Skip to content

The DataStealth Platform

DataStealth's patented technology allows organizations to protect their most sensitive assets; Their data and documents.

DataStealth Overview.

DataStealth is a totally new type of data protection platform that allows organizations to identify, classify and protect their sensitive data and reduce the risk and damage from data breaches.

DataStealth makes it easy to ensure you meet privacy, regulatory, compliance and legal requirements while keeping your sensitive data secure.

Deploying DataStealth is as simple as making a small network change to place it in the line of network traffic, similar to how you would deploy a load balancer or firewall. DataStealth acts like a very smart network proxy, that is protocol and payload aware, that can act on network traffic based on one of the many policies available.

AdobeStock_567601459 (1)

DataStealth Data Protection.


The epitome of sensitive data replacement substituting sensitive information with a secure, non-sensitive token to preserve data format for critical transactions. Tokenization is often used for payment card data, and other sensitive information where maintaining the data's original format is essential.



Converts plaintext data into a ciphertext format, which is unreadable without using a decryption key. Encryption is often used to protect data in transit and at rest, making it a powerful tool for protecting sensitive data. 


Data Masking

A solution that applies a real-time masking function to sensitive data, obscuring it with substitute values like asterisks or random characters.



DataStealth Policies.

A DataStealth policy can perform many functions, including;  

  • Inspect Network Traffic: DataStealth can inspect a large number of network protocols natively, including web, file transfers, databases, message queue, file servers, emails, collaboration tools, and even mainframe.
  • Identify Sensitive Data: DataStealth can identify sensitive data inside many network payloads, including structured and unstructured data, containers, archives, databases, database backups, and images, using DataStealth’s proprietary confidence and validity scoring to virtually eliminating false positives.
  • Classify Sensitive Data: DataStealth targets a large variety of sensitive data types including Payment Card Information (PCI), Personally Identifiable Information (PII), Personal Health Information (PHI), and any other type of data that our customer deems to be sensitive data.
  • Protect Sensitive Data: DataStealth can apply one or more data protection technologies, including tokenization, encryption, masking, and redaction.

DataStealth Deployment.

DataStealth has three common deployment models; Realtime Inline Processing, Extract / Transform / Load (ETL) Processing, and Data Scanning at Rest.


Realtime Inline Processing.

DataStealth can process network traffic inline, in realtime, with support for a large number of protocols and payloads.

Common Use Cases for Realtime Inline Processing with DataStealth include PCI DSS audit scope reduction, PCI DSS Realtime Content Protection, PCI DSS Realtime Integrity Checking, and Dynamic Data Masking.


Extract / Transform / Load (ETL) Processing.

DataStealth can process data in motion, in realtime, when transferring data between systems, or between users and systems.

Common Use Cases for Extract / Transform / Load (ETL) Processing with DataStealth include Test Data Management, Data Migration, Synthetic Data Creation, De-identification for Data Analytics, and De-identification for Data Lakes.


Data Scanning
at Rest.

DataStealth can be pointed at systems, and can scan systems for sensitive data.

Common Use Cases for Data Scanning at Rest with DataStealth include Scanning data sources at rest, Data Discovery, Data Classification, Privacy Targeted Scans, and PCI DSS Payment Card Scanning.


DataStealth is Different.

No application

No installation of agents, collectors, or widgets

No changes to users or workflows