Enterprise Recon Features
User Maintenance (2)
Self Service Password Reset
Enables users to reset passwords without administrator interaction. Enforces password policies when resetting.
Bulk Changes
Change users and permissions in bulk
Administration (5)
APIs
Provides appropriate application interfaces to enable custom integrations for unique business requirements
Dashboards and Visualizations
Presents information and analytics in a digestible, intuitive, and visually appealing way.
Auditing
Documents access and alterations of the database for analytics and reporting.
Data Discovery
Unveils data connected to infrastructure and applications used to help manage and maintain compliance within complex IT systems.
Access Control
Supports LDAP Protocol to enable access control and governance.
Compliance (1)
Sensitive Data Compliance
Supports compliance with PII, GDPR, HIPPA, PCI, and other regulatory standards.
Data Protection (8)
Data Masking
Protects sensitive data by disguising or encrypting data, keeping it usable by the organization and approved parties.
Data Encryption/Security
Manages policies for user data access and data encryption.
Sensitive Data Compliance
Supports compliance with PII, GDPR, HIPPA, PCI, and other regulatory standards.
Sensitive Data Discovery
Includes funcationality to automatically discover and classify sensitive and other defined data.
Structured and Unstructured Data
Can protect both structured and unstructured data using automated discovery tools.
Encryption
Includes encryption methods to protect data.
Data Masking
Provides data masking functionality that hides specific data within a dataset based on the data's specific use policies.
Data Governance and Access Management
Provides policies and access controls to ensure the data is only handled by permisssioned users and processes.
Functionality (11)
Structure type
As reported in 11 Enterprise Recon reviews. Searches structured, semi-structured, and unstructured data for sensitive data.
Contextual search
Offers contextual search functions to understand factors such as file type, sensitivity, user type, location, and other metadata. This feature was mentioned in 11 Enterprise Recon reviews.
Template algorithms
Has template rules and pattern matching algorithms (PII, PCI, PHI and more) 11 reviewers of Enterprise Recon have provided feedback on this feature.
Custom algorithms
Offers the option to create custom templates and rules based on department, user type and data type. This feature was mentioned in 11 Enterprise Recon reviews.
False-positive management
As reported in 11 Enterprise Recon reviews. Offers false-positive management functions
Multiple file and location types
Based on 11 Enterprise Recon reviews. Search multiple file types (images, PDFs, etc.) and repository locations (such as on-premise databases, cloud storage, email servers, websites, etc.)
Dashboard
As reported in 11 Enterprise Recon reviews. Offers a dashboard showing specific location of sensitive data.
Compliance
As reported in 11 Enterprise Recon reviews. Facilitates compliance and enables adherence to common industry regulatory standards such as GDPR, CCPA, HIPAA, PCI DSS, ISO, and others.
Reporting
As reported in 11 Enterprise Recon reviews. Offers reporting functionality.
Metadata Analysis
Analyze file metadata to identify ROT data or potential compliance violations.
File Content Analysis
Analyze file contents to identify ROT data or potential compliance violations.
Management (6)
File System Selection
Designate which file system(s) are to be analyzed.
File System Integration
Integrate with a variety of file systems, data stores, etc.
Reporting
Generate reports and/or dashboards presenting results and key findings post-analysis.
Data Classification
Classify analyzed files and/or metadata by type, sensitivity, potential concerns, etc.
Data Discovery
Provides a built-in integrated data catalog that allows users to easily locate data across multiple sources.
Data Profililng
Monitors and cleanses data with the help of business rules and analytical algorithms.
Security (2)
Roles Management
Helps identify and manage the roles of owners and stewards of data.
Compliance Management
Helps adhere to data privacy regulations and norms.
Generative AI - Security Compliance (2)
Predictive Risk
Can analyze patterns and trends in security data to predict potential compliance risks.
Automated Documentation
Can automate the creation of compliance documentation by quickly generating accurate and comprehensive reports.
Agentic AI - Sensitive Data Discovery (4)
Autonomous Task Execution
Capability to perform complex tasks without constant human input
Multi-step Planning
Ability to break down and plan multi-step processes
Cross-system Integration
Works across multiple software systems or databases
Proactive Assistance
Anticipates needs and offers suggestions without prompting
Agentic AI - Data Governance (6)
Autonomous Task Execution
Capability to perform complex tasks without constant human input
Multi-step Planning
Ability to break down and plan multi-step processes
Cross-system Integration
Works across multiple software systems or databases
Adaptive Learning
Improves performance based on feedback and experience
Natural Language Interaction
Engages in human-like conversation for task delegation
Decision Making
Makes informed choices based on available data and objectives
Agentic AI - File Analysis (3)
Autonomous Task Execution
Capability to perform complex tasks without constant human input
Cross-system Integration
Works across multiple software systems or databases
Decision Making
Makes informed choices based on available data and objectives


