Risk Intelligence FAQs
There is one instance of Risk Intelligence hosted in the US.
Risk Intelligence communicates through TCP port 80 and TCP port 443 and requires access to app.iscanonline.com and us.ri.logicnow.com
All data remains on the device during processing and only redacted version of this sensitive data is stored for the report.
Please note that the redacted data cannot be recreated at any time by our product.
The scan does not currently search for userids or passwords.
There are a number of factors that can affect the length of time a scan takes to complete, including the number and complexity of the files on the devices, although we have observed the following averages for recent scans:
|Data Breach Scan
|11 minutes, 10 seconds
The Reports are only removed from Risk Intelligence when deleted by a user. Removing a scan does not affect the availability of these Reports in Risk Intelligence.
We use several technologies in combination with the Luhn algorithm to validate that a discovered numerical string represents a valid card number. Anomalies may be reported where the trigger text is, or is not, found in the discovered numerical string.
To avoid potential conflicts, we exclude the OST file from the scan when it is in use.
Risk Intelligence scans can query and retrieve information from the following file types: TXT, CSV, HTML, XML, RTF, DOCX, ODT, SXW, HTM, ZIP, PPTX, XLSX, PST, SQL, PDF, BAK, DOC, XLS, PPT and OST
What do you want to do?