Prifender is using artificial intelligence technology to discover and map personal information across networks and systems, both structured and unstructured, while associating identities with their respective obligations so organizations can better manage and demonstrate accountability and compliance.
Automated discovery and mapping of personal information
Attach regulations and other obligations to each individual identity in the systems
Map and track the changes of personal information in specific business processes
Always know where personal information is and who can access it
Using Artificial Intelligence algorithms
Identify, map and match identities residing in unstructured repositories
Built for scale, managing hundreds of millions of identities
Demonstrate to auditors and regulators how obligations are met
Prifender follows four steps to discover, map and identify the identities it will manage. Prifender finds the identities throughout the network and its extensions.
Connect to source systems to build the identities inventory
Regularly crawl and track where those identities reside
Identify copies of those identities across networks
Associate each of the identities with their respective obligations
Once the initial identity inventory is discovered and mapped, Prifender enriches the data by attaching obligations (e.g. regulations, contracts and consents) and meta-data (e.g repository location, data access time stamp, etc.) to each of the identities.
Prifender’s identity aware technology allows organizations to reach new levels of control over personal information throughout its lifecycle with the following features:
An accurate listing of the personal information
Identify what data is moving between geographies
Track which identities are shared with a third party
Associate identities with the regulations that apply to them
Audit activities associated with the identities of interest
Associate each identity with the relevant notice
Track how identities move between systems, employees and suppliers
Associate choices made by data subjects across repositories, products and services
Address requests to review records, update identifiers and manage deletion workflows
Identify files containing personal information that can be archived or deleted
Maintain accuracy across repositories by updating the identifiers
Identify the identities impacted by a breach
"As privacy moves from policy and law to operations and execution, many privacy professionals are beginning to focus on the "how" of privacy within their organizations."
To receive updates from Prifender about our products and services, please provide us with the following information. You can always opt out from receiving messages from us. See a link to our privacy notice below.