Breakwater Solutions
  • Home
  • Products
    • Product Overview
    • StoredIQ for Information Governance
    • StoredIQ for Legal
    • StoredIQ InstaScan
    • Breakwater Cyber Response
    • Breakwater DSAR Response
    • Breakwater Inventory
    • Atlas Policy Management
    • Atlas eDiscovery Management
    • eDiscovery Manager
  • Consulting & Advisory
    • Consulting & Advisory Overview
    • Information Governance
    • Litigation & Disputes
    • Investigations & Regulatory Response
    • Cybersecurity
    • Global Data Privacy
    • Legal Data & Technology Solutions
    • Professionals
  • Managed Services
  • About
    • About
    • Leadership
    • News
    • Careers
    • Resources
  • Contact
  • Search
  • Menu Menu

Breakwater Cyber Response

Proactive and reactive control failure assessment of unstructured data.

Breakwater Cyber ResponseTM helps security teams perform control failure assessment and incident response of unstructured data. It can help your team identify any gaps between your risks and controls and evaluate the effectiveness of current solutions. Utilize data lineage capabilities to uncover the operational reality of the enterprise environment. Provide an independent report on the data flows and data usage, showing the true effectiveness of the controls. Identify how changes in the security control environment change the behavior and usage patterns of unstructured data. Ensure your control environment is working as designed and expected. Identify failures in the control environment before a security event. Rationalize information security program and budget based on operational reality of the data environment. Quickly scope systems and sensitive data to identify exposure during a breach.

Benefits

Eliminate Uncertainty

Identify exactly what has been breached using data identification and categorization. Track lineage to identify the full scope of the breach. Define the scope of exposure and confirm containment. Identify breaches and potential breaches in real-time with alerts.

Answer Key Questions

Track the issue at employee and organizational levels, using data lineage to identify who accessed unstructured data, at what times, for what purpose.

Take Immediate Action

Respond to and remediate breaches to contain the risk using alerts, data masking, and quarantining files.

Key Features

Data Identification & Categorization

IDENTIFY ANY CONTENT, ANYWHERE IN YOUR SYSTEM

Examples:

  • Employee data: name, address, email
  • Client data: name, address, email
  • SSN, CCN, acct number, DL number, passport number
  • PHI/HIPAA Data
  • Source code
  • Intellectual property
  • Contracts
  • Financial statements
  • Junk/ROT
  • Database info extracts
Data Lineage

SHOWS DOCUMENT LIFECYCLE

  • Creation, change, and movement
  • Map to people and organizations/groups

IDENTIFIES DATA FLOWS

  • Business processes: aggregate repeated process by time, person, or organization
  • Data flows between organizations, systems, and people

PATENT-PENDING BLOCKCHAIN TECHNOLOGY

  • Chain together documents using:
  • Initial hash
  • Hash on save
  • Hash on open
  • Who accessed the file
  • Who took the action
  • Detect branching
  • Immutable and reliable
  • Centrally tracked
Data Actions

ACTIONABLE INTELLIGENCE

  • Based on custom and built-in policies
  • Actions can be permanent, temporary, user-selected, targeted
  • Actions can be taken on data elements, documents, employees, organizations

ACTION AUTOMATION

  • Mask
  • Delete
  • Alert/report
  • Quarantine
Employee & Organization Mapping

SEE INTO THE PAST

  • Provides a historical record of employees and organizations within your company over time: name changes, email address changes, reporting hierarchy, access rights, system platforms
  • See how employees have moved in and out of roles/organizations, what data they’ve accessed in different roles, and where it’s been stored
  • Reconstruct the organization at any given point in time or track its changes over time

INSIGHT & INTELLIGENCE

  • See how your data is being used by individuals, business units, cross-functional teams, and the entire company
  • Support look-back and forward-looking determinative business decisions
  • Add dimension to your data risk by marrying the who/what/when/where of your organization to the data
  • Go deeper into your data telemetry
  • Inform business scenarios including incident response, Junk/ROT, and legal hold
Data Visualization

YOUR DATA BROUGHT TO LIFE

  • API-based architecture integrates with BI and other reporting applications for a single view
  • Pre-defined widgets for visualization
  • Define criteria for visualization and reporting
  • Know and understand where data resides and flows around the world
  • Real-time and historical visualization
  • Data metrics (# of files, gigabytes, etc.)
Administration

CONTROL YOUR ENVIRONMENT

  • Manage installation centrally
  • Customize by employee and actions
  • Customize by employee
  • Manage resources
  • Manage email templates
  • Add/remove users
  • Inclusion/exclusion

Software Products

Software Overview
StoredIQ for Information Governance
StoredIQ for Legal
StoredIQ InstaScan
Breakwater Cyber Response
Breakwater DSAR Response
Breakwater Inventory
Atlas Policy Management
Atlas eDiscovery Management
eDiscovery Manager

Our Locations

US
Austin, TX (HQ)
Chicago, IL
New York, NY

Switzerland
Basel

Ireland
Dublin

UK
London

Germany
München

Hong Kong

United Arab Emirates

Croatia

India

Worldwide
Remote

Phone

(800) 358-0125
(512) 713-1955

Connect With Us

Legal Notices

Privacy Statement

Cookie Statement

Terms of Use

© 2022 Breakwater Solutions, LLC
Scroll to top
Manage Cookie Consent
We use cookies to optimize our website and our service.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage vendors Read more about these purposes
View preferences
{title} {title} {title}