Breakwater DSAR Response

Perform DSAR response on unstructured data to drive insight and compliance.

Software Overview

Breakwater DSAR ResponseTM helps organizations comply with GDPR, CCPA/CPRA, and other privacy regulations. It compliments and augments your existing DSAR compliance system by extending your ability to locate and act upon customer data within your enterprise.

Because GPDR allows individuals to request a full list of personal data that an organization stores on them, searching standard databases is not sufficient. Structured data systems, like customer relationship management, marketing automation, ecommerce orders and transactions are relatively easy to search and export targeted customer data. The reality is that this data is often exported by employees for other tasks, typically for importing between systems, or performing data cleansing or analysis on their local computers. As a result, customer data can often be found on laptops, files stores, content repositories, and collaboration systems. This is where Breakwater can help.

Download Datasheets
 

Key Features

Data Identification & Categorization

Identify Any Content, Anywhere in Your System

Examples:

  • Employee data: name, address, email
  • Client data: name, address, email
    SSN, CCN, acct number, DL number, passport number
    PHI/HIPAA Data
  • Source code
  • Intellectual property
  • Contracts
  • Financial statements
  • Junk/ROT
  • Database info extracts

Data Lineage

Shows Document Lifecycle

  • Creation, change, and movement
  • Map to people and organizations/groups

Identifies Data Flows

  • Business processes: aggregate repeated process by time, person, or organization
  • Data flows between organizations, systems, and people

Patent-Pending Blockchain Technology

Chain together documents using:

  • Initial hash
  • Hash on save
  • Hash on open
  • Who accessed the file
  • Who took the action
  • Detect branching
  • Immutable and reliable
  • Centrally tracked

Data Actions

Actionable Intelligence

  • Based on custom and built-in policies
  • Actions can be permanent, temporary, user-selected, targeted
  • Actions can be taken on data elements, documents, employees, organizations

Action Automation

  • Mask
  • Delete
  • Alert/report
  • Quarantine

Employee & Organization Mapping

See Into the Past

  • Provides a historical record of employees and organizations within your company over time: name changes, email address changes, reporting hierarchy, access rights, system platforms
  • See how employees have moved in and out of roles/organizations, what data they’ve accessed in different roles, and where it’s been stored
  • Reconstruct the organization at any given point in time or track its changes over time

Insight & Intelligence

  • See how your data is being used by individuals, business units, cross-functional teams, and the entire company
  • Support look-back and forward-looking determinative business decisions
  • Add dimension to your data risk by marrying the who/what/when/where of your organization to the data
  • Go deeper into your data telemetry
  • Inform business scenarios including incident response, Junk/ROT, and legal hold

Data Visualization

Your Data Brought to Life

  • API-based architecture integrates with BI and other reporting applications for a single view
  • Pre-defined widgets for visualization
  • Define criteria for visualization and reporting
  • Know and understand where data resides and flows around the world
  • Real-time and historical visualization
  • Data metrics (# of files, gigabytes, etc.)

Administration

Control Your Environment

  • Manage installation centrally
  • Customize by employee and actions
  • Customize by employee
  • Manage resources
  • Manage email templates
  • Add/remove users
  • Inclusion/exclusion

Want to learn more about how we can help?