Solved

How can I find sensitive personal information stored in computer files

Posted on 2014-09-23
7
1,186 Views
Last Modified: 2014-09-24
Hi & thank you in advance,

Is there a software scanner that I can use to scan computers for sensitive information (social security numbers, credit card numbers, family information) stored in text, word, excel etc data files.  I looked into DLP but the company cannot afford to purchase.

I am open to suggestions.
0
Comment
Question by:cesemj
7 Comments
 
LVL 24

Assisted Solution

by:Phillip Burton
Phillip Burton earned 100 total points
ID: 40338578
You could use X1 Search 8 to look inside files - http://www.x1.com/products/x1_search/

If you want a catalog of your hard drive in Excel, with document properties, then you could use Filecats Professional - http://www.filecats.co.uk
0
 
LVL 62

Accepted Solution

by:
btan earned 250 total points
ID: 40339030
You may be interested in this
https://cuit.columbia.edu/cuit/it-security-resources/handling-personally-identifying-information/pii-scanning-software

CUSpider scans a computer for Social Security Numbers, produces a list of files, and provides options for you to take immediate actions for remediation.

Spider can be used to scan a computer for Social Security Numbers and other sensitive information. Spider produces a list of files which appear to contain this information, and provides options for you to take immediate actions for remediation.

OpenDLP is another open-source alternative, though more strongly geared towards a centrally managed, server-client envrionment. It can push out scans over network shares and to any Windows Domain connected computer, even without a pre-installed client agent.

Identity finder is an enterprise level PII scanning application and DLP manager.
0
 

Author Comment

by:cesemj
ID: 40339183
Thank you both, I will send an update this evening.
0
Complete VMware vSphere® ESX(i) & Hyper-V Backup

Capture your entire system, including the host, with patented disk imaging integrated with VMware VADP / Microsoft VSS and RCT. RTOs is as low as 15 seconds with Acronis Active Restore™. You can enjoy unlimited P2V/V2V migrations from any source (even from a different hypervisor)

 
LVL 62

Expert Comment

by:btan
ID: 40339416
kindly do note the usage and license where applicable from the source in the use case.

Also there is another software program that allows users to quickly scan their computers for sensitive numbers. But this tool does not guarantee your computer is free of social security and credit card numbers. It simply reports files that contain numbers which look like they could pose a security threat.
http://www.utexas.edu/its/products/senf/
0
 
LVL 1

Assisted Solution

by:Travis Martinez
Travis Martinez earned 100 total points
ID: 40340771
Personally...  Forensic analysis tools are what I've leveraged for this type of scan.  Each silo/vendor has a specific niche.  Some have to have physical possession and the scans are intrusive.  Others, will reach out across the network and do it under the radar and quiet.

Here's a list of document tools:

http://www.forensicswiki.org/wiki/Tools:Document_Metadata_Extraction

Here's one specific to files and network access and fairly reasonable considering the offering:

http://www.fid3.com/fi-file-find-features

Sourceforge has Autopsy and a few others.  Sounds like you'll want something with a bit more meat to it and for $300 the FI File Find is a decent value.

Thanks,

Safety First!
0
 

Author Comment

by:cesemj
ID: 40342268
Thank you all again, I am looking at the products and will update his evening.
0
 
LVL 38

Assisted Solution

by:Rich Rumble
Rich Rumble earned 50 total points
ID: 40343077
OpenDLP can do a good job, it's not the very best, but for free it's awesome: https://code.google.com/p/opendlp/
-rich
0

Featured Post

Back Up Your Microsoft Windows Server®

Back up all your Microsoft Windows Server – on-premises, in remote locations, in private and hybrid clouds. Your entire Windows Server will be backed up in one easy step with patented, block-level disk imaging. We achieve RTOs (recovery time objectives) as low as 15 seconds.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
yahoo Hacks 9 105
Disable Security Alert  popup in Winforms  embedded webbrowser. 1 30
Connecting a New Subnet to Network 4 29
How do You Stop a DDoS Attack 7 29
This article outlines the process to identify and resolve account lockout in an Active Directory environment.
Knowing where your website is hosted is as important as the features you receive, the monthly fee, and the support you receive. Due diligence should be done when choosing your next hosting provider.
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, Just open a new email message.  In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…
Nobody understands Phishing better than an anti-spam company. That’s why we are providing Phishing Awareness Training to our customers. According to a report by Verizon, only 3% of targeted users report malicious emails to management. With compan…

809 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question