Risk Intelligence FAQs
There is only one Risk Intelligence instance, hosted in the United States.
Risk Intelligence communicates through TCP port 80 and TCP port 443 and requires access to app.iscanonline.com and us.ri.logicnow.com.
All data stays on the device during processing. Only a redacted version of this sensitive data is stored in the report.
The product cannot restore the original data.
The scan does not search for IDs or passwords.
Several factors affect how long a scan takes, such as the number and complexity of files on the devices. Based on recent scans, we’ve observed the following average times:
- Data Breach Scan: 11 minutes, 10 seconds
- PCI Scan: 56 seconds
- Security Scan: 40 seconds
Reports are deleted only when you remove them manually. Deleting a scan does not remove its reports from Risk Intelligence.
We use the Luhn algorithm with other validation methods to confirm that a detected number sequence is a valid card number. The system reports anomalies when trigger text appears, or doesn’t appear, in the sequence.
The OST file is excluded from the scan when Outlook isn't running to prevent conflicts.
Risk Intelligence scans can query and retrieve information from the following file types: TXT, CSV, HTML, XML, RTF, DOCX, ODT, SXW, HTM, ZIP, PPTX, XLSX, PST, SQL, PDF, BAK, DOC, XLS, PPT and OST
What do you want to do?
