Network wide data scanning & discovery

Identify non-secure storage of all sensitive data types across your organisation: including credit cards, bank accounts and other personally identifiable information.

The first stage of PCI DSS compliance is knowing if and where any unsecured credit card data is stored across your organisation. Credit cards are a primary target for data thieves and any data that is not protected by encryption can be costly in the event of a data breach.

Our data discovery tool was developed in co-operation with the payment card industry. It takes the guesswork out of knowing if your organisation is storing credit card data and gives complete visibility across your entire organisation, enabling you to prioritise resources and investment to achieve the best security outcome.

Bank account details are a primary target for identity thieves. Our data discovery tool can identify and secure customer bank account details stored on your systems.
If your business stores sensitive data like medical records, medicare numbers or other sensitive data types, you must ensure that this information is secure. Our data discovery tool will help ensure you comply with applicable privacy policies by ensuring that customer data is protected.
Personally identifiable information (PII) is any information that can be used to identify, contact or locate a single person. Our data discovery platform detects over 110 types of PII from over 50 countries.

Information such as Medicare numbers, pay slips, address details, emails, computer IP addresses and of course credit card information fall under the heading of PII. Any data stored of this nature, must not be able to be identified against an individual as this type of information is a primary target for identity thieves.

Employees often assume that by deleting sensitive information and emptying a recycling bin, that files are permanently deleted. This is not the case. This type of deletion is classified as ‘weak’ and can easily be restored by a determined hacker using readily available software.

“Secure Delete” ensures that any deletion of sensitive information is final, and unable to be recovered.

An alternative to permanently deleting files is to quarantine them in a secure location, whilst ensuring the file is deleted from its original location.
This option allows you to recover files from the secure location later.
Data masking allows personally identifiable information to be hidden from view so that it remains usable, but unable to be seen based on user permissions.

This type of masking can be useful when certain data fields need to be hidden from view or ensure that sensitive data isn’t leaked into non-production areas such as development and testing environments.

Secure a data file within its existing location through encryption. This moves the file into an AES encrypted zip file.
Emails and attachments containing sensitive data that are removed from Office 365 and other email clients are easily recovered. Advanced secure email and attachment deletion for these email clients ensures that sensitive files are unable to be recovered.
Protect sensitive data stored on-premise with IPSI’s advanced Level 1 PCI DSS certified cloud storage and tokenization solutions.


Click here to read more

Data security remediation

Have you found unsecured data? What next? Delete, encrypt, migrate, tokenize and secure unsecured data with our remediation tools.

Extensive scanning reach

Our Enterprise grade discovery tool is built to search an extensive range of operating systems, database servers, cloud systems and email servers.

Search multiple email client and server formats including:

  • Live Email Server Support
  • Search any Gmail, Lotus Notes email server
  • Includes ability to search individual user mailboxes
  • Live Exchange via MAPI including Delete Remediation
  • Office 365 Exchange via EWS including Delete Remediation
  • Existing automatic file-based detection of email on workstations and servers
  • Multiple mail client storage formats supported.

Our platform is built to search a wide arrange of target types including:


Cloud storage support

  • Google Drive, Calendar, and Tasks
  • Amazon (AWS) S3 storage and Microsoft Azure Storage
  • Dropbox, and Microsoft OneDrive for Office 365

Website storage support

  • Crawl any accessible URL path
  • Useful for corporate portals and intranets

Network scanning

  • Built-in native remote file sharing client
  • Configurable user credentials for different SAN / NAS devices
  • Ability to limit bandwidth usage