PLAYBOOKS

Templated workflows for things like HIPAA privacy breach response, de-identification, and unauthorized access response.

SENSITIVE DATA DEFINITIONS

Customized data definitions for common sensitive data discovery requirements.

COOL SOLUTIONS

Creatively configured use cases that include step-by-step instructions to help you set them up in your product.

CUSTOM REPORTS

Custom-designed reports you can import into your platform and edit to your specifications.

Integrations


Cloud Access Security Brokers (CASBs)

Provide visibility, compliance, security, and threat detection to a growing number of organizations that are embracing cloud technologies, either out of necessity or as a way to leverage Cloud’s scalability and flexibility
Bitglass
Microsoft Cloud App Security

Cloud/SaaS ISVs Data Sources

Cloud locations where data - both structured and unstructured – can be operated on, manipulated, or mined directly within the cloud platform
O365
Salesforce (via ODBC)

Data Loss Prevention (DLP)

Prevent sensitive data from being shared with unsanctioned users
McAfee DLP
Symantec DLP

Micro-Segmentation

Establishes multiple trust boundaries at an extremely fine level of granularity
Unisys Stealth

Privacy Management (PM)

Ensures data is only used for its intended purposes by the intended people
Tonic

Rights Management

Determines who can access data, when they can access it, and from where
Atakama
Microsoft AIP/MIP
Seclore Rights Management

Security Information and Event Management (SIEM)

Manage workflow, deliver real-time analysis of security alerts, and support against attacks
AT&T Cybersecurity (AlienVault)
PaloAlto Networks
Splunk

Structured Data Sources

Databases Spirion can access and scan
IBM Db2
IBM Informix
Microsoft SQL
MongoDB
MySQL
Oracle
PostgreSQL
SQL Anywhere
SQLBase
SQLite

Unstructured Data Sources

Cloud locations where users can store and share files of all types
Box
Dropbox
Google Workspace (formerly G Suite)
OneDrive
SharePoint