Swift Data Classification Engines
Overview and Purpose
Our hosted detection engine automatically scans, identifies, and classifies sensitive data across customer environments. Leveraging a comprehensive library of over 250 pre‑configured rule templates and more than 1,200 data identifiers, our solution ensures that organizations meet critical regulatory requirements—such as GDPR, HIPAA, PCI-DSS, CCPA, and various anti‑money laundering standards. In addition, customers have the flexibility to create custom rules and data identifiers, tailoring detections to their specific needs.
Hosted Detection Engine Architecture
Our multi‑layered detection framework is built from the ground up to deliver precise, real‑time data protection. The architecture comprises four distinct layers:
1. Data Identifiers
• Foundation: Over 1,200 data identifiers form the most atomic layer of our detection engine. These identifiers are designed to automatically recognize sensitive information using a variety of detection methods, including regex patterns, keyword matching, or a hybrid of both. This robust approach allows our system to detect subtle variations in data formats and capture complex patterns that may indicate the presence of sensitive content.
• Coverage and Precision: The identifiers are engineered to target a wide spectrum of data formats—from personal identity documents and financial records to biometric markers and genetic data. With support for compliance in more than 67 countries and across multiple industries, these identifiers ensure that every nuance of sensitive data is captured with high accuracy and minimal false positives.
2. Rules
• Logic Layer: More than 250 pre‑configured rule templates combine one or more data identifiers to create high‑level detection logic. Rules act as the orchestrators, defining how individual identifiers work together to detect broader categories of sensitive data. They consolidate multiple detection criteria into actionable logic, ensuring that data is accurately classified according to its risk level and regulatory impact.
• Customization and Advanced Configuration: Each rule template comes with configurable parameters, such as threshold levels (which determine how many occurrences trigger a detection), occurrence counts, and exception criteria. This allows organizations to fine‑tune the sensitivity of detections based on their specific operational context. Additionally, customers can develop custom rules to address unique scenarios or emerging threats. For those with specialized requirements, an XML editor is available, enabling advanced users to craft highly tailored rule definitions that precisely meet their business and compliance needs.
3. Data Profiles
• Selection and Aggregation: Data Profiles enable customers to choose from the full suite of available rules—selecting only those that are pertinent to their environment. By aggregating the chosen rules into a cohesive profile, customers achieve focused and efficient detections that are aligned with the sensitive data types relevant to their operations.
• Flexibility: Organizations can mix and match both standard and custom rules within a Data Profile to create detection packages tailored to their specific risk and compliance priorities.
4. DLP Policies
• Scope and Enforcement: DLP (Data Loss Prevention) policies provide the final layer by defining how detected data should be managed. These policies integrate the Data Profiles and add crucial scoping elements such as user identity, user action (e.g., editing, transmitting, or sharing), destination endpoints, and specific policy actions (such as alerting, blocking, or redaction).
• Control: This integrated approach ensures that once sensitive data is detected, the appropriate safeguards are automatically triggered in line with organizational standards and regulatory mandates.
Summary:
Summary Our hosted detection service delivers an industry-leading solution for automatic data classification and compliance assurance. Powered by over 250 rule templates built on more than 1,200 data identifiers that employ both regex and keyword detection, our layered architecture—from data identifiers to rules, Data Profiles, and DLP Policies—provides comprehensive, real‑time protection across 67+ countries and multiple industries. With extensive customization options, including the ability to create custom rules and identifiers and to fine‑tune detection parameters via an XML editor, our service empowers organizations to confidently manage sensitive data, reduce risk, and maintain compliance with evolving regulatory requirements.
This summary is intended for customer use and reflects our unique terminology, multi‑layered detection architecture, and flexible customization options within our fully hosted service model.
Last updated