Qostodian Data Security Platform
PRODUCTS
Ready to eliminate your blindspots?
By Coverage
By Industry
Discover the power of Qostodian!
Latest news posts
Interested in working for Qohash?
Robust sensitive data discovery infiles without internet dependency
Your customers have high-risk, unstructured data. A lack of visibility can result in compliance gaps and a larger attack surface.
Recon serves as a self-contained application, that precisely scans all your files for sensitive content.
Deploy Recon on a Server or VM
Scan any network- accessible data source
Take action to reduce your risk
Recon identifies risks and areas for improvement, opening doors for further support in advisory, clean-ups, policy adjustments, and change management.
Endpoints
File servers
OneDrive
Google
Box
Amazon S3
Windows
Recon discovers and classifies sensitive data elements up to 50x faster than alternatives. Its scanning engine supports a wide range of files with virtually no limits to size. It’s designed to be operated by one person and doesn’t require additional dependencies – everything is included in one executable.
Once installed, Recon scans local and network sources to quickly list files containing sensitive data. It provides detailed explanations for each detection, enabling actions directly within the tool.
Recon provides essential solutions for data management and compliance, including sensitive data discovery, cleanup, and ongoing monitoring.
Identify files with sensitive data across your network storage.
Easily migrate sensitive files, with permissions smart checks.
Filter by data type for compliance and produce reports.
Set up recurring scans and automate report generation.
Visit our pricing desk and find the best solution for you
Recon finds and scans sensitive data elements within your files. Whether sensitive info lives on servers, in on-premises locations, or cloud drives, Recon discovers, scores, and classifies them – in record time.
Servers:
On-premises locations:
Any cloud-based storage mounted in the operating system:
Recon doesn’t just look at files – it finds and scans specific data elements within those files and data matches across different files. Why does this matter? One file could have 1000s of data elements. When assessing risk, you need visibility into what’s in the file, as each element carries a specific risk level.
Recon focuses you on the most critical areas of exposure at breakneck speed. Not all types of sensitive data carry equal risk – that’s why we made Recon configurable. Recon finds and secures the sensitive data that’s most critical to your business. It not only finds specific data elements, it assigns each element a likelihood score. It then ranks risk according to sensitive data type, enabling your team to cut through the noise and focus on the real risks, faster.
Recon delivers scanning results up to 10x faster than alternatives. Our customers average ~50 GB per hour scan times. When it comes to preparing for an audit or responding to a security incident, every second counts. On the flip side, legacy technology is CPU hungry and takes weeks to months to scan your environment.
Recon delivers the fastest time to value. It installs in 5-minutes, runs on a single machine (virtual or physical), and requires little to no training.
Virtually any file system the Windows File Explorer can traverse is a scan target.
Recon enables you to scan specific targets at any moment or to schedule them periodically. Be prepared for any ad hoc request or schedule a date in advance of your audit or other critical events and receive a full inventory with data mapped to regulations.
The executable is ~650 MB.
Recon requires a minimum of 2 CPU cores and 16 GB RAM. For optimal results, we recommend 4 CPU cores and 32 GB RAM.
Recon can be installed locally in 5 minutes or less.
Recon is designed to operate entirely within your environment. We believe in data privacy – including yours and do not have access to your data.
United States:
Canada:
Global:
Recon scans over 350 file extensions. For a full list contact us directly.