A data breach was discovered. Now what?
Data breach response software—the
right tool for the job
When a cyber incident occurs, time is of the essence. Combing through millions of documents to find affected PII/PHI requires a new approach: Canopy. Our purpose-built breach response application reduces the time, cost, risk, and effort associated with the defensible discovery of personally identifiable data.
Assess Privacy Impact Within 72 Hours
Canopy's reports are designed to help you assess the impact of the breach before reviewing the data. Use the analytics to cull and organize documents in preparation for data mining affected individuals.
Reduce False Positives by 43%+
Canopy’s sophisticated algorithms reduce the quantity of documents that are promoted for manual review by 43.5% on average compared to traditional eDiscovery processes——saving organizations significant time, money and resources.
Accelerate Breach Review by 25%+
Canopy’s automatic entity resolution and reconciliation, coupled with perpetual machine learning improvements in the background, enable breach response teams to complete the project significantly faster.
Canopy software has you covered
from start to finish
A successful data breach response requires a careful combination of people, process and technology. Canopy provides the technical backbone that helps response teams to quickly progress from one phase to the next.
eDiscovery does not equal Data Breach Discovery
As commonly portrayed in the litigation market, eDiscovery software is leveraged over the course of several months to “separate the wheat from the chaff”—leaving the legal team with only the most relevant evidence in a case.
Following a data breach, there is no wheat or chaff – or months to spare. There’s just a massive dataset with millions of fragments of sensitive information spread across countless files. Within a matter of days, the response team needs to find every fragment, classify them by type, determine the relationships among them, and specify exactly which people were affected by the breach.
Canopy software helps them do that—quickly, accurately and within the regulatory constraints.
Unlike eDiscovery review platforms, Canopy is specifically designed to solve the problems that arise when identifying and making sense of PII, PHI and other sensitive information.
Canopy sees the forest and the trees
Reduced costs and better margins
Increased efficiency and minimized staff fatigue
Instant insight guides project scoping and budget
Machine-learning technology enhances operations
Recall precision, fewer errors, lower risk
Faster turnaround to your client
Inform regulatory bureaus sooner
Proven software rooted in defensible processes
Reduced costs of cyber claims
Reduce manual review workloads
Supports any jurisdiction
Processing & Impact Assessment
In partnership with the cyber forensics or managed review teams hired by the affected enterprise, Canopy uploads the breached data to the secure Canopy cloud application. The application immediately begins to scan the complete dataset, unpack and categorize files, and classify PII, PHI, FERPA, PCI, CCPA, PIPEDA, and GDPR data.
FREE* Impact Assessment Report
We’ll use breached data from your client project to demonstrate how Canopy accelerates breach review and dramatically reduces false positives. Your free report will reveal the composition of your 5 GB sample dataset, including:
- The breakdown of sensitive documents,
- The locations of PII, PHI, PIPEDA, FERPA, PCI, CCPA, HIPAA and GDPR data in the population,
- An initial gauge of the severity of a suspected breach and metrics to define the scope and budget for the subsequent human review.
PII/PHI Data Mining
Canopy’s user interface is specifically designed for use by data breach reviewers. Authorized team members can view documents and entities side-by-side, apply various purpose-built filters to effectively drill into the data, and reveal patterns in the data. These intelligent data mining tools enable the review team to quickly thin the forest to where personal data and contact information coexist.
Canopy processes electronically stored information using proprietary algorithms pre-trained for sensitive information detection and extraction that goes well beyond the capabilities of regular expressions.
Canopy helps reviewers to fuse fragmented information, connect correlated data points, reconcile nicknames and maiden names, and fully manage the compilation of data relating to affected individuals.
Automatic Entity Deduplication
With the help of machine learning, Canopy merges related entities into a single profile that logs all variations, such as maiden names and nicknames.
Map spreadsheet columns to entities and import entities while reviewing documents.
Rather than manual data entry of new information, reviewers click on PII in a document and instantly add it to the affected individual’s profile in the system.
Canopy aggregates every piece of PII that has been discovered for an individual during the project and displays the source documents side-by-side.
Canopy actively associates individuals with documents as the system learns more about how they are related.
Canopy learns from every project and gets smarter every day
Canopy makes it easy for reviewers to navigate documents and the extracted personal information. As users conduct their QA review, Canopy's machine-learning core is learning from every decision and constantly refining and correlating the records in the background. Canopy automatically cleans and completes the final deliverable for export.