Streamlining Each Step of
Data Breach Response

Improve accuracy and meet notification deadlines with Canopy Software.

dbr-process-horiz

Canopy is purpose-built for every phase.

When a data security incident occurs, breach response teams must first race the clock to determine whether it is legally considered a breach. If so, they must meet strict, non-negotiable notification deadlines enforced by GDPR, HIPAA, FERPA, and other data privacy regulations.

Powered by AI and machine learning, our patented cybersecurity software reduces the time, cost, risk, and effort associated with the defensible detection of sensitive data by streamlining data breach response at every step, from Process through to Notification.

icon-process-white-50

PHASE ONE

Process

Canopy Software is purpose-built to detect personally identifiable information (PII) in any data set, from emails and text documents to spreadsheets, PDFs, and many other file types.

As soon as a data set is uploaded, the software immediately scans it, unpacks and categorizes the files, and classifies the PII — no prior data normalization necessary.

Canopy often completes processing within hours, then generates an Impact Assessment Report that provides an overview of the data set, including the types and quantities of found PII elements and which documents contain them.

PHASE TWO

Assess

Say goodbye to data mining via regex and keyword searches. Instead, harness the full power of AI and machine learning to do the data breach assessment for you.

Canopy Software is continuously trained to hone in on hundreds of different PII types, providing what you need to determine whether your security incident is considered a data breach. If so, it also enables you to efficiently focus your review team's efforts.

With Canopy, most data sets can be assessed by just one person in a fraction of the time it would take an entire team of people using ediscovery methods — and the results will be more accurate, too.

icon-assess-white-50
icon-review-white-50

PHASE THREE

Review

Canopy Software helps review teams work significantly faster and decreases the risk of human error.

Once you upload your entity list into Canopy, the software immediately begins making connections between each identified person and the PII detected in your data set. As reviewers click through documents, PII elements are clearly highlighted and related people are suggested.

And as Canopy learns about the specific project, its machine learning turns the process into a simple "accept or reject" workflow, eliminating the need to copy-and-paste data into spreadsheets.

PHASE FOUR

Consolidate

Forget about spreadsheets and SQL — Canopy Software's advanced entity management functionality takes the heavy lifting out of entity resolution.

In addition to automatically deduplicating identical people within an entity list, Canopy also suggests merging entities when people have the same unique personal identifier but minor conflicts, as might be seen with nicknames or maiden names.

icon-consolidate-white-50
icon-notify-white-50

PHASE FIVE

Notify

The ultimate deliverable of any data breach response project is a consolidated list of unique affected individuals and their compromised PII.

Canopy consolidates all of this information as reviewers work so that as soon as QA is complete, your list is ready to export. And because certain jurisdictions and industries have specific notification requirements, Canopy provides export options to meet your unique needs.

Ready to speed up your data breach response?

Download Canopy's Guide to Effective Data Breach Response for a more detailed look at this process, or request your personalized demo to see how our AI-powered solution can transform your workflow.