Product Documentation
Toggle Dark/Light/Auto mode Toggle Dark/Light/Auto mode Toggle Dark/Light/Auto mode Back to homepage

Processing

Scope of Data

When the data forensics or incident response team isolates potentially compromised data, the data is collected in a forensically sound way and uploaded into Canopy’s system.

When the data is uploaded, Canopy’s data mining software processes it by removing duplicates, filtering out irrelevant data, extracting text and metadata from various file formats, and classifying data that may contain personal information. This step reduces the volume of data requiring assessment, increasing efficiency and reducing cost.

Role of Data Processing

In data mining, the data processor plays a crucial role in handling and preparing the collected electronic compromised data for assessment and review.

🥾 How tos

  1. How to upload data using S3 Presigned URLS
  2. How to upload data using Azure Storage Shared Access Signatures (SAS)
  3. How to upload data via your web browser
  4. How to upload data via Citrix Sharefile
  5. How to upload email via Microsoft Office 365
  6. How to retry processing failed files with new passwords.