Company Confidential and Intellectual Property

  • Bids and Tenders for Discovery

    Policy for detecting bids, proposals, and tenders, such as responses to request for proposal (RFP) and invitation for bids (IFB) documents.

    • Bids and Tenders (Wide)
    • Bids and Tenders (Default)
    • Bids and Tenders (Narrow)
  • Call Detail Records for Discovery

    Policy for detection of Call Detail Record (CDR) files. The rules for this policy are:

    • CDR: Call details rows
    • CDR: Call details headers
  • Database Files

    Policy for the detection of database files. The rules for this policy are:

    • Database File: Ability Office File
    • Database File: Borland Reflex 2 File
    • Database File: dBase File
    • Database File: Filemaker File
    • Database File: Lotus Notes NSF File
    • Database File: Microsoft Access File
    • Database File: Microsoft Exchange Server File
    • Database Files: Microsoft Program Database File
    • Database File: Microsoft Works for DOS File
    • Database File: Microsoft Works for Mac File
    • Database File: Microsoft Works for Windows File
    • Database File: MORE File
    • Database Files: MySQL Table Definition File
    • Database File: Paradox File
    • Database Files: SAS7BDAT Database Storage File
    • Database File: SmartWare II File
    • Database Files: SQLite Database File
  • Digitally Signed PDF Files for Discovery

    Policy for detection of digitally signed PDF files. The rule for this policy is:

    • Digitally Signed PDF File (Native)
  • Files Containing Macros for Discovery

    Policy for detection of files that contain macros.

    • Macro-Enabled Microsoft Office Excel Files
    • Macro-Enabled Microsoft Office PowerPoint Files
    • Macro-Enabled Microsoft Office Visio Files
    • Macro-Enabled Microsoft Office Word Files
  • Financial information for Discovery
    Policy for detection of files containing general, personal, and investment financial information.The rules for this policy are:
    • Financial Information - Personal
    • Financial Information - Investment
    • Financial Information - General
  • Hardware Source code for Discovery
    Policy for detection of source code for various hardware languages: SPICE and its flavors, VHDL and Verilog. This policy is comprised of several rules for each language, each covering a different aspect of the detected texts. The rules for this policy are:
    • SPICE Source code (Berkeley version)
    • SPICE Source code
    • Verilog Source code PreciseID NLP
    • VHDL Source Code
  • IMEI for Discovery
    Policy for detection of serial (IMEI) numbers of cell phones. The International Mobile Equipment Identity (IMEI) is a number unique to every GSM and UMTS and iDEN mobile phone as well as some satellite phones. It is usually found printed on the phone underneath the battery. The rules for this policy are:
    • IMEI: Wide
    • IMEI: Default
  • Location Coordinates for Discovery

    Policy for detection of location coordinates. The rules for this policy are:

    • Location Coordinates: Latitude-Longitude
    • Location Coordinates: UTM
  • Movie Manuscripts for Discovery
    Policy for detection of movie and TV script files. The rule for this policy is:
    • Movie and TV Manuscripts
  • Network Security Information for Discovery
    Policy for detection of network security documents and network diagrams. This policy detects Network diagrams by searching for IP addresses, MAC addresses and various terms common to such documents. In order to achieve complete coverage, first 2 rules and one of the MAC address rules must be selected. The rules for this policy are:
    • Network Information and Security (patterns and IP)
    • Network Information and Security (textual patterns)
    • AWS Access Key ID
    • MAC Addresses (default)
  • Patents for Discovery

    Policy for detection of patents and patent applications The rule for this policy is:

    • Patents detection
  • Petroleum and Gas-Sensitive information for Discovery
    Detect leakage of sensitive data in the Oil and Gas industry and, in particular, information pertaining to oil prospecting and drilling. The rules for this policy are:
    • Petroleum and Gas-Sensitive Information: Latitude-Longitude Location Coordinates
    • Petroleum and Gas-Sensitive Information: Logs and Survey Reports
    • Petroleum and Gas-Sensitive Information: Petroleum-Related File Extensions
    • Petroleum and Gas-Sensitive Information: Prospecting Related Terms
    • Petroleum and Gas-Sensitive Information: UTM Location Coordinates
  • Security Software Files for Discovery

    Policy for detection of security software files. The rule for this policy is:

    • Security Software Files: Splunk Enterprise Security Event Log
  • Software Design Documents for Discovery

    Policy for detection of software design documents. The rule for this policy is:

    • Software Design Documents
  • Software Source Code for Discovery

    Policy for detection of computer source code. The rules for this policy are:

    • Software Source Code: C++ (Wide)
    • Software Source Code: C++ (Default)
    • Software Source Code: Java (Wide)
    • Software Source Code: Java (Default)
    • Software Source Code: Kotlin (Wide)
    • Software Source Code: Kotlin (Default)
    • Software Source Code: Python (Default)
    • Software Source Code: Python (Wide)
    • Software Source Code: Swift (Wide)
    • Software Source Code: Swift (Default)
  • Strategic Planning Documents for Discovery

    Policy for detection of documents of prime strategic value, such as business and marketing plans. The rule for this policy is:

    • Strategic Planning Documents
  • License Keys for Discovery

    Policy to identify Microsoft license keys. This helps mitigate software piracy and unauthorized usage of corporate assets. The rule for this policy is:

    • Microsoft license keys