Product guide
/
Detectors
Product guide
/
Detectors
Product guide
/
Detectors

Product guide

Detectors

Written by

Toni Barthel

Published

Jan 3, 2025

Product guide

Detectors

Written by

Toni Barthel

Published

Jan 3, 2025

Product guide

Detectors

Written by

Toni Barthel

Published

Jan 3, 2025

The Detectors module in 1Protection.AI is a critical tool available exclusively to administrators, empowering them to manage and customize detection mechanisms for safeguarding organizational data. This module offers a combination of standard out-of-the-box detectors and the flexibility to create custom detectors tailored to specific organizational needs.


Standard Detectors

Administrators have full visibility into the extensive catalog of standard detectors provided by 1Protection.AI. These detectors are pre-configured and ready to deploy, ensuring comprehensive coverage of common data types and security vulnerabilities. The detectors are organized into distinct groups, each addressing different aspects of data protection.

The first group, common entities, focuses on identifying universally recognized personal and contact information such as email addresses, phone numbers, person names, and street addresses. This foundational layer ensures that sensitive personal data is consistently identified and protected across the organization.

The documents category broadens this scope by detecting images of sensitive documents, including passport or visa images, driver’s license or ID card images, and credit card images. By incorporating visual data into the detection ecosystem, administrators can mitigate the risk of document-based data leaks.

Finance-related detectors are subdivided into two main categories. The Finance Banking group targets identifiers like IBAN and SWIFT codes, essential for protecting banking information. Meanwhile, the Finance PCI category ensures the detection of credit card numbers, reinforcing compliance with Payment Card Industry standards.

Standard PII (Personally Identifiable Information) detectors cater to specific regional regulations, providing coverage for identifiers such as German passports, UK National Insurance Numbers, and French CNI. This ensures that organizations operating across EMEA and APAC regions remain compliant with local data protection laws.

Additional categories include Hardware - Network, which identifies IP addresses, MAC addresses, and IMEI hardware IDs, and Secrets, which scans for sensitive strings like API keys, database connection strings, passwords, and cryptographic keys. These broad-ranging detectors ensure that sensitive data, whether in plain text or encoded formats, remains protected.


Adding Custom Detectors

While the standard detectors offer robust protection, 1Protection.AI recognizes that organizations may have unique data protection requirements. To accommodate this, administrators can create custom detectors to extend the platform’s capabilities.


Dictionary Detector

The custom dictionary detector allows administrators to upload a CSV file containing specific terms to be detected. This detector functions by scanning for exact matches between the entries in the CSV file and the scanned content. As demonstrated in our demo video, creating a custom dictionary detector is as simple as preparing a single-row CSV file populated with relevant terms and uploading it to the platform. Once applied to a detection rule, the detector will trigger only on exact matches. You can download the example at the bottom.


File Type Detector

Administrators can configure custom file type detectors to scan for specific file types based on predefined criteria. This detector operates similarly to the dictionary detector but focuses on identifying files by their mime-type and associated file names. 1Protection.AI provides a standard list of file types that can be expanded as needed, enabling targeted detection of sensitive or restricted files across the organization’s infrastructure.


Regular Expression Detector

For more advanced detection needs, administrators can create custom regular expression detectors. This option allows the definition of regex patterns following the RE2 escape format, providing unparalleled flexibility in identifying complex data patterns. A practical example used in our screencast demonstrates detecting box.com links using the regex pattern: https://[a-zA-Z0-9.-]*\.box\.com/s/\S+. Administrators can verify their regex patterns using tools like regex101.com, ensuring accuracy and reliability before deployment.


Request Standard Detector

In scenarios where essential detectors are missing from the platform, administrators have the option to submit requests for new standard detectors. The 1Protection.AI team diligently reviews all requests and strives to implement solutions that align with the evolving security landscape and customer needs.

By providing a rich array of standard detectors alongside versatile options for custom configurations, 1Protection.AI ensures that organizations are equipped with the tools necessary to safeguard sensitive data comprehensively. This combination of flexibility and breadth reinforces the platform’s role as a cornerstone of data protection and compliance.