Our lightweight agent based software resides at the device level, making every server, desktop, laptop and tablet across the enterprise a powerful team member in institutional efforts towards privacy, compliance, risk management, and data security.


The Device: It’s where the data resides.

If a brand new laptop with no data on it yet gets stolen at the airport, who cares? You can just replace the laptop. But if a year-old laptop with regulated data or intellectual property gets stolen at the airport, it could be a capital event.

Now if InfoGPS 3D was loaded on that machine, you’d know exactly what data was resident on the device without hiring a forensic team for a month.

But the larger point is simple; and absolute. Understanding what sensitive data you have that’s unencrypted, how much of it you have, its lifecycle, and who has access to it is a game that can only be successfully played at the device level.

Locate, Classify & Risk Score Data

InfoGPS 3D is engineered to Locate, Classify and Risk Rank all data that exists across the enterprise in an unstructured or semi-structured status. It classifies all data using NIST standards and assigns a numerical Risk Score to each NIST classification.


InfoGPS 3D also allows for the use of the data and pattern match against formulas within Excel Spreadsheets. For any publicly traded organization, this process significantly enhances the ability to manage and report on changes to end-user computing spreadsheets.

Masked Data - No Additive Risk

Since this is data that is often regulated, sensitive or of a highly private nature the software masks each record before reporting on its location, classification and risk score. This way, InfoGPS is never in possession of the actual data itself.


Indexing Data at the Device Level

The software resides at the device level so it sees the data at the point of origin. Once installed on a given machine, the software spends approximately 5 hours indexing all the data for classification and risk ranking. After that initial 5 hours of indexing, the software then monitors all the data for change; in real time. The software also sees the creation of new data in real time.

Since the software is at the device level, and sees the data at the record level, it is able to then see all the data and organize it across the enterprise - by file, by device, by user, by location, and by department or business unit. This can also extend out to 3rd party providers.


Aggregate View - Risk Score, Risk Weight & Dollar Value

The software also rolls those many views into one aggregate view for the enterprise as a whole and sets a dollar value to the Risk, which we call Economic Cyber Value™.


At a glance, this dashboard shows us an aggregate Risk Score of about 1.791 (out of 5) with an aggregate Risk Weight of 1,014,795 (total weighted average of all patterns). This also shows that we have individual records classified as non-public with a total cyber value of $21.5 million.

The software has multiple settings - based on industry averages - with the cost per record built-in. For instance, recent research put the average cost per record upon breach at $259 for the financial industry, and $398 for the healthcare industry.  Clients can also customize that value to reflect client-specific interpretations of risk and cost per record metrics.

We are also able to use a Cost-Per-Device methodology to determine Economic Cyber Value™, based on research on over 700,000 devices across multiple industries.