Find data breaches before they happen
Data protection and cybersecurity go hand in hand with Verics
Verics helps companies and data protection professionals detect leaks of personal and sensitive data that pose a risk of cyber threats.
The power of cyber security is now at the DPO’s fingertips. Protect your data, stay ahead of cyber criminals and facilitate compliance with Verics.
What kind of data does Verics analyse?
Verics is a web crawler that scans the content of a web page in a systematic and automated way with the capacity to scan more than 100 file types.
Thanks to the power of Machine Learning, Verics is trained to detect “invisible” data that may represent a security breach:
- Personal data. Names and surnames, phone numbers, email addresses… Unauthorised access to this data is a “personal data security breach” according to the GDPR.
- Internal data. User names, directory paths or technical information about files. They can be used in phishing or social engineering attacks.
- Sensitive leaks. Location data (GPS coordinates) of pictures or device information. May represent a security breach in association with other data.capacity
Verics latest post
We are delighted that Innovate NI, on behalf of the Department for the Economy (Northern Ireland), has recognised Suments Data as a Silver Level Innovator
On May we had the opportunity to share Suments Data’s experience at the International Congress on Metadata 2022 (CIM 2022). Under the theme “Social Metadata:
The purpose of these legal notices is to provide customers with as much transparency as possible about our activity and our purpose on the web.
Get in touch
*Basic information on data processing in accordance with RGPD (EU) 2016/679 and LOPDGDD 3/2018.
Responsible: Suments Data Ltd. Purpose: To contact the data subject. Send commercial communications about our services by letter, telephone, email, SMS/MMS, WhatsApp, Telegram or other equivalent means of electronic communication, provided that the data subject has consented to the processing of their personal data for this purpose. Legitimation: Consent of the interested party.
Recipients: No data will be transferred to third parties, unless legally required. Rights: You have the right to access, rectify and delete your data, as well as other rights, indicated in the additional information, which can be exercised by contacting the address of the data controller at firstname.lastname@example.org Additional information: You can consult additional and detailed information on Data Protection in the attached clauses found in our privacy policies.