SIFT™ Core Use Cases

Take Control Of Your Cloud Data


Protect Sensitive Digital Content

SIFT™ safeguards against the costs associated with a failure to safeguard company data:


  • Data Exposure. Confidential data such as company financial information or intellectual property can be exposed.
  • Reputational Damage. Companies can suffer loss of public trust, which in some cases can destroy a company’s business model.
  • Rework. An average of just 0.45% of files are opened by someone who is not the original author.
  • System Availability. Ransomware attacks can completely shut down a business, sometimes for days or weeks.
  • Regulatory Action. Fines and even jail time may await companies and executives who fail to comply with regulatory standards.


Publish Files Based On Keyword Content

SIFT™ scans files for keywords, and moves them to the proper network location, either on-prem or in any cloud, based on keywords discovered in the files. Keywords may be defined statically, or based on regular expression (RegEx) patterns. SIFT™ also ships with an advanced machine learning algorithm that supports identifying specific shapes in pictures and video files. SIFT™ natively supports both searchable documents (e.g., MS Office) and non-searchable assets (e.g., pictures, video, and scanned PDFs).


Make All Files Securable & Searchable

SIFT™ stamps files with metadata corresponding to the keywords discovered. In the case of RegEx patterns, SIFT stamps an alias monicker defined for the data pattern, such as “SSN” for a social security number, or “IPADDR” for an IP address. SIFT’s advanced patented OCR pre-processing algorithm also ensures that even non-searchable content like pictures, video, and scanned PDF documents are also evaluated. Once files are stamped with meaningful metadata, they can be secured with technologies like DLP and DRM and ABAC, and found through enterprise search.


Identify and Recover From Data Spills

SIFT™ continuously scans the file locations it’s been told to monitor. Any new file, or changed file, is rescanned and its metadata is updated. This continuous monitoring capability is a critical component of FISMA compliance, helps ensure ongoing compliance with privacy legislation like HIPAA and GDPR, helps prevent and recover from data spills, and helps ensure protection of high value assets.