1touch.io is a U.S.-headquartered and Israeli-developed technology company. The company’s flagship product, Inventa™, is a best-of-class personal sensitive data discovery engine designed to drive superior outcomes in security, privacy, and governance for essential tasks such as data protection, security enrichment, and regulatory compliance.
The 1touch.io Inventa platform, a critical component for data operations and governance, provides uniquely accurate, scalable, cost-effective, and interconnected data discovery, classification, and cataloging. Combining patented technology such as “Supervised AI” and open APIs, Inventa helps companies discover and natively contextualize sensitive data and its use and easily share this data with dozens of third-party systems to improve data intelligence outcomes across the enterprise. Inventa delivers dynamically updatable and relevant results that increase a company’s data efficacy and operational efficiency.
Pelican-Tech Total Security
Bridging the Gap Between Security Intelligence and Data Protection
The most secure and efficient centrally managed enterprise firewall, always on & relentless.
IBM Security Guardium Data Protection
Securely deliver the optimal app experience
One solution to secure all your organization’s data.
IBM Security Guardium Data Protection automatically discovers and classifies sensitive data from across the enterprise, providing real-time data activity monitoring and advanced user behavior analytics to help discover unusual activity around sensitive data.
Control who can access your most sensitive data.
Guardium Data Protection is built on a scalable architecture, which provides full visibility into structured, semi-structured and unstructured data activity across all major data repositories stored on premises, in private and public cloud and in containers.
IBM Security Guardium Insights
Centralize data security to prioritize, analyze, and respond
Guardium Insights simplifies your organization’s data architecture, unifies your view across data sources, and delivers long-term data security and compliance information to adhere to regulations and identify risk trends. As a part of Cloud Pak for Security, Guardium Insights is built as a collaborative, comprehensive data security platform to help to unify — and modernize — the security operations center (SOC). Embracing the power of Red Hat OpenShift, it can be flexibly deployed anywhere via microservice Kubernetes containers.
IBM Security Guardium Data Encryption
Encryption solutions to secure your data and your business.
IBM Security Guardium Data Encryption consists of an integrated suite of products built on a common infrastructure. These highly-scalable solutions provide encryption, tokenization, data masking and key management capabilities to help protect and control access to databases, files and containers across the hybrid multicloud—securing assets residing in cloud, virtual, big data and on-premise environments.
IBM Security Guardium Vulnerability Assessment
Identify threats and security gaps in databases.
IBM Security Guardium Vulnerability Assessment scans data infrastructures (databases, data warehouses and big data environments) to detect vulnerabilities and suggest remedial actions. The solution identifies exposures such as missing patches, weak passwords, unauthorized changes and misconfigured privileges. Full reports are provided as well as suggestions to address all vulnerabilities.
Forcepoint Data Loss Prevention (DLP)
Control all your data with one single policy.
Replace broad, sweeping rules with individualized, adaptive data security that doesn’t slow down your employees. Block actions only where you need to, and drive productivity.
Simplify compliance with predefined policies.
View and control all of your data with the industry’s largest pre-defined policy library. Ensure regulatory compliance across 80+ countries for GDPR, CCPA and more. Deploy data classification with Boldon James and Azure Information Protection.
Protect critical intellectual property with unsurpassed accuracy.
Protect PII and PHI, company financials, trade secrets, credit card data, and other pieces of sensitive customer data-even in images. Follow intellectual property (IP) in both structured and unstructured forms, and stop low & slow data theft even when user devices are off-network.
Prevent data breaches automatically.
Replace broad, sweeping rules with individualized, adaptive data security policies that doesn’t slow down your employees. Block actions only where you need to, and drive productivity.