Image auditor.jpg

Automated Detection & Management of Illicit Image Risk on Corporate Networks

  • Scanning ‘behind the firewall’ to discover where inappropriate content is stored

  • Scanning data-at-rest across all I.T. resources: mail, file-shares and desktops/laptops, DBs, Document stores such as SharePoint

  • Non obtrusive to existing IT processes

  • Auditing for image risk in 150 different file types

  • Comprehensive case file management for review and reporting of discovered content

  • Removal of reported images