A Data Security Platform like no other

Built using our patented technology, DataStealth provides unparalleled data discovery, classification, and protection of your most sensitive data and documents to ensure you meet privacy, regulatory, compliance, and governance requirements.

NO CODE CHANGES
NO APIs REQUIRED
NO CHANGE TO USER BEHAVIOUR

DataStealth’s Data Security Platform is: 

With privacy legislation giving customers the right to information and the right to be forgotten, seamless data discovery and classification has never been more important.

Network Protocols and Payloads

Supports all major network protocols and payloads including databases, filestores, and file types

Secure Storage

Fragmented, distributed storage with resiliency and redundancy that’s computationally unbreachable

Scalable Architecture

Scale up and out with microservice-based architecture

Centralized Key Management

Support internal and external key integration, designed in accordance with NIST SP800-57. Includes rigorously encrypted single-vault architecture supporting multi-party authentication.

3rd Party Integration

Find data from structured and unstructured sources, without needing to supply locations to search.

Patented DataStealth tech

Our patents ensure we can provide customers with a robust solution they can’t find anywhere else.

Network Protocol & Payload Aware

We support a large number of technologies including transport layer, database, cloud, file-store, and file types.

Deployed Easier

Start with a simple DNS change, with no code changes, no integration with APIs or collectors, and no changes in user behaviours.

Transparent

We operate inline in real-time without requiring code changes or integrations.

Security-First Foundations

DataStealth was designed from the ground up with a security-first mindset. We made sure that DataStealth would meet or exceed the requirements of any organization when it comes to security, scalability, and resilience, well before we started designing and building any of our solutions.

With privacy legislation giving customers the right to information and the right to be forgotten, seamless data discovery and classification has never been more important.

Network Protocols and Payloads

Supports all major network protocols and payloads including databases, filestores, and file types

Secure Storage

Fragmented, distributed storage with resiliency and redundancy that’s computationally unbreachable

Scalable Architecture

Scale up and out with microservice-based architecture

Centralized Key Management

Support internal and external key integration, designed in accordance with NIST SP800-57. Includes rigorously encrypted single-vault architecture supporting multi-party authentication.

3rd Party Integration

Find data from structured and unstructured sources, without needing to supply locations to search.

Patented DataStealth tech

Our patents ensure we can provide customers with a robust solution they can’t find anywhere else.

Core Capabilities

Scan the Network

Find all data sources within network segments and ports, identifying known or unknown services.

Locate Data Sources

Locate databases, file stores, and other sources of data.

Create Inventory Report

Create report of data sources for classification or your inventory management system.

Data Discovery

Discover all of your data sources across your network, both known and unknown.

Find

Locate structured and unstructured data and documents such as databases, images, and PDFs.

Validate

Use pattern matching, checksums, contextual awareness, and machine learning to create confidence and validity scores (1-100%) for each piece of data.

Policy Driven

Create policies to adhere to your governance and compliance requirements.

Data Classification

Classify sensitive data with virtually no false positives using our sophisticated Data Classification Engine supported by a confidence and validity scoring model that goes beyond a simple REGEX. 

Data Protection

Protect data how you want using tokenization, encryption, or masking. Data protection policies are configurable rules that determine what data elements are to be protected, and what data protection methodology is to be applied on a particular data element. All data protection settings are configured at the field level or per endpoint / directionality 

Encryption

Mathematically transform sensitive data into something unreadable.

Tokenization

Use substitution to protect data where you can control the format of the output.

Masking

Hide data from unauthorized users with non-reversible obfuscation.

With privacy legislation giving customers the right to information and the right to be forgotten, seamless data discovery and classification has never been more important.

Network Protocols and Payloads

Supports all major network protocols and payloads including databases, filestores, and file types

Secure Storage

Fragmented, distributed storage with resiliency and redundancy that’s computationally unbreachable

Scalable Architecture

Scale up and out with microservice-based architecture

Centralized Key Management

Support internal and external key integration, designed in accordance with NIST SP800-57. Includes rigorously encrypted single-vault architecture supporting multi-party authentication.

3rd Party Integration

Find data from structured and unstructured sources, without needing to supply locations to search.

Patented DataStealth tech

Our patents ensure we can provide customers with a robust solution they can’t find anywhere else.

Key Components

With privacy legislation giving customers the right to information and the right to be forgotten, seamless data discovery and classification has never been more important.

Network Protocols and Payloads

Supports all major network protocols and payloads including databases, filestores, and file types

Secure Storage

Fragmented, distributed storage with resiliency and redundancy that’s computationally unbreachable

Scalable Architecture

Scale up and out with microservice-based architecture

Centralized Key Management

Support internal and external key integration, designed in accordance with NIST SP800-57. Includes rigorously encrypted single-vault architecture supporting multi-party authentication.

3rd Party Integration

Find data from structured and unstructured sources, without needing to supply locations to search.

Patented DataStealth tech

Our patents ensure we can provide customers with a robust solution they can’t find anywhere else.

Supported Data Types

Personally Identifiable Information (PII)
Payment Card Information (PCI)
Personal Health Information (PHI)
Any data that an organization may deem to be sensitive

Supported Technologies

DataStealth supports all major protocols, payloads, databases, and filestores. 

Deployment Options

SaaS (hosted / managed)
On-Premise (virtual, physical)
Cloud (AWS, Azure, GCP)

An Enterprise-Grade Solution

With privacy legislation giving customers the right to information and the right to be forgotten, seamless data discovery and classification has never been more important.

Network Protocols and Payloads

Supports all major network protocols and payloads including databases, filestores, and file types

Secure Storage

Fragmented, distributed storage with resiliency and redundancy that’s computationally unbreachable

Scalable Architecture

Scale up and out with microservice-based architecture

Centralized Key Management

Support internal and external key integration, designed in accordance with NIST SP800-57. Includes rigorously encrypted single-vault architecture supporting multi-party authentication.

3rd Party Integration

Find data from structured and unstructured sources, without needing to supply locations to search.

Patented DataStealth tech

Our patents ensure we can provide customers with a robust solution they can’t find anywhere else.

Key Management

DataStealth operates a Key Manager, designed in accordance with NIST SP 800-57, using randomly generated data encrypting keys (DEKs) and key encrypting keys (KEKs). Our approach to key management includes rigorously encrypted single-vault architecture supporting multi-party authentication.   

Secure Storage

When storage of data is required, such as with tokenization, DataStealth provides a secure, fault-tolerant and highly resilient persistent storage capability. Similar to RAID for hard disks, DataStealth’s storage algorithm uses both the DEK and KEK from our key management, splitting each encrypted data element into any number of smaller pieces, and then distributing those pieces into any number of storage nodes. These slices can be reconstructed at a later date for authorized users and authorized use cases. 

Scalability

DataStealth scales both up and out. When processing single files that contain a large amount of data, such as a file transfer over SFTP, DataStealth can scale up simply by adding more CPUs. When processing many sessions simultaneously, such as a website with a heavy load, DataStealth can scale out by simply adding more load balanced instances of DataStealth. Either way, there are no limits to the scalability of DataStealth. 

Resilient Topology

DataStealth has the ability to run using a single instance. However, for production environments, or when the expected throughput is significant, multiple DataStealth instances are recommended. When deploying more than one DataStealth instance, DataStealth can be deployed in an active/active configuration, where any number of DataStealth instances can form a unified pool, where all instances are participating equally. 

DataStealth Products.

DataStealth PCI.

Payment Card Industry Compliance

Protect payment card data.
Reduce PCI audit scope.
Comply with new PCI DSS 4.0 requirements.

DataStealth DDC.

Data Discovery and Classification

Find known and unknown data sources.Classify data with virtually no false positives.

Virtually no false positives.

DataStealth is built for enterprise. With fast and easy integration that’s as simple as updating your DNS.

DataStealth TDM.

Test Data Management

De-risk non-production environments with high-fidelity substitute data.

DataStealth DDM.

Dynamic Data Masking

Real-time access controls to mask and protect your sensitive data.

What makes us different

A Data Security Platform that deploys easily

DataStealth is built for enterprise. With fast and easy integration that’s as simple as updating your DNS, you won’t need to make changes across every page of every application on every server. That means:

No application development

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros elementum tristique.

No installation of agents, collectors, or widgets

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros elementum tristique.

No changes to users or workflows

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros elementum tristique.

Get in touch today

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros elementum tristique.

Ready to see it in action?

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.