Swift Security Docs
  • Introduction to Swift Security
  • Onboarding
    • Tenant Setup
    • Product Deployments
      • Browser Extension
      • LLM Guardrails
        • LLM Guardrails API Integration
      • VS Code IDE Extension
    • Directory Sync
      • Configuring Google Directory Sync
      • Configuring Microsoft Directory Sync
    • MDM
      • Extension Deployment Via Google Workspace
      • Extension deployment via google workspace + MDM at device level
      • Extension Deployment Via Microsoft Intune
        • Chromium Browsers in Windows
        • Edge Browsers in Windows
        • Firefox Browsers in Windows
      • Extension Deployment Via Kandji
        • Chromium Browsers in Mac
    • Infrastructure
      • SaaS Model
      • Hybrid deployment (coming soon)
  • SSO (Single Sign-On)
    • SSO Configurations identity provider - Google workspace
  • Administrative Guide
    • Console Users
      • Role Creation
      • RBAC General Settings for Login Methods (for the Console)
      • User Creation
      • SSO login(okta)
    • Swift Detection Engines
      • Data Identifiers
        • Custom Data Identifiers
      • EDM Dictionaries
        • EDM Rule
        • EDM Profile
        • EDM Extension Policy
      • Data Rules
        • Custom Rules
      • Data Profiles
      • LLM Guardrail Scanners
        • Data Protection Scanner
        • Gibberish Scanner
        • Ban Substrings Scanner
        • Invisible Text Scanner
        • Code Scanner
        • Language Scanner
        • Sentiment Analysis Scanner
        • Jailbreak Scanner
        • Toxicity Scanner
        • Prompt Injection Scanner
        • Token Limit Scanner
        • Reading Time Scanner
        • Language Same Scanner
        • No Refusal Scanner
        • Factual Consistency Scanner
        • Bias Detection Scanner
        • URL Reachability Scanner
        • Nudity Scanner
        • Gender Scanner
        • Celebrity Scanner
        • Face Scanner
        • Race Scanner
        • Performance and Benchmark
    • Browser Extension
      • Extension Installation
      • Granular Policies
        • Control URL access
        • Protect company data
        • Protect against Threats (Coming Soon)
      • Extension Alerts
      • Extension Events
      • Extension Popups
      • Browser Extension Coverage
    • LLM Guardrails
      • LLM Guardrails Policies
      • LLM Guardrails Alert
      • LLM Guardrails Events
    • Regulation Laws
  • Assets
    • Applications
    • Users
    • Extensions
  • Integration
    • Notification
      • Jira
      • ServiceNow
      • Slack
      • Splunk
    • Forensic
    • Feature
      • Rules Glossary
        • United States
        • Canada
        • Latin America
        • European Union
        • Australia
        • APAC (Asia-Pacific)
        • EMEA Countries
        • Others
      • Data identifiers Glossary
        • United States
        • Canada
        • Latin America
        • European Union
        • Australia
        • APAC (Asia-Pacific)
        • EMEA Countries
        • Others
      • Supported MIME Types
      • Supported OCR Format
    • Manage unauthorized access from unmanaged browser
  • Settings
    • Manage Reasons
    • Audit Log
  • Release Notes
    • Version - 1.27
    • Version - 1.26
    • Version - 1.25
    • Version - 1.24
    • Version - 1.23
    • Version - 1.16
    • Version - 1.15
    • Version - 1.14
    • Version - 1.13
    • Version - 1.12
    • Version - 1.11
    • Version - 1.10
    • Version - 1.09
    • Version - 1.08
    • Version - 1.07
    • Version - 1.06
    • Version - 1.05
    • Version - 1.04
    • Version - 1.03
    • Version - 1.02
    • Version - 1.01
Powered by GitBook
On this page
  1. Administrative Guide

Swift Detection Engines

Overview and Purpose

Our hosted detection engine automatically scans, identifies, and classifies sensitive data across customer environments. Leveraging a comprehensive library of over 250 pre‑configured rule templates and more than 1,200 data identifiers, our solution ensures that organizations meet critical regulatory requirements—such as GDPR, HIPAA, PCI-DSS, CCPA, and various anti‑money laundering standards. In addition, customers have the flexibility to create custom rules and data identifiers, tailoring detections to their specific needs.

Hosted Detection Engine Architecture

Our multi‑layered detection framework is built from the ground up to deliver precise, real‑time data protection. The architecture comprises four distinct layers:

1. Data Identifiers

• Foundation: Over 1,200 data identifiers form the most atomic layer of our detection engine. These identifiers are designed to automatically recognize sensitive information using a variety of detection methods, including regex patterns, keyword matching, or a hybrid of both. This robust approach allows our system to detect subtle variations in data formats and capture complex patterns that may indicate the presence of sensitive content.

• Coverage and Precision: The identifiers are engineered to target a wide spectrum of data formats—from personal identity documents and financial records to biometric markers and genetic data. With support for compliance in more than 67 countries and across multiple industries, these identifiers ensure that every nuance of sensitive data is captured with high accuracy and minimal false positives.

2. Rules

• Logic Layer: More than 250 pre‑configured rule templates combine one or more data identifiers to create high‑level detection logic. Rules act as the orchestrators, defining how individual identifiers work together to detect broader categories of sensitive data. They consolidate multiple detection criteria into actionable logic, ensuring that data is accurately classified according to its risk level and regulatory impact.

• Customization and Advanced Configuration: Each rule template comes with configurable parameters, such as threshold levels (which determine how many occurrences trigger a detection), occurrence counts, and exception criteria. This allows organizations to fine‑tune the sensitivity of detections based on their specific operational context. Additionally, customers can develop custom rules to address unique scenarios or emerging threats. For those with specialized requirements, an XML editor is available, enabling advanced users to craft highly tailored rule definitions that precisely meet their business and compliance needs.

3. Data Profiles

• Selection and Aggregation: Data Profiles enable customers to choose from the full suite of available rules—selecting only those that are pertinent to their environment. By aggregating the chosen rules into a cohesive profile, customers achieve focused and efficient detections that are aligned with the sensitive data types relevant to their operations.

• Flexibility: Organizations can mix and match both standard and custom rules within a Data Profile to create detection packages tailored to their specific risk and compliance priorities.

4. DLP Policies

• Scope and Enforcement: DLP (Data Loss Prevention) policies provide the final layer by defining how detected data should be managed. These policies integrate the Data Profiles and add crucial scoping elements such as user identity, user action (e.g., editing, transmitting, or sharing), destination endpoints, and specific policy actions (such as alerting, blocking, or redaction).

• Control: This integrated approach ensures that once sensitive data is detected, the appropriate safeguards are automatically triggered in line with organizational standards and regulatory mandates.

Summary:

Summary Our hosted detection service delivers an industry-leading solution for automatic data classification and compliance assurance. Powered by over 250 rule templates built on more than 1,200 data identifiers that employ both regex and keyword detection, our layered architecture—from data identifiers to rules, Data Profiles, and DLP Policies—provides comprehensive, real‑time protection across 67+ countries and multiple industries. With extensive customization options, including the ability to create custom rules and identifiers and to fine‑tune detection parameters via an XML editor, our service empowers organizations to confidently manage sensitive data, reduce risk, and maintain compliance with evolving regulatory requirements.

This summary is intended for customer use and reflects our unique terminology, multi‑layered detection architecture, and flexible customization options within our fully hosted service model.

PreviousSSO login(okta)NextData Identifiers

Last updated 2 months ago