Close this search box.

Data Hound™
Risk Assessment

Every organization is holding some level of risk in their data

Personal information in unsecured environments, highly sensitive corporate information leaving the building on laptops; these are not just potentially expensive breaches of the General Data Protection Regulation, but it could be a very embarrassing headline in the national newspaper that costs a loss in customer confidence and market capitalization.

Data Hound™ Risk Assessment - Score Card

The initial driver for most Data Identification Manager™ users is to determine what kind of documents they have, what they should be concerned about, and subsequently what they should do with the various results found.

We have created this Privacy Assessment score-card to give you a summary of the data that resides in shared repositories.

How do we do it?

Through our years of experience, it has become evident that the Document Type of a record will drive many of these concerns and the actions taken to secure sensitive information. Each Document type will have a level of risk associated with it based on the usual contents of that document type.

By using Machine Learning to identify the document type, the usual level of risk, whether that document type tends to contain PII, and analyzing the file location, we can create a Document Profile and score. Using these profiles and machine learning within the Data Identification Manager™ tool, each repository can be scanned and have a score determined. Using these outputs, the business you can make a meaningful correlation to the document type profile of Security, Sensitivity, Personal Data, and ROT.

The remainder of the report includes a Content Analysis Report with graphs for:

The remainder of the report includes
a Content Analysis Report with graphs for:

The number and % of files that are secret/classified/internal/unclassified

The number and % of files with PII

ROT stats

Learn More About Data Hound™
FREE Risk Assessment Now


After the scan is complete, you will receive your results by repository with a breakdown per repository.

You will also receive recommendations that may include things like:

  • Configuring your infrastructure
  • Conduct initial and full-text scans of all repositories
  • Move unprotected content to a controlled environment
  • Conduct a Privacy Review

Each recommendation will include steps to follow in order to complete the task.

Ready to Take the Next Step?

Contact us for the FREE Data Hound
download tool to get started.