Welcome to the Ground Labs Cloud based POC area.

A trial area for your prospects to get a head start on the successful deployment and use of Enterprise Recon, eliminating the need for installation time for your vendors technical team.

Desired Evaluation Start Date:


See Section A for examples


See Section B for examples

Overview

The Ground Labs Enterprise Recon Sandbox is available to prospective customers of Ground Labs Partners who require testing use cases prior to procurement. The Sandbox will show discovered data from multiple systems, including SharePoint, Office 365, databases, servers, Mac, etc. These targets will not be connected to live systems so will be view only. Active connected targets will include Windows server files, Windows server memory, and a MariaDB. These systems will be connected to the sandbox. The sandbox environment will be dedicated to your use and the environment will not be shared with other prospects or customers.

Once you connect to the Sandbox environment you will have Set number of days to complete the testing. The sandbox environment will automatically be deleted after that time.

Section A: Sample Success Criteria

  • Able to discover data across the environment. Including credit card numbers, name, identification numbers, address, and other identifying factors such as email addresses. These pattern definitions should come with the solution and not require us to code Regex patterns to find the data.
  • Able to discover credit card data across the environment.
  • Finds National Identity numbers (SSN) across the environment.
  • Can tell us where names, address, and emails are located.
  • Able to create reports indicating where sensitive data is located. Must support multiple report formats including PDF, CSV, and HTML.
  • Can schedule discovery jobs to run on a periodic basis to search our systems.
  • From within the solution user interface, can mask credit card numbers residing in unprotected files
  • Can scan compressed (zip) files.
  • Does not display credit card numbers in the solution interface or reports.
  • Looks inside image files and is able to determine sensitive data embedded inside the image files.
  • Can move selected files to a protected location for quarantine or archive purposes.
  • Out of the box pattern matching for our sensitive data.
  • For targets affected by a data breach, able to identify sensitive data that is located on the impacted system(s).
  • Scan hidden locations, such as shadow volumes, recycle bin, and memory.
  • Data is not copied across the network prior to scanning. ie. Scans locally. This is critical for security driven requirements like GDPR.

Section B: Use Case

  • Scan for PCI data on our file servers. When found, use remediation to mask in files or delete files.
  • Create a custom search pattern to find customer id numbers.
  • Schedule scans to run overnight and pause the scan if not completed by 8:00am.
  • Create summary reports in PDF formats.
Download The free eBook