Rooted in machine-learning technology that is calibrated to the intricacies of data mining for PII and PHI, Canopy software accelerates the detection, extraction and resolution of non-public and protected-data following a business email compromise.

Our purpose-built data breach response application is the #1 choice for incident response teams. Our clients span cyber security firms, law firms, and legal service providers that need to quickly convert PII and PHI fragments within structured and unstructured data into a clean list of affected individuals requiring notification.

Our application and services can help you:

  1. Assess whether an incident qualifies for data breach notification
  2. Reduce compromised data to only potentially reportable information
  3. Review data and extract protected-data elements
  4. Manage, de-duplicate, and organize protected-data elements into unique individual profiles for notification