A data breach was discovered. Now what?

Data breach response software—the
right tool for the job

When a cyber incident occurs, time is of the essence. Combing through millions of documents to find affected PII/PHI requires a new approach: Canopy. Our purpose-built breach response application reduces the time, cost, risk, and effort associated with the defensible discovery of personally identifiable data.

Assess Privacy Impact Within 72 Hours

Canopy's reports are designed to help you assess the impact of the breach before reviewing the data. Use the analytics to cull and organize documents in preparation for data mining affected individuals.

Reduce False Positives by 43%+

Canopy’s sophisticated algorithms reduce the quantity of documents that are promoted for manual review by 43.5% on average compared to traditional eDiscovery processes——saving organizations significant time, money and resources.

Accelerate Breach Review by 25%+

Canopy’s automatic entity resolution and reconciliation, coupled with perpetual machine learning improvements in the background, enable breach response teams to complete the project significantly faster.

Canopy software has you covered
from start to finish

A successful data breach response requires a careful combination of people, process and technology. Canopy provides the technical backbone that helps response teams to quickly progress from one phase to the next.

Processing & Impact Assessment Data Mining & Extraction Export Notification List Entity Resolution & Reconciliation

eDiscovery does not equal Data Breach Discovery

As commonly portrayed in the litigation market, eDiscovery software is leveraged over the course of several months to “separate the wheat from the chaff”—leaving the legal team with only the most relevant evidence in a case.

Following a data breach, there is no wheat or chaff – or months to spare. There’s just a massive dataset with millions of fragments of sensitive information spread across countless files. Within a matter of days, the response team needs to find every fragment, classify them by type, determine the relationships among them, and specify exactly which people were affected by the breach.

Canopy software helps them do that—quickly, accurately and within the regulatory constraints.

Unlike eDiscovery review platforms, Canopy is specifically designed to solve the problems that arise when identifying and making sense of PII, PHI and other sensitive information.

As commonly portrayed in the litigation market, eDiscovery software is leveraged over the course of several months to “separate the wheat from the chaff”—leaving the legal team with only the most relevant evidence in a case.
Following a data breach, there is no wheat or chaff – or months to spare. There’s just a massive dataset with millions of fragments of sensitive information spread across countless files. Within a matter of days, the response team needs to find every fragment, classify them by type, determine the relationships among them, and specify exactly which people were affected by the breach.
Canopy software helps them do that—quickly, accurately and within the regulatory constraints.
Unlike eDiscovery review platforms, Canopy is specifically designed to solve the problems that arise when identifying and making sense of PII, PHI and other sensitive information.

Canopy sees the forest and the trees

Canopy's Processing & Impact Assessment Canopy software starts with a 30,000' view -- examining expansive, at-risk data populations to quickly assess the severity of the breach and the scope of the review project. Within about 24 hours *, Canopy generates a dynamic Impact Assessment Report to define the composition of the data, detect sensitive files, and classify the types of sensitive data that is present. *Rates vary by project and are contingent on multiple variables, including volume, file formats and encryption. PIN SSN DOB PW EXCE PDF EMAIL Upload structured and unstructured breached data from client computer, S3, Google Drive, Dropbox, SFTP, or O365 to perform defensible processing of data.
Canopy's Intelligent Data Mining & Review Thin. Using machine- learning to find where personal data and contact information co-exist, Canopy reduces the false positives that are promoted for review and effectively narrows the scope of human review. Prune. Canopy de-dupes individuals (even nicknames and maiden names). Using AI technology, Canopy fuses fragmented information, detects typos in names and SSN, and associates the related data. Identify. Canopy produces a single, de-duplicated list of affected individuals who should receive notice of a breach.

Benefits

Reduced costs and better margins

Increased efficiency and minimized staff fatigue

Instant insight guides project scoping and budget

Machine-learning technology enhances operations

Recall precision, fewer errors, lower risk

Faster turnaround to your client

Inform regulatory bureaus sooner

Proven software rooted in defensible processes

Reduced costs of cyber claims

Reduce manual review workloads

Supports any jurisdiction

Processing & Impact Assessment

In partnership with the cyber forensics or managed review teams hired by the affected enterprise, Canopy uploads the breached data to the secure Canopy cloud application. The application immediately begins to scan the complete dataset, unpack and categorize files, and classify PII, PHI, FERPA, PCI, CCPA, PIPEDA, and GDPR data.

Process the entire breached dataset to automatically sort, group and quantify all the file types that are recognized by Canopy software.
Recognize the presence of 60 foreign languages, enabling reviewers to prioritize their response strategy based on foreign laws and timelines.
Detect and classify Social Security numbers, credit card numbers, ID numbers, medical record information and hundreds of other datatypes recognized by Canopy software.
impact assessment report

FREE* Impact Assessment Report

We’ll use breached data from your client project to demonstrate how Canopy accelerates breach review and dramatically reduces false positives. Your free report will reveal the composition of your 5 GB sample dataset, including:

  • The breakdown of sensitive documents,
  • The locations of PII, PHI, PIPEDA, FERPA, PCI, CCPA, HIPAA and GDPR data in the population,
  • An initial gauge of the severity of a suspected breach and metrics to define the scope and budget for the subsequent human review.
*No purchase required. Your free impact Assessment Report provides a comprehensive, 5 day preview of the summarized data as a demonstration of the speed and accuracy of the Canopy machine-learning software. Optionally and at standard Canopy rates, participants may upgrade the report to export the list of affected individuals and access the subset of files that are recommended for human review.

PII/PHI Data Mining

Canopy’s user interface is specifically designed for use by data breach reviewers. Authorized team members can view documents and entities side-by-side, apply various purpose-built filters to effectively drill into the data, and reveal patterns in the data. These intelligent data mining tools enable the review team to quickly thin the forest to where personal data and contact information coexist.

Canopy processes electronically stored information using proprietary algorithms pre-trained for sensitive information detection and extraction that goes well beyond the capabilities of regular expressions.

Anomaly Detection

Canopy includes AI-based detection of data anomalies, such as typos in Social Security numbers and transposed characters.

Image Classification

Canopy distinguishes between documents containing sensitive information like driver’s licenses or birth certificates and documents containing logos or advertising banners.

Image Gallery

Canopy aggregates all of the image files that are present across all documents, enabling users to bulk-tag and classify images as junk or important for review.

Entity Resolution

Canopy helps reviewers to fuse fragmented information, connect correlated data points, reconcile nicknames and maiden names, and fully manage the compilation of data relating to affected individuals.

Automatic Entity Deduplication

With the help of machine learning, Canopy merges related entities into a single profile that logs all variations, such as maiden names and nicknames.

MapAccel

Map spreadsheet columns to entities and import entities while reviewing documents.

Profile Builder

Rather than manual data entry of new information, reviewers click on PII in a document and instantly add it to the affected individual’s profile in the system.

Entity360

Canopy aggregates every piece of PII that has been discovered for an individual during the project and displays the source documents side-by-side.

Active Lookahead

Canopy actively associates individuals with documents as the system learns more about how they are related.

Canopy learns from every project and gets smarter every day

Canopy makes it easy for reviewers to navigate documents and the extracted personal information. As users conduct their QA review, Canopy's machine-learning core is learning from every decision and constantly refining and correlating the records in the background. Canopy automatically cleans and completes the final deliverable for export.

Canopy makes it easy for reviewers to navigate documents and the extracted personal information. As users conduct their QA review, Canopy's machine-learning core is learning from every decision and constantly refining and correlating the records in the background.  Canopy automatically cleans and completes the final deliverable for export.

Notification List

As reviewers complete their data mining and entity resolution work, Canopy keeps processing in the background so that the final deliverable is ready as soon as QA review is complete. Canopy outputs a single, de‐duplicated list of affected individuals who should receive notice of the breach.