Product
Discover our solution
Solutions
Tour the product
Resources
Company
Join the team
Supporting unstructured data sources that matter most to enterprises
Zero copy data security platform
Qostodian delivers enterprise data security through a hybrid SaaS architecture. Data is analyzed directly at the source by a collector, so it never needs to be copied or moved. Only the findings are securely centralized in the Qostodian platform to provide visibility, reporting, and centralized control.
Air-gapped environments
Recon is built for air-gapped and sovereign environments where internet connectivity is not permitted. Deployed locally on a server or in a container, it scans data sources across the network it can access and analyzes them within the secured environment.
Integrations
Qohash’s open API and modular platform let your teams and tools connect seamlessly to the data intelligence you need, when you need it.
Bring your own model and connect it to the Qostodian public API to enable your agents
Build applications and integrations beyond Qostodian’s dashboard to maximize value
Access event data programmatically to feed BI tools, SIEM platforms, or SOAR
Purview and M365
Integrate Qostodian with select Microsoft 365 tools to extend sensitive data protection and visibility
FAQ
Qostodian supports a wide range of data sources across both on-premises and cloud environments:
On-premises:
Cloud-based:
Recon finds and scans sensitive data elements within your files, wherever they live. It discovers, scores, and classifies them across:
Servers:
Cloud-based storage mounted in the OS:
It is particularly suited for forensic investigations and does not require permanent installation, making it a portable and flexible tool.
Qostodian tracks coverage through a combination of scan types and sensor deployments.
The platform aims to ensure:
Coverage is a core value proposition — the goal is that Qostodian cannot be rejected from a deal because it fails to cover mainstream sources.
Qostodian discovers data sources through Inventory Scans, which are performed after sensor installation.
Qostodian monitors data sources through real-time monitoring – continuously scanning data containers as they are modified (created, edited, deleted, renamed, etc.).
Key points:
A delta scan is a one-time incremental scan that only processes data containers that have been modified since the last scan — unchanged files are skipped.
Qostodian allows sensor configuration with defined scope (target paths and file types) and scheduling parameters. Sensors can be configured per data source, which provides some level of control over what gets scanned and when.
Qostodian assesses data source risk by scanning data containers within each source and identifying sensitive information present.
The risk assessment is based on:
The goal is to provide an accurate data risk assessment for organizational employees across all data stores.