{"id":1365,"date":"2022-06-24T13:57:54","date_gmt":"2022-06-24T09:57:54","guid":{"rendered":"https:\/\/demo.dedote.com\/cyberdisti\/?page_id=1365"},"modified":"2022-06-24T14:00:36","modified_gmt":"2022-06-24T10:00:36","slug":"dece-software","status":"publish","type":"page","link":"https:\/\/demo.dedote.com\/cyberdisti\/dece-software\/","title":{"rendered":"DECE Software"},"content":{"rendered":"<p>[vc_row css_animation=&#8221;fadeInUp&#8221; css=&#8221;.vc_custom_1653494247141{padding-top: 0px !important;padding-bottom: 0px !important;}&#8221;][vc_column width=&#8221;1\/3&#8243; css=&#8221;.vc_custom_1649185853909{padding-top: 2px !important;padding-bottom: 2px !important;}&#8221;][vc_single_image image=&#8221;1370&#8243; img_size=&#8221;full&#8221;][\/vc_column][vc_column width=&#8221;1\/3&#8243;][\/vc_column][vc_column width=&#8221;1\/3&#8243;][\/vc_column][\/vc_row][vc_row css=&#8221;.vc_custom_1649186926645{border-top-width: 20px !important;padding-top: 5px !important;padding-bottom: 5px !important;}&#8221;][vc_column css_animation=&#8221;fadeInLeft&#8221; width=&#8221;1\/2&#8243;][vc_column_text]<\/p>\n<h2 class=\"dcccard-title dcccard-title-big dccmobiletitlecenter\">Why Data Classification?<\/h2>\n<div class=\"dc-card-excerpt card-excerpt-center w-richtext\">\n<p>With data classification, you label your documents such as Word, PDF, or Excel according to their privacy or sensitivity level. Your labels can be Confidential\/Private\/Unclassified, or PII\/Contract, or as appropriate for your needs. Endpoint protection (DLP) software provides more accurate protection by acting according to these tags. We offer precise data discovery and automatic classification to ensure a better data protection infrastructure.<\/p>\n<h2 class=\"dcccard-title dcccard-title-big dccmobiletitlecenter\">DLP Integration<\/h2>\n<div class=\"dc-card-excerpt card-excerpt-center w-richtext\">\n<p>GEODI Classification solution works with known DLP solutions such as Forcepoint, Symantec, Safetica, Trend Micro, and Palo Alto. It can adapt to specialized labeling schemes that organizations may need. The creation of labels can be done quickly from the central management interface.<\/p>\n<h2 class=\"dcccard-title dcccard-title-big dccmobiletitlecenter\">Exchange Server\/Office 365 Classifier<\/h2>\n<div class=\"dc-card-excerpt card-excerpt-center w-richtext\">\n<p>OWA, Exchange Server, and Webmail users can classify outgoing e-mails automatically or manually.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<p>[\/vc_column_text][vc_column_text]<\/p>\n<h2 class=\"dcccard-title dcccard-title-big dccmobiletitlecenter\">Why Data Discovery?<\/h2>\n<div class=\"dc-card-excerpt card-excerpt-center w-richtext\">\n<p>Data discovery unearths the hidden value of your data. Data Discovery helps organizations find and remediate Personal data for GDPR compliance, sensitive data for enterprise data security, currency expressions and financial data for PCI\/DSS compliance, and more. A precise AI and NLP-based data discovery from structured and unstructured data results in low false positives&amp;negatives rates. With the Discovery reports and dashboards, your inventory and risks will unearth. The discovered sensitive and personal data can be a source for proper Data Classification and Data Masking.<\/p>\n<\/div>\n<p>[\/vc_column_text][vc_column_text]<\/p>\n<h2 class=\"dcccard-title dcccard-title-big dccmobiletitlecenter\">GDPR Data Discovery<\/h2>\n<div class=\"dc-card-excerpt card-excerpt-center w-richtext\">\n<p>ID Numbers, Social Security Numbers, e-mails, Blood types, Addresses, and other personal data will be discovered. The result will turn into which data sources and which computer contains personal data. According to this report, you can execute the authorizations and quarantining procedures. With Data Masking, you shall anonymize personal data and sensitive data.<\/p>\n<\/div>\n<p>[\/vc_column_text][\/vc_column][vc_column css_animation=&#8221;fadeInRight&#8221; width=&#8221;1\/2&#8243;][vc_column_text]https:\/\/youtu.be\/pTSPpZpBJQA[\/vc_column_text][vc_column_text css=&#8221;.vc_custom_1656064176950{background-color: #ffffff !important;border-radius: 1px !important;}&#8221;]<\/p>\n<h2 class=\"dcccard-title dcccard-title-big dccmobiletitlecenter\">Our Differences<\/h2>\n<div class=\"dc-card-excerpt card-excerpt-center w-richtext\">\n<p>Thanks to Natural Language Processing, content such as a PDF, a scanned document, an excel report, a Social media message, or an e-mail is discovered with high accuracy. Your entire digital repository is covered. Not a single piece of data will be left out.<\/p>\n<p>Artificial Intelligence-based discovery tools, beyond simple regex-based discovery, also automatically discover complex sensitive and personal data types such as Blood Types, addresses, Subjects, and Document Types with low false-positive\/negative rates. You can also include face recognition from your video and photo library.<\/p>\n<p>Data discovery and Enterprise Search occur together. Whichever solution you start with, you can proceed to the next solution with a modular structure<\/p>\n<\/div>\n<p>[\/vc_column_text][vc_column_text]<\/p>\n<h2 class=\"dcccard-title dcccard-title-big dccmobiletitlecenter\">Reporting and Analysis<\/h2>\n<div class=\"dc-card-excerpt card-excerpt-center w-richtext\">\n<p>The discovery results will turn into interactive panels and reports for you to examine. Instead of employee declarations, you may have real insights into your data. Data leakage risks will surface. You can act your destruction or migration procedures.<\/p>\n<\/div>\n<p>[\/vc_column_text][vc_column_text]<\/p>\n<h2 class=\"dcccard-title dcccard-title-big dccmobiletitlecenter\">Fundamental Discovery<\/h2>\n<div class=\"dc-card-excerpt card-excerpt-center w-richtext\">\n<p>Fundamental discovery tools discover dates, place names, legal terms, and banking terms. Discovered dates create a calendar.<\/p>\n<\/div>\n<p>[\/vc_column_text][\/vc_column][\/vc_row][vc_row css_animation=&#8221;fadeInUp&#8221; css=&#8221;.vc_custom_1653494296557{padding-top: 20px !important;padding-bottom: 20px !important;}&#8221;][vc_column][vc_btn title=&#8221;View Website&#8221; size=&#8221;lg&#8221; i_icon_fontawesome=&#8221;fas fa-globe&#8221; add_icon=&#8221;true&#8221; el_class=&#8221;buttonwebsite&#8221; link=&#8221;url:https%3A%2F%2Fwww.decesoftware.com%2F|title:DECE%20Software&#8221;][\/vc_column][\/vc_row]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>[vc_row css_animation=&#8221;fadeInUp&#8221; css=&#8221;.vc_custom_1653494247141{padding-top: 0px !important;padding-bottom: 0px !important;}&#8221;][vc_column width=&#8221;1\/3&#8243; css=&#8221;.vc_custom_1649185853909{padding-top: 2px !important;padding-bottom: 2px !important;}&#8221;][vc_single_image image=&#8221;1370&#8243; img_size=&#8221;full&#8221;][\/vc_column][vc_column width=&#8221;1\/3&#8243;][\/vc_column][vc_column width=&#8221;1\/3&#8243;][\/vc_column][\/vc_row][vc_row css=&#8221;.vc_custom_1649186926645{border-top-width: 20px !important;padding-top: 5px !important;padding-bottom: 5px !important;}&#8221;][vc_column css_animation=&#8221;fadeInLeft&#8221; width=&#8221;1\/2&#8243;][vc_column_text] Why Data Classification? With&#8230;<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-1365","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/demo.dedote.com\/cyberdisti\/wp-json\/wp\/v2\/pages\/1365","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/demo.dedote.com\/cyberdisti\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/demo.dedote.com\/cyberdisti\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/demo.dedote.com\/cyberdisti\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/demo.dedote.com\/cyberdisti\/wp-json\/wp\/v2\/comments?post=1365"}],"version-history":[{"count":5,"href":"https:\/\/demo.dedote.com\/cyberdisti\/wp-json\/wp\/v2\/pages\/1365\/revisions"}],"predecessor-version":[{"id":1372,"href":"https:\/\/demo.dedote.com\/cyberdisti\/wp-json\/wp\/v2\/pages\/1365\/revisions\/1372"}],"wp:attachment":[{"href":"https:\/\/demo.dedote.com\/cyberdisti\/wp-json\/wp\/v2\/media?parent=1365"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}