Canopy Data Breach Response Software Enhances User Experience and Versatility via Broader Support for UK Data and Specialized Detection
Canopy Software, Inc., the data mining and protected-data discovery software developer, announced the release of several new features to simplify clients’ data breach response efforts across diverse and complex data sets. With this series of enhancements to the purpose-built application, Canopy improves user experience during specialized projects and it is poised to adapt to fluid circumstances, such as changes to the United Kingdom’s membership in the European Union and GDPR protections, new and evolving privacy laws, and review teams working remotely in the wake of infectious disease crises.
Canopy is used by cyber forensics teams, document reviewers, and other managed service providers to accelerate breach responses and conclusively identify the individuals who have been affected by a corporate data breach.
“While Canopy clients have benefited from the purpose-built nature of our application since day 1, the enhancements we are making this year demonstrate a new level of maturity in the product,” said Oran Sears, co-founder and chief technology officer for Canopy Software. “We continue to make leaps and bounds in the efficiencies gained by review teams as they make sense of vast amounts of breached data, but these latest tools show an ability to flex and morph to very unique and complex circumstances and still achieve those same efficiencies.”
While Canopy already includes broad support for data elements covered by GDPR, the United Kingdom’s pending Brexit prompted enhancements to also identify and manage data elements specific to the UK. For example, Canopy users can easily pinpoint things like UK National ID numbers and National Health Service Numbers in a breached data set. This makes UK data just as manageable as US and Australian data within the software.
Security is always of paramount concern, and with more and more review teams having to conduct breach reviews remotely, the need for adaptability without compromise is key. Canopy has expanded its two-factor authentication with an added layer of security from the Google Authenticator app. This addition provides further protection of Canopy projects and user data.
Building on earlier advancements in Canopy’s image classification, the application now detects an additional 15 categories of documents that commonly contain personal information, such as resumes, tax forms, and invoices. This deeper document classification happens automatically during processing as well as manually during review.
As a complement to Canopy’s baked-in machine learning capabilities, the application now allows users to create their own custom rules for unique characteristics within their projects. For example, a corporation’s breached data may include proprietary account types or patterns that are non-standard yet need to be detected. Users can define those variable parameters for Canopy to detect.
Another example of Canopy’s added flexibility and versatility is the upgrade to its anomaly detection, which detects conflicts and incongruities in users’ coding compared to the documents themselves. This powerful detection of inconsistencies dramatically improves QC workflow.
Canopy's data breach response application is offered on a software-as-a-service (SaaS) basis. For more information or to schedule a demonstration of the latest version, visit canopyco.io or call 202-9CANOPY.