RESTON, VA– Canopy Software, Inc., the pioneer of purpose-built data breach response and notification software, today announced the release of new features that reduce costs and increase the speed and accuracy of reviewing protected spreadsheet and tabular data.
“Canopy’s ability to map/ingest lists of PII extracted from spreadsheets has become core to our daily approach to data breach review. We can now move data points in minutes as opposed to hours or days,” said Lee Marler, Director, Cyber Incident Response Team at Integreon. “The ease of extracting PII from tables found in Microsoft Word documents and emails helps us to accelerate our review time and eliminate the often unpredictable cost associated with extracting data from these troublesome documents.”
Specific product features and benefits include:
“Teams and organizations tasked with creating a list of individuals requiring notification must hold the ability to review protected data across a variety of unstructured sources,” said Ralph Nickl, CEO and Co-founder, Canopy. “With our latest release, we are providing the ability to not only automate extraction, but the relationships of fragmented PII across an increasing number of historically difficult-to-review data sources. This significantly reduces the time, complexity, and cost of the breach notification process.”
About Canopy
Canopy is the pioneer of purpose-built data breach response and notification software. Breach response teams rely on Canopy to convert fragments of protected data into a clean list of affected individuals in a fraction of the time of eDiscovery tools. Canopy’s patent-pending, continuous machine learning automates the detection, extraction, and relationships of PII and PHI across breached data. To learn more, visit canopyco.io.