Artificial Intelligence | News | Insights | AiThority
[bsfp-cryptocurrency style=”widget-18″ align=”marquee” columns=”6″ coins=”selected” coins-count=”6″ coins-selected=”BTC,ETH,XRP,LTC,EOS,ADA,XLM,NEO,LTC,EOS,XEM,DASH,USDT,BNB,QTUM,XVG,ONT,ZEC,STEEM” currency=”USD” title=”Cryptocurrency Widget” show_title=”0″ icon=”” scheme=”light” bs-show-desktop=”1″ bs-show-tablet=”1″ bs-show-phone=”1″ custom-css-class=”” custom-id=”” css=”.vc_custom_1523079266073{margin-bottom: 0px !important;padding-top: 0px !important;padding-bottom: 0px !important;}”]

Data Breach Discovery Software, Canopy, Adds New ‘Smart Tools’ to Accelerate the Identification of Affected Individuals

Cyber Security Professionals Gain Advanced Machine-Learning Technology to Assist Their Enterprise Clients

CanopyCo LLC, the data mining and breach review software developer, released several new “smart tools” to all subscribers of its flagship application, Canopy.  With the filtering, classification, and organization enhancements, Canopy users further reduce the volume of breached documents requiring human review and accelerate the identification of specific individuals who have been affected by the breach.

  1. Foreign Language Detection: Canopy detects the presence of 60 foreign languages in breached data populations. This enables reviewers to quickly pinpoint files that may be subject to stringent laws and regulatory timelines, and then prioritize their review accordingly.
  2. Image Classification: Canopy distinguishes between documents containing sensitive information like driver’s licenses or birth certificates and documents containing logos or advertising banners. This capability further reduces the quantity of documents requiring human review.
  3. ProfileBuilder allows reviewers to click on personally identifiable information (PII) in a document and instantly add it to the document tag as well as the affected individual’s profile in the system. With this new feature, Canopy users eliminate the risk, hassle and time associated with manually entering new detail.
  4. Entity360 aggregates every piece of PII that has been discovered for an individual during the project and displays the source documents side-by-side. This accelerates final QC and editing of the project.
  5. Image Gallery aggregates all of the image files that are present across all documents, enabling users to bulk-tag and classify images as junk or important for review. Canopy users no longer have to make this determination by going from document to document.

Read More: BetterCloud Appoints Andra Milender as Chief Technology Officer

Related Posts
1 of 32,294

“Traditional methods for data breach review are burdensome for the team and require significant amounts of data entry, which can be a daunting and error-prone task,” said Oran Sears, CTO for Canopy.  “These new features eliminate the risk, cost, and burden associated with building massive notification lists from mountains of compromised documents.”

Read More: California Consumer Privacy Act: A Recap of CCPA Requirements and Tips for Compliance

Powered by natural language processing, proprietary algorithms and machine learning technology, Canopy effectively reduces the false positives that are promoted for human review and facilitates a quicker breach notification process.

The collection of new “smart tools” dovetails with the popular Entity Resolution, Active Lookahead, and MapAccel capabilities in the platform. Since releasing its first iteration in 2018, Canopy has supported more than 40 business email compromises and data exfiltration incidents per month.

Read More: New Blockchain-Based Social Network and Digital Sharing Economic Ecosystem Alfa Launched on Indiegogo

1 Comment
  1. says

    Ꭱeally stunning books from a smɑller British publisher supplied гound tһe world

    my blog post; Learn more (

Leave A Reply

Your email address will not be published.