top of page

Sensitive Data Risk Assessment

Know Your Data. Understand Your Risks. Gain clarity on what data you have, where it resides, and the precise risks it poses. Equip yourself with clear insights to protect what matters most.

What you'll get

With one in three data breaches involving shadow data and the global average cost of a breach surging to $4.88M, proactive data security is the only way forward for all organizations. Confidencial’s Sensitive Data Risk Assessment is your first step in building a robust, proactive strategy for an unshakable data security posture.

Unprotected Data Visibility:

We pinpoint the exact storage environments, folders, and files containing sensitive data that lack adequate protection.

Unprotected Data Visibility:

We pinpoint the exact storage environments, folders, and files containing sensitive data that lack adequate protection.

Associated Risk Identification:

We analyze and report specific risks tied to your data, including exposure, misuse, and compliance gaps.

Associated Risk Identification:

We analyze and report specific risks tied to your data, including exposure, misuse, and compliance gaps.

Financial Impact Analysis:

The report highlights the potential financial consequences of a data breach or compliance failure and the cost savings achievable through immediate action.

Financial Impact Analysis:

The report highlights the potential financial consequences of a data breach or compliance failure and the cost savings achievable through immediate action.

Data Security Posture Review:

You get a comprehensive view of your current security posture, with clear, practical recommendations to drive immediate and long-term improvements.

Data Security Posture Review:

You get a comprehensive view of your current security posture, with clear, practical recommendations to drive immediate and long-term improvements.

You can’t protect what you can’t see.

We can help you locate your sensitive data and risk. Here's how:

STEP 1

Find it. Classify it.

Choose an on-prem or cloud data source, and we’ll scan a 100GB folder of documents within it. Our system securely analyzes the data—without accessing your content—to pinpoint exactly where sensitive information resides, both at the document and data level, ensuring no hidden risks go unnoticed.

high-level-results.png
financial-risk-projections.png

STEP 2

Assess the risk.

Our multi-layered analysis engine identifies the type of sensitive data, assesses your compliance risk, and quantifies your business exposure—estimating recovery time, black market value, and potential financial impact if leaked. This insight helps you build a data-driven business case for stronger security and resource investment.

STEP 3

Get your detailed risk report.

You'll receive a detailed, actionable report jam-packed with insights to help you reduce vulnerabilities, strengthen controls, and stay ahead of evolving threats and regulations.

A clear picture of where your sensitive data (PII, PCI, GDPR, HIPAA) is stored

Insights into high-risk formats—including PDFs—lurking in your storage environments

A roadmap to prioritize fixes and avoid legal fines & compliance pitfalls

A maturity curve assessment to help you level up your data protection strategy

A breakdown of financial risk exposure from unprotected data

data-assessment-report-02.png
data-assessment-report-03.png
data-assessment-report-01.png

Map your exposure, minimize your losses.

Frequently Asked Questions

  • What encryption schemes does Confidencial utilize?
    Confidencial utilizes multi-receiver hybrid-encryption to (selectively) encrypt data in documents and other content forms. In hybrid encryption, one encrypts the data with a symmetric encryption scheme (e.g., AES) using a randomly generated key. One then encrypts this random symmetric-key with the receivers’ public-key. Confidencial utilizes AES-256-GCM (as the symmetric encryption scheme) to encrypt the actual data. The randomly generated AES key is then encrypted via the public-key of the receivers. We are currently utilizing RSA-OAEP with 2048 bits, but this is a configurable parameter and will be upgraded in 2023. The use of the RSA-OAEP is just as a public key encryption scheme and does not depend on any specifics of the internals of the RSA algorithm (what is called black-box use of the encryption scheme). Any other suitable public-key encryption scheme can be used instead of RSA.
  • Can the platform be upgraded to utilize post-quantum cryptography (PQC)?
    Confidencial utilizes patented multi-receiver hybrid-encryption to (selectively) encrypt data in documents and other content forms. In hybrid encryption, one encrypts the data with a symmetric encryption scheme (e.g., AES) using a randomly generated key. One then encrypts this random symmetric-key with the receivers’ public-key. Confidencial utilizes AES-256-GCM (as the symmetric encryption scheme) to encrypt the actual data; AES-256 is considered post-quantum secure. The randomly generated AES key is then encrypted via the public-key of the receivers. We are currently utilizing RSA-OAEP with 2048 bits, but this is a configurable parameter and will be upgraded in 2023. The use of the RSA-OAEP is just as a public key encryption scheme and does not depend on any specifics of the internals of the RSA algorithm (what is called black-box use of the encryption scheme). Any other suitable public-key encryption scheme can be used instead of RSA. Once the NIST PQC standards are finalized, one would be able to replace RSA with post-quantum encryption schemes.
  • Does Confidencial store my encrypted documents?
    No. Confidencial does not store nor receive any user documents. Users encrypt the documents and store them as they normally would. They then send them to their intended recipients via email, web upload, (S)FTP, Slack, cloud storage, or any other communication or storage method of choice.
  • Is Confidencial going through any certification and accreditation process?
    Yes. Confidencial is planning to apply for SOC2 (System and Organization Controls) compliance by end of 2023.
  • Do I need to install separate add-ins for Word and Excel?
    No, there is no need to install one add-in for Word then install the add-in again for Excel. Simply install one add-in and start using Confidencial's document protection capabilities in both Word and Excel.
  • Do users in my organization have to create new passwords with Confidencial?
    No. If an enterprise administrator creates an enterprise/organization account on Confidencial, they can enroll users in their enterprise using its Active Directory (AD) accounts into Confidencial. This is accomplished by creating a connection between Confidencial and the organization's AD to redirect signup requests to AD. However, this option is not available if users are enrolled in the public space via individual accounts.
  • Can I encrypt to users registered with Confidencial but outside my organization?
    Yes. The encryption experience is the same for users inside and outside your organization. This is assuming that your organization's administrator allows users inside it to encrypt to users outside the organization (whether to users registered in other organizations or registered in the public space using individual accounts).
  • Can I encrypt to users not registered with Confidencial?
    Yes. You can utilize Confidencial’s escrowed key service and generate one-time-use keys that are utilized to encrypt documents to unregistered users. This happens automatically when you encrypt to an unregistered user. You can then send the encrypted documents to the users via email, Slack, cloud storage, or any other method of choice. Confidencial does not obtain the encrypted documents. When the intended user receives the document (or email) they are redirected to Confidencial to register and install the add-ins and the documents will then be decrypted automatically. In the future any encryption to the new users will use their long-term privately generated keys which will be generated when they complete their registration.
  • Who owns and stores the decryption/private keys?
    The Confidencial platform is flexible and can accommodate multiple secure key storage options depending on customer needs. In all cases, user’s decryption/private keys are always stored in a secure distributed manner and never stored in the clear in a single database or server. The most common key storage options are: Organizational Accounts: In an organizational account, the private keys can be stored in a local or cloud-based database or Key Management Server (KMS) managed by the organization. Another option is to deploy a Key Share Server (KSS) supplied by Confidencial which stored secret share (shard) of a user’s key. The other secret share (shard) of a user’s key is stored in another KSS hosted in Confidencial’s cloud. In this setting, even if an organization’s KSS is compromised or breached, no user keys are leaked. The same applies if Confidencial’s infrastructure or backend is compromised. This setup mathematically guarantees that no information about the private keys is revealed is breaches occur. This deployment setup provides a high-level of protection and is recommended by Confidencial. Individual Accounts: If desired, users can locally generate and store private keys. In this case, the user must load the key when they log into the Confidencial add-ins, or desktop or mobile apps. If users prefer simplicity, they can store their keys in a secure distributed form, namely password protected and secret shared form in Confidencial’s cloud platform. The keys are automatically retrieved when the user logs into the add-ins, or desktop or mobile apps with their correct username and password. The keys are then deleted from local memory and storage once the user logs out. We stress that Confidencial does not obtain any documents encrypted by the users, and because of this the keys stored in Confidencial will not be useful. And, again, if the user does not trust Confidencial with their private key, they can always store it locally.

Request your free Sensitive Data Risk Assessment today!

Connect with our experts to receive an assessment that reveals where your sensitive data resides, uncovers potential risks, and provides actionable recommendations—all at no cost.

bottom of page