Innovative Data Governance Software

Do you have large stores of text documents built up over time? Do these documents contain sensitive customer or employee information or your precious intellectual property? Do you know which files and folders contain these files? Are your Active Directory permissions and groups complex and layered from many revisions and different approaches? Are you worried about insiders scouting out the documents inside your network? Rolling out Azure Information Protection (AIP)?

The Getvisibility Focus product uses Deep Learning AI for data classification, risk analysis, anomaly detection and alerting. Get visibility of your sensitive data automatically, and track new data as it is created, including on end-user devices. We also use blockchain for unstructured data lineage, allowing you to provide trusted proof of your data governance.

Selected Customers

Discovery, classification and risks

Discovery of sensitive data is a crucial first step and we scan local, shared, and cloud storage as well as portable media connected to end-user devices. This captures all activity in your organisation. We classify using pre-trained, highly mature machine-learning models for your industry and can apply your own keywords and terms. Our classification is unmatched across any industry and requires the lowest support from your time.

In addition, the Getvisibility Focus platform also includes Active Directory scanning and integration to the detailed logs to then combine the sensitivity level of the text data with the access levels by accounts to reveal risks and vulnerabilities in real time (data in motion).

Are you rolling out Microsoft Azure Information Protection and want to ensure all the sensitive data is correctly tagged? Then use our AIP integration and push those sensitive files into AIP automatically.

Blockchain and data lineage

Getvisibility's Blockchain solution builds data lineage ancestry lines for unstructured text data and stores all edits in an immutable, distributed audit log using blockchain technology. This enables controlled sharing of information about your companies internal data governance processes with external parties to build trust or prove compliance. This has many other applications too such as M&A due diligence or auditing where it is important to prove your security posture to an external party, or forensic investigations and tracking of leaked data, or proactive identification of vulnerabilities and internal procedures.

Data Lineage is a powerful forensic tool that allows companies to track the ancestry of any file created inside their perimeter. We provide granular tracking of individual edits to sensitive documents in real-time and build data lineage history graphs for these files across all devices, cloud providers and network storage providers. Imagine having the ability to track the edits and movements of highly sensitive documents across your organisation.

Deep learning and GDPR

GDPR addresses data in all places in an organisation. Electronic data can exist on centralised servers and ERP platforms but also as text data in many other, de-centralised and unmonitored locations such as laptops, phones and workstations. The Getvisibility Focus platform scans all servers, PCs, and even mobile phones to identify and classify files stored and also newly created. This is critical for a comprehensive and complete view of potentially sensitive information, vital for GDPR compliance and tracking.

We use machine learning to optimise deep neural networks for fast and very accurate classification. The software checks every file to identify any Personal Identifiable Information (PII) and creates a confidential registry for each entity found. It has never been so easy to process a subject access request. Any channel of communication that involves the transfer of PII data is now fully controlled and transparent.

Anomalous activity detection

As each user in your organisation accesses files during the day they establish a baseline of activity. Over time this baseline becomes representative of normal behaviour. By checking for anomalies to this pattern using a neural network and integrating activities across devices, monitoring access to sensitive data, and interfacing to network elements such as firewalls we are able to build a big picture view of activity across your organisation.

Our neural networks discover anomalies representing possible failures, attacks or malicious attempts to leak your data in real time. You can configure the platform to log, alert or even intervene and block these attempts. Specific events such as sensitive file modifications are tracked and can be pushed to your central logging or monitoring system.

No other platform combines this integrated view of events across so many elements of your infrastructure based on detailed knowledge of your unstructured data in this way.

Discovery, classification and risks

Discovery of sensitive data is a crucial first step and we scan local, shared, and cloud storage as well as portable media connected to end-user devices. This captures all activity in your organisation. We classify using pre-trained, highly mature machine-learning models for your industry and can apply your own keywords and terms. Our classification is unmatched across any industry and requires the lowest support from your time.

In addition, the Getvisibility Focus platform also includes Active Directory scanning and integration to the detailed logs to then combine the sensitivity level of the text data with the access levels by accounts to reveal risks and vulnerabilities in real time (data in motion).

Are you rolling out Microsoft Azure Information Protection and want to ensure all the sensitive data is correctly tagged? Then use our AIP integration and push those sensitive files into AIP automatically.

Blockchain and data lineage

Getvisibility's Blockchain solution builds data lineage ancestry lines for unstructured text data and stores all edits in an immutable, distributed audit log using blockchain technology. This enables controlled sharing of information about your companies internal data governance processes with external parties to build trust or prove compliance. This has many other applications too such as M&A due diligence or auditing where it is important to prove your security posture to an external party, or forensic investigations and tracking of leaked data, or proactive identification of vulnerabilities and internal procedures.

Data Lineage is a powerful forensic tool that allows companies to track the ancestry of any file created inside their perimeter. We provide granular tracking of individual edits to sensitive documents in real-time and build data lineage history graphs for these files across all devices, cloud providers and network storage providers. Imagine having the ability to track the edits and movements of highly sensitive documents across your organisation.

Deep learning and GDPR

GDPR addresses data in all places in an organisation. Electronic data can exist on centralised servers and ERP platforms but also as text data in many other, de-centralised and unmonitored locations such as laptops, phones and workstations. The Getvisibility Focus platform scans all servers, PCs, and even mobile phones to identify and classify files stored and also newly created. This is critical for a comprehensive and complete view of potentially sensitive information, vital for GDPR compliance and tracking.

We use machine learning to optimise deep neural networks for fast and very accurate classification. The software checks every file to identify any Personal Identifiable Information (PII) and creates a confidential registry for each entity found. It has never been so easy to process a subject access request. Any channel of communication that involves the transfer of PII data is now fully controlled and transparent.

Anomalous activity detection

As each user in your organisation accesses files during the day they establish a baseline of activity. Over time this baseline becomes representative of normal behaviour. By checking for anomalies to this pattern using a neural network and integrating activities across devices, monitoring access to sensitive data, and interfacing to network elements such as firewalls we are able to build a big picture view of activity across your organisation.

Our neural networks discover anomalies representing possible failures, attacks or malicious attempts to leak your data in real time. You can configure the platform to log, alert or even intervene and block these attempts. Specific events such as sensitive file modifications are tracked and can be pushed to your central logging or monitoring system.

No other platform combines this integrated view of events across so many elements of your infrastructure based on detailed knowledge of your unstructured data in this way.

The solution

Deploy our software in your network, or in your cloud, or use our private cloud. Use the powerful user interface for viewing the data found. Integrate to your Active Directory, AWS IAM or LDAP PAM system and we will identify dangerous user accounts and inactive accounts. Find the top risks whether files, shares or users easily and intuitively or generate new reports.
Our intelligent cloud automatically learns and distributes machine learning models keeping you up to date. This is a unique feature and allows us to set a new standard on classification accuracy.
Activate detailed logging on your Active Directory or allow us to access your CloudTrail logs and we can monitor regular activity and alert you to anomalous behaviour in real-time.
We can also integrate to your SIEM (such as QRadar) or OSS (such as ELK or Splunk) for real time alerting.

Award-Winning Data Governance Software

Excellence logo

Highly innovative
and distruptive SME
2018

ei_logo

High Potential
Start-Up
2017

ai awards logo

Best Application of
AI in a Startup
2018

it cork

Tech Startup
of the year
2018