Overview

Identify the severity of an attack

When ransomware attacks, do you know what sensitive data was affected? Classify sensitive data, including personal identifiable information (PII), using our highly accurate, ML-based engine. Understand sensitive data proliferation or invoke classification on anomalies for sensitive data impact analysis.

Data classification video thumbnail
Features

Use ML/NLP to accurately discover sensitive data

Go beyond regex pattern matching with our market-leading, ML-based classification engine. Use Named Entity Recognition (NER) and Natural Language Processing (NLP) techniques.

Globally search using proven, tested patterns

Get access to 235+ built-in patterns that cover all common personal, health, and financial data. Create custom policies to find sensitive data, and support regulatory and privacy requirements.

Understand attack impact quickly and reliably

Understand attack impact fast, and save time by reducing false positives and negatives. Improve accuracy over time and get reliable, actionable results with ML/NLP-based training.

Data classification UI image

Commonly asked data classification questions

Data classification is the process of categorizing data based on its sensitivity, importance, or other criteria. This classification helps organizations manage and protect their data more effectively by assigning appropriate levels of security and access controls. Data classification helps ensure that sensitive or critical information receives the necessary protection, while less sensitive data may have fewer restrictions.

Data classification can vary based on the specific needs and requirements of an organization. However, some common types of data classification include:

  1. Regulatory Classification: Categorizes data according to regulatory requirements. For example, data may be classified as sensitive personal information under regulations like GDPR (General Data Protection Regulation) or protected health information under HIPAA (Health Insurance Portability and Accountability Act).
  2. Confidentiality Classification: Is based on the level of confidentiality or sensitivity. This classification typically includes categories such as public, internal use only, confidential, and highly confidential.
  3. Criticality Classification: Data may be classified according to how critical it is to the organization’s operations or mission. For example, critical data may include financial records, intellectual property, or trade secrets.
  4. Accessibility Classification: Categorizes data based on who should have access to it. For instance, data may be classified as accessible to all employees, restricted to specific departments or teams, or limited to certain individuals with specific permissions.
  5. Lifecycle Classification: Is based on the lifecycle stage, such as active, archival, or obsolete. This classification helps organizations manage data storage, retention, and disposal effectively.
  6. Format Classification: Is based on its format or structure, such as text, images, audio, video, and structured or unstructured data. Different formats may have varying security requirements and handling procedures.
  7. Location Classification: Is based on its physical or geographical location, such as on-premises servers, cloud storage, or mobile devices. This classification helps organizations implement appropriate security measures and data access controls for different locations.
  8. Value Classification: Is based on its value to the organization, such as high-value assets, moderate-value assets, or low-value assets. This classification helps prioritize security measures and resource allocation.

Data classification is essential for compliance with regulatory requirements, such as GDPR, HIPAA, and PCI DSS, as well as for protecting sensitive information from unauthorized access, theft, or misuse. It also helps organizations prioritize their security efforts and allocate resources effectively based on the importance of different types of data.

Resources
Learn more
resource
Video
Citizen Potawatomi Nation protects its data—and heritage—with Cohesity FortKnox
Citizen Potawatomi Nation customer video thumbnail
Learn more
resource
Analyst Report
Cohesity named a leader in the Forrester Wave™: Data Resilience Solution Suites, Q4 2022
Learn more
resource
Analyst Report
ESG Report: The long road ahead to ransomware preparedness
Learn more
resource
White Paper
Amplify your ransomware defenses: protect, detect, and recover
Icon ionic ios-globe

You are now leaving the German section of www.cohesity.com/de/ and come to an English section of the site. Please click if you want to continue.

Don't show this warning again

Icon ionic ios-globe

You are now leaving the German section of www.cohesity.com/de/ and come to an English section of the site. Please click if you want to continue.

Don't show this warning again