights and the latest news delivered straight to your inbox. Subscribe today.
FREMONT, CA: Nuix, a provider of cybersecurity software and solutions, announces the release of Nuix Sensitive Data Finder 2.2, an upgrade of the product that is designed to enhance its performance and efficiency. The new upgrade also includes analysis features and visualizations to better streamline routine tasks and identify high-risk information faster. With the Nuix Sensitive Data Finder 2.2 software, organizations can find, manage and protect data from data breaches and other security risks faster and more precisely.
The Nuix Sensitive Data Finder 2.2 includes features that provide faster, more secure data management, powerful visualizations, query building and includes profiles and scripts.
Check Out This : Managing MFG
Faster, more secure data management
Nuix Sensitive Data Finder now stores collected text in encrypted text files rather than database table entries. This improves database performance and scalability, and avoids creating a new source of business risk.
Powerful visualizations
Customers can quickly identify items and areas of greatest concern using visualizations that arrange search results by names of people and other extracted entities, timelines, statistics, relationships, access permissions, and other relevant criteria.
Query builder
Customers can create complex search queries using a simple interface and then save and reuse those queries across time, data sets, and repositories.
Profiles and scripts
Nuix Sensitive Data Finder comes with metadata profiles, filter criteria presets, entity definitions, and risk profiles to simplify or automate common searches. Customers can write scripts to apply risk ranking to responsive items.
“Complying with regulations around data privacy, personal information, and data breach notification is practically impossible unless you have comprehensive insights into what data you have, where it is, who has access to it, and what obligations you have toward managing it,” says Julie Colgan, Vice President, Information Governance Solutions at Nuix. “Unauthorized and poorly protected copies of sensitive data are a serious business risk and easy pickings for cybercriminals and malicious insiders.”