The leader in Secure Business Execution

Dataguise gives data-driven enterprises a simple, powerful solution for global sensitive data governance.


Dataguise gives data-driven enterprises a simple, powerful solution for global sensitive data governance. DgSecure by Dataguise precisely detects, protects, audits, and monitors sensitive data across the enterprise, on premises and in the cloud. Delivering a single, dashboard view of sensitive data security, policies, access, and trends, DgSecure gives IT and business leaders the insights they need to manage risk and compliance while maximizing the value of information assets. The company is proud to secure the data of many Fortune 500 companies committed to responsible data stewardship.


Dataguise DgSecure delivers the most precise data-centric governance solution that detects, audits, protects, and monitors sensitive data assets in real time wherever they live and move across the enterprise and in the cloud. This eases the governance of sensitive data with an out-of-the-box solution that’s simple to implement and use — no programming required — saving time, resources, compliance costs, and complication. That means your organization can do with your data what it couldn’t do before due to security concerns: make better business decisions, gain greater customer insight, move to the cloud, and generate new revenue streams.


General Data Protection Regulation (GDPR) Compliance: Get There Faster.

The European Union’s new General Data Protection Regulation (GDPR) has helped bring data privacy and proper data handling to the attention of enterprise executives around the globe. Fully enforced by 25 May 2018, the GDPR is a massive piece of legislation that requires data privacy to be baked into enterprise data handling—and it applies to any company that handles the personal data of EU residents, even if a company has no physical presence in the EU. With potential fines for non-compliance as high as 4% of your annual worldwide revenue, how is your enterprise preparing for General Data Protection Regulation (GDPR) compliance?

Take the Smarter Path with Dataguise

Dataguise is the only vendor to provide end-to-end sensitive data audit and protection to help you meet General Data Protection Regulation (GDPR) compliance requirements quickly and maintain compliance as your business grows. Dataguise DgSecure empowers you with the ability to detect, protect, audit, and monitor sensitive data in near real time across your enterprise data repositories, both on premises and in the cloud—all from a single platform.

The Fundamental First Step: Sensitive Data Discovery

If you don’t know where all your sensitive data is, you can’t pass an audit. Dataguise DgSecure can discover sensitive personal data in structured, semi-structured, and unstructured formats, and delivers comprehensive, visual reports and dashboards showing you precisely what sensitive data you have, where it is located, and whether or not it is being masked or encrypted. With this complete audit of your data, you can determine what next steps are needed for General Data Protection Regulation (GDPR) compliance.

Reduce Regulatory Oversight with Data Masking and Data Encryption

Only sensitive data that is germane to the business need for which data processing occurs is allowed to be part of that processing. Masked or encrypted data., however, may not necessarily be considered sensitive. Furthermore, data subjects’ rights to their data may not apply if the data cannot be easily attributable to them. Dataguise DgSecure allows extensive business applications of data without dramatically raising your enterprise’s data handling liability with regards to General Data Protection Regulation (GDPR) compliance.

Simplify Ongoing General Data Protection Regulation (GDPR) Compliance

General Data Protection Regulation (GDPR) compliance isn’t a one-time or even once-a-year requirement. Your enterprise will need to maintain a constant state of compliance—no small feat, as big data gets bigger, cloud usage grows, and more users access more data for greater business insights. Sensitive data will be flowing continually into and out of your enterprise. Dataguise DgSecure can help you detect, protect, and monitor sensitive data in real-time, continuous processes, while providing your executives one consolidated view of compliance and risk positions at any given time.

Migrating to the cloud with sensitive data

Cloud migration can be a risky prospect for any company. For one that handles sensitive data — whether personal, financial, or health-related data — it’s usually either a major undertaking or an outright impossibility.

With Dataguise, cloud migration is simpler and safer.

Wherever you are on your cloud migration journey, only Dataguise can give you the visibility and control you need to keep sensitive data safe. Our simple, powerful solution for sensitive data governance delivers a unique combination of detection, protection, and monitoring capabilities that is unmatched in the industry.

Before Cloud Migration: Governing Sensitive Data on Premises

Dataguise helps you get cloud-ready by finding sensitive data in all your on-premises data repositories and then protecting it via masking or encryption. Dataguise can mask and encrypt data directly or be integrated with a third-party solution you may already have in place. You can install Dataguise either on the data source or on a remote/cloud machine that is pointed to the data source. Sensitive data detection and protection is performed based on PII, PCI, HIPAA, or any other custom policies defined by your organization.

Dataguise provides comprehensive, visual reports and dashboards showing you precisely what sensitive data you have, where it is located, and whether or not it is being masked or encrypted. With this complete audit of your data, you’ll be able to migrate to the cloud knowing your exact risk and compliance positions.

For any data you keep on premises, Dataguise can continue to detect, protect, and monitor sensitive data in real time on a continuous basis.

After Cloud Migration: Governing Sensitive Data in the Cloud

Once all sensitive data on premises has been detected and protected, you can move your data sets to the cloud with complete confidence and accountability. As with data on premises, after cloud migration is complete you’ll get comprehensive, visual reports and dashboards showing you precisely what sensitive data you have, where it is located, and whether or not it is being masked or encrypted. Dataguise will continue to detect, protect, and monitor sensitive data in the cloud per your enterprise policies.

Dataguise can also help you detect and protect sensitive data in data repositories that already exist in the cloud to eliminate any compliance or privacy issues. You can install Dataguise on premises and point it to data repositories in the cloud, or you can easily spin up a Dataguise instance from a cloud marketplace, such as the Amazon Web Services or Microsoft Azure marketplaces.

Discover and detect sensitive data more precisley across the enterprise and in the cloud

As big data gets bigger and more enterprises adopt the cloud, many companies lose track of where sensitive data is located, while some don’t even realize that it’s there at all… thus, they can’t take appropriate measures to protect it. It’s this sensitive data inadvertently left in the clear that causes the biggest pains for companies when they get audited or experience a breach.

DgSecure Detect enables you to discover, count, and report on sensitive data assets in real time wherever they live or move across data repositories, on premises and in the cloud. It’s a precise, highly scalable, resilient, and customizable solution, finding and summarizing sensitive data at the element level.

It’s easy to use our pre-defined templates for sensitive data types to quickly build security policies, and build your own customized sensitive data elements through a sophisticated regular expression (regex) pattern builder. DgSecure Detect then combs through structured, semi-structured, or unstructured content (across databases, Hadoop, Teradata, Cassandra, NoSQL, files, and SharePoint), and finds sensitive data, such as credit card numbers, Social Security Numbers, names, email addresses, medical IDs, ABA bank routing numbers, and financial codes.

  • Handles high volumes of disparate, constantly moving, and changing data with time stamping to support incremental change and life cycle management.
  • Supports a fluid or flexible information governance model that has a mix of highly “invested” (curated) data as well as raw, unexplored (gray) data such as IoT (Internet of Things) data, clickstreams, feeds, and logs.
  • Handles a variety of data stores such as traditional relational databases and enterprise data warehouses as well as non-relational big data sources (Hadoop) and file repositories (SharePoint and file shares).
  • Processes structured, semi-structured, and unstructured or free-form data formats.
  • Provides automated detection and processing of a variety of file formats and file/directory structures, leveraging meta-data and schema-on-read where applicable.
  • Provides deep content inspection using techniques such as patent-pending neural-like network (NLN) technology, and dictionary-based and weighted keyword matches to detect sensitive data more accurately.

Understand and assess your sensitive data security risks across the enterprise and in the cloud

With threat levels rising both inside and outside organizations, enterprises need sophisticated audit capabilities to understand their sensitive data — including where it is located, whether it is protected or exposed, and who has access to it.

    • Through a single, unified dashboard, see the location and present status (protected or exposed) of sensitive data across all data repositories.
    • Generate alerts that notify you whenever sensitive data is discovered.
    • Produce Sensitive Data Entitlement Reports — the first available in the Hadoop market — outlining which data elements in which files or directories are accessible by which users. We generate these reports by reading and accessing Access control list information stored in Apache Ranger, Apache Sentry, and MapR ACL systems.

Sensitive Data Masking and Encryption

Data breaches happen, all too often. But there is a way to protect your organization’s most valuable and sensitive data even if it does fall into the wrong hands.

Dataguise delivers the first fully automated, 100% programmer-free way to lock and encrypt cell- or field-level information across all data repositories. Our fine-grained, end-to-end, data-centric protection is the most precise available — giving your organization the highest level of security. DgSecure encrypt engines run as fully automated processes (agent) across standard Hadoop ingest methods (Flume, Sqoop, and FTP) as well as for data at-rest in certified MapReduce and HIVE agents for Cloudera, Hortonworks, MapR, Pivotal, IBM Big Insights, Amazon EMR, and Microsoft HD Insights.

Dataguise’s sensitive data protection capabilities enable large enterprises in industries including finance, insurance, healthcare, government, technology and retail to:

  • Reduce breach risk and data loss through sensitive data protection.
  • Address compliance, privacy, and regulatory mandates for PII, PCI, PHI, HIPAA and data privacy and data residency laws.
DgSECURE Protect Capabilities:
  • State-of-the-art AES and NIST-recognized format-preserving encryption options.
  • Automated, policy-based encryption for sensitive data in TXT, AVRO, Sequence, RC, ORC, JSON, XML file formats.
  • Industry standard Key Management Interface Protocol (KMIP) client support for leading key management facilities provided by Safenet, RSA, Thales, and other KMIP key server systems.
  • The ability to control and monitor internal decryption authorization via internal ACLs, or ACLs mapped to existing LDAP/Active Directory authorization groups to gain better protection against insider risks.
  • Can be combined with data masking algorithms to give customers flexibility and choice when needing to share data with “semi-trusted” users either inside the organization or with external partners.

Identify a potential data breach in minutes, not months

Most companies don’t know they’ve had a data breach until months after the damage has been done. A 2015 study by the Ponemon Institute found that malicious attacks can take an average of 256 days to identify while data breaches caused by human error take an average of 158 days to identify. It also confirmed that the longer it takes to identify a breach, the greater the cost.

Why does it take so long? With a plethora of security technologies in place, enterprises must sift through mounds of data about their data before understanding where real threats exist.

DgSecure Monitor offers an early warning system focused solely on safeguarding the sensitive data an organization truly cares about, cutting through the clutter to detect potential data breaches in just minutes. It keeps track of who is doing what to your organization’s sensitive data—whether stored on premiseS or in the cloud—and delivers real-time, policy-based alerts whenever unauthorized access or unusual access behavior occurs.

DgSECURE MONITOR capabilities:
  • Fast and easy creation of sensitive data governance policies using pre-built or custom templates—no coding required
  • Continuous monitoring of all attempts to access sensitive data and the results (e.g., read, write, delete, copy, failed attempts)
  • Immediate alerting to direct policy violations
  • Immediate alerting to atypical user behavior, based on profile analytics and machine learning—crucial to detecting threats from stolen insider credentials
  • Comprehensive coverage across on-premises and cloud environments, including Hadoop, Cassandra, Amazon S3, and Blob storage
  • Dashboard views of alerts, policies, metrics, and trends to understand the extent of monitoring coverage and potential exposure of sensitive data types or sources

Dataguise’s new cloud-based platform delivers secure, online access to our industry-leading data governance and compliance software

Easy Just Got EASIER!

Dataguise DgSecure software has long been recognized by customers for its ease and simplicity to deploy – requiring no coding to set up. By adding our On Demand Software as a Service (SaaS) solution, businesses can now take ongoing advantage of our powerful sensitive data discovery software with even greater ease.

A Few Clicks. All Set.

Start scanning your data in no time with DgSecure OnDemand’s quick and straight-forward setup. Users simply click on a URL we provide to see a list of available databases, select those they want to run data discovery scans on and wait for the results. No extra hardware. No software configurations.No additional resources or coordination needed.

Leverage Dataguise’s Compliance Expertise.

Having a powerful data discovery tool is in itself great. Maximizing it for your business with DgSecure On Demand overcomes what could have presented unforeseen data compliance challenges. DgSecure On Demand comes with expert built-in policies by default, allowing you to choose from a list of popular U.S. privacy regulations such as HIPAA, PCI, and PII. Once any of our policies is selected, DgSecure On Demand will classify data specific to your chosen compliance needs – simple as that!


Start scanning your data in just a few clicks with DgSecure. The process couldn’t be any easier. Users simply click on a URL we provide to see a list of available databases available, select those they want to run data discovery scans on and wait for the results. No extra hardware. No software configurations. No additional resources or coordination needed.


Start scanning your data in just a few clicks with DgSecure. The process couldn’t be any easier. Users simply click on a URL we provide to see a list of available databases available, select those they want to run data discovery scans on and wait for the results. No extra hardware. No software configurations. No additional resources or coordination needed.

What is Data Minimization?

Data minimization refers to measures performed by organizations to limit the personal data they collect and process from individuals to include only information that is relevant or necessary to accomplish specific purposes.

Benefits of Data Minimization
  • Essential principle of data protection
  • Decreases internal and external threat surface areas
  • Adheres to EU GDPR compliance
  • Might reduce data storage costs
Dataguise Solutions for Data Minimization

Dataguise DgSecure software provides powerful tools to simplify data minimization for businesses regardless of the amount of data or location(s) of the data being stored.

Data Discovery

DgSecure’s powerful data discovery scans across multiple data repositories including cloud storage in order to identify potentially sensitive data collected by an organization no matter whether the data is structured, unstructured, or saved as free-form text.

Data Mapping

Once data discovery is complete DgSecure will map out an inventory detailing classification and locations where the sensitive data was detected. Businesses can then leverage the data mapping to identify data to be remediated or sensitive data to be deleted.

Data Protection

Once data discovery is complete DgSecure will map out an inventory detailing classification and locations where the sensitive data was detected. Businesses can then leverage the data mapping to identify data to be remediated or sensitive data to be deleted.

Data Minimization in the EU General Data Protection Regulation (GDPR)

Data minimization is mentioned numerous times within the GDPR, both as requirements and safeguards. Data minimization is included within the following GDPR articles:

  • Article 5 (Chapter II): Data minimization is identified as a requirement under the principles for processing personal data. Specifically, the GDPR states, “personal data shall be adequate, relevant and limited to what is necessary in relation to the purposes for which they are processed”.
  • Article 25 (Chapter IV): As a measure for data protection by design and by default, GDPR requires organizations to incorporate data minimization into the total lifecycle of their products, services, and processes.
  • Article 47 (Chapter V): Binding corporate rules (BCRs) need to include data minimization, with respect to the personal data processing principles, for approval as a safeguard to transfer personal data to third countries or international organizations.
  • Article 89 (Chapter IX): Data minimization is reiterated as a principle for processing personal data in relation to archiving for scientific, historical or statistical purposes.

To learn more about the advantages of DgSecure data minimization overall, as a first step in your GDPR compliance or to setup a demo, contact us today!

DgSecure Software Solutions

In data governance & privacy compliance, data classification tools help organizations categorize their data based upon custom or predefined policies, which can be used to ensure the security of their sensitive personal data.

Growing public concern for data privacy has resulted in governments around the world taking a closer look at how organizations obtain, and process, sensitive personal data. This has resulted in the creation of new stringent data privacy laws, such as the General Data Protection Regulation (GDPR) and California Consumer Privacy Act (CCPA).

Dataguise’s DgSecure delivers powerful data classification software providing enterprise organizations with deeper insights into their data governance & privacy compliance programs, such as:

  • What type of sensitive personal data is collected?
  • Where is sensitive personal data stored?
  • Who has access to sensitive personal data?
  • How secure is sensitive personal data & does it adhere to compliance regulations?


Predefined Privacy Policies

DgSecure comes with a handful of predefined, out-the-box policies to choose from, allowing customers to begin classifying their data quickly with just a few clicks. DgSecure’s predefined policies cover highly-recognized regulatory compliances, including:

  • PCI
  • PII
  • GDPR
Customizable Policy Builder

For customers needing customized data classification policies, DgSecure provides a powerful, yet simple to use, policy builder capable of categorizing data based upon an organization’s specific needs. Start with predefined sensitive types, such as credit card number, social security, email, etc., adding additional sensitive types based upon organizational customizations.

Persistent Data Classification

Once categorized, access to classified sensitive data is tracked on the DgSecure platform, allowing organizations to monitor the data over time. DgSecure’s persistent classification provides valuable data insight, which can be integrated with an organization’s access control system to ensure constant privacy of sensitive personal data while in motion or at rest.

Analyze Results Easily

Dataguise customers can review the results of their data classification tasks through the DgSecure Dashboard or via file export, across multiple supported formats, including pdf, csv, etc. Whether through the dashboard or export, organizations can analyze the data easily in order prioritize vulnerabilities based upon data categorizations.

Simple Workflow

Running Dataguise data classification across an organization’s repositories is simple as 1-2-3. First, pick a predefined policy or create a custom one using the policy builder; pick the repositories to run the policies against, either a single instance or over scheduled intervals; wait for the results and analyze the data. It’s that simple!

Learn more about DgSecure’s powerful, easy-to-use, and flexible data classification tool, contact us today!



Let’s talk about how we can help you drive your business transformation.


Close Menu