Welcome to a new era in sensitive data discovery

Seeker is data loss prevention (DLP) software designed to match and even exceed the sensitive data detection capabilities offered by leading DLP software vendors for a fraction of the cost. Seeker can perform scans at large scale and read a wide variety of file formats.
  

Manage everything from one place

Seeker was designed to allow an administrator to work from a single console to scan data at rest across servers, client Windows and Mac workstations, and SMB file shares in a Windows and Active Directory environment. It also scans websites, DBMS Servers (SQL Server, Oracle, MySQL) and even OneDrive cloud storage. Whether you want to locate sensitive data for your own organization or are consulting to perform IT risk assessment on customer networks from a laptop, Seeker is the solution for you.

Seeker DLP Console
  

Seeker Reporting

Actionable reports

In addition to detecting the most common forms of sensitive data such as social security numbers and credit cards, Seeker can also flag files within scan results having file system permissions that might be of concern (e.g. the Everyone group has Read rights to a file with SSNs or CCNs). Additionally, Seeker allows you to alert on given strings in the path of a file, i.e. “Dropbox” or “OneDrive”.

  

Customizable Detection Patterns

Seeker comes with the ability to find things like social security numbers (SSNs), credit card numbers (Visa, MasterCard, and many more), Canadian SINs, Brazilian CPF and RG, Australian TFNs, Hong Kong IDs and more. IT security pros can use the built-in patterns to search for passwords and SSH or AWS keys. Looking for something specific to your organization? Not a problem, Seeker allows custom patterns to easily be added to any scan.

 

App screen 3

Get started today

Start scanning for sensitive data in minutes. Seeker offers a 30 day trial to see if it is the right fit
for your environment.
  • Seeker has completely changed the way we run our DLP service. Previously, we struggled to ensure all assets were being scanned due to cost and configuration difficulties. With Seeker, these challenges are gone.
    Chris H.