A Data Security Platform like no other

Built using our patented technology, DataStealth provides unparalleled data discovery, classification, and protection of your most sensitive data and documents to ensure you meet privacy, regulatory, compliance, and governance requirements.

Check icon.
NO APPLICATION CHANGES
Check icon.
NO CODE, AGENTS, OR COLLECTORS TO INSTALL
Check icon.
NO CHANGE TO USER BEHAVIOUR

DataStealth’s Data Security Platform is: 

With privacy legislation giving customers the right to information and the right to be forgotten, seamless data discovery and classification has never been more important.

Check icon.
Network Protocols and Payloads

Supports all major network protocols and payloads including databases, filestores, and file types

Check icon.
Secure Storage

Fragmented, distributed storage with resiliency and redundancy that’s computationally unbreachable

Check icon.
Scalable Architecture

Scale up and out with microservice-based architecture

Check icon.
Centralized Key Management

Support internal and external key integration, designed in accordance with NIST SP800-57. Includes rigorously encrypted single-vault architecture supporting multi-party authentication.

Check icon.
3rd Party Integration

Find data from structured and unstructured sources, without needing to supply locations to search.

Check icon.
Patented DataStealth tech

Our patents ensure we can provide customers with a robust solution they can’t find anywhere else.

Network Protocol & Payload Aware

We support a large number of technologies including transport layer, database, cloud, file-store, and file types.

Deployed Easier

Start with a simple DNS change, with no code changes, no integration with APIs or collectors, and no changes in user behaviours.

Transparent

We operate inline in real-time without requiring code changes or integrations.

Security-First Foundations

DataStealth was designed from the ground up with a security-first mindset. We made sure that DataStealth would meet or exceed the requirements of any organization when it comes to security, scalability, and resilience, well before we started designing and building any of our solutions.

With privacy legislation giving customers the right to information and the right to be forgotten, seamless data discovery and classification has never been more important.

Check icon.
Network Protocols and Payloads

Supports all major network protocols and payloads including databases, filestores, and file types

Check icon.
Secure Storage

Fragmented, distributed storage with resiliency and redundancy that’s computationally unbreachable

Check icon.
Scalable Architecture

Scale up and out with microservice-based architecture

Check icon.
Centralized Key Management

Support internal and external key integration, designed in accordance with NIST SP800-57. Includes rigorously encrypted single-vault architecture supporting multi-party authentication.

Check icon.
3rd Party Integration

Find data from structured and unstructured sources, without needing to supply locations to search.

Check icon.
Patented DataStealth tech

Our patents ensure we can provide customers with a robust solution they can’t find anywhere else.

Core Capabilities

Check icon.
Scan the Network

Find all data sources within network segments and ports, identifying known or unknown services.

Check icon.
Locate Data Sources

Locate databases, file stores, and other sources of data.

Check icon.
Create Inventory Report

Create report of data sources for classification or your inventory management system.

Data Discovery

Discover all of your data sources across your network, both known and unknown.

Check icon.
Contextual Awareness

Classify data based on its surrounding data.

Check icon.
Validity Scoring

Use algorithms, checksums, and patterns to validate data values.

Check icon.
Confidence Scoring

Assign a confidence score supported by validity and contextual awareness for decision making.

Data Classification

Classify sensitive data with virtually no false positives using our sophisticated Data Classification Engine supported by a confidence and validity scoring model that goes beyond a simple REGEX. 

Data Protection

Protect data how you want using tokenization, encryption, or masking. Data protection policies are configurable rules that determine what data elements are to be protected, and what data protection methodology is to be applied on a particular data element. All data protection settings are configured at the field level or per endpoint / directionality 

Check icon.
Encryption

Mathematically transform sensitive data into something unreadable.

Check icon.
Tokenization

Use substitution to protect data where you can control the format of the output.

Check icon.
Masking

Hide data from unauthorized users with non-reversible obfuscation.

With privacy legislation giving customers the right to information and the right to be forgotten, seamless data discovery and classification has never been more important.

Check icon.
Network Protocols and Payloads

Supports all major network protocols and payloads including databases, filestores, and file types

Check icon.
Secure Storage

Fragmented, distributed storage with resiliency and redundancy that’s computationally unbreachable

Check icon.
Scalable Architecture

Scale up and out with microservice-based architecture

Check icon.
Centralized Key Management

Support internal and external key integration, designed in accordance with NIST SP800-57. Includes rigorously encrypted single-vault architecture supporting multi-party authentication.

Check icon.
3rd Party Integration

Find data from structured and unstructured sources, without needing to supply locations to search.

Check icon.
Patented DataStealth tech

Our patents ensure we can provide customers with a robust solution they can’t find anywhere else.

Key Components

With privacy legislation giving customers the right to information and the right to be forgotten, seamless data discovery and classification has never been more important.

Check icon.
Network Protocols and Payloads

Supports all major network protocols and payloads including databases, filestores, and file types

Check icon.
Secure Storage

Fragmented, distributed storage with resiliency and redundancy that’s computationally unbreachable

Check icon.
Scalable Architecture

Scale up and out with microservice-based architecture

Check icon.
Centralized Key Management

Support internal and external key integration, designed in accordance with NIST SP800-57. Includes rigorously encrypted single-vault architecture supporting multi-party authentication.

Check icon.
3rd Party Integration

Find data from structured and unstructured sources, without needing to supply locations to search.

Check icon.
Patented DataStealth tech

Our patents ensure we can provide customers with a robust solution they can’t find anywhere else.

Supported Data Types

Check icon.
Personally Identifiable Information (PII)
Check icon.
Payment Card Information (PCI)
Check icon.
Personal Health Information (PHI)
Check icon.
Any data that an organization may deem to be sensitive

Supported Technologies

DataStealth supports all major protocols, payloads, databases, and filestores. 

Deployment Options

Check icon.
SaaS (hosted / managed)
Check icon.
On-Premise (virtual, physical)
Check icon.
Cloud (AWS, Azure, GCP)

An Enterprise-Grade Solution

With privacy legislation giving customers the right to information and the right to be forgotten, seamless data discovery and classification has never been more important.

Check icon.
Network Protocols and Payloads

Supports all major network protocols and payloads including databases, filestores, and file types

Check icon.
Secure Storage

Fragmented, distributed storage with resiliency and redundancy that’s computationally unbreachable

Check icon.
Scalable Architecture

Scale up and out with microservice-based architecture

Check icon.
Centralized Key Management

Support internal and external key integration, designed in accordance with NIST SP800-57. Includes rigorously encrypted single-vault architecture supporting multi-party authentication.

Check icon.
3rd Party Integration

Find data from structured and unstructured sources, without needing to supply locations to search.

Check icon.
Patented DataStealth tech

Our patents ensure we can provide customers with a robust solution they can’t find anywhere else.

Key Management

DataStealth operates a Key Manager, designed in accordance with NIST SP 800-57, using randomly generated data encrypting keys (DEKs) and key encrypting keys (KEKs). Our approach to key management includes rigorously encrypted single-vault architecture supporting multi-party authentication.   

Secure Storage

When storage of data is required, such as with tokenization, DataStealth provides a secure, fault-tolerant and highly resilient persistent storage capability. Similar to RAID for hard disks, DataStealth’s storage algorithm uses both the DEK and KEK from our key management, splitting each encrypted data element into any number of smaller pieces, and then distributing those pieces into any number of storage nodes. These slices can be reconstructed at a later date for authorized users and authorized use cases. 

Scalability

DataStealth scales both up and out. When processing single files that contain a large amount of data, such as a file transfer over SFTP, DataStealth can scale up simply by adding more CPUs. When processing many sessions simultaneously, such as a website with a heavy load, DataStealth can scale out by simply adding more load balanced instances of DataStealth. Either way, there are no limits to the scalability of DataStealth. 

Resilient Topology

DataStealth has the ability to run using a single instance. However, for production environments, or when the expected throughput is significant, multiple DataStealth instances are recommended. When deploying more than one DataStealth instance, DataStealth can be deployed in an active/active configuration, where any number of DataStealth instances can form a unified pool, where all instances are participating equally. 

DataStealth Products.

DataStealth PCI.

Payment Card Industry Compliance

Check icon.
Protect payment card data.
Check icon.
Reduce PCI audit scope.
Check icon.
Comply with new PCI DSS 4.0 requirements.

DataStealth DDC.

Data Discovery and Classification

Find known and unknown data sources.Classify data with virtually no false positives.

Virtually no false positives.

DataStealth is built for enterprise. With fast and easy integration that’s as simple as updating your DNS.

DataStealth TDM.

Test Data Management

Check icon.
De-risk non-production environments with high-fidelity substitute data.

DataStealth DDM.

Dynamic Data Masking

Real-time access controls to mask and protect your sensitive data.

What makes us different

A Data Security Platform that deploys easily

DataStealth is built for enterprise. With fast and easy integration that’s as simple as updating your DNS, you won’t need to make changes across every page of every application on every server. That means:

No application development

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros elementum tristique.

No installation of agents, collectors, or widgets

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros elementum tristique.

No changes to users or workflows

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros elementum tristique.

Get in touch today

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros elementum tristique.

Ready to see it in action?