Risk Profile Report For: {Company Name}
Prepared by: Heureka Software, LLC
Date of Report: {date_mdy}
The Heureka Intelligence Platform is designed to help organizations automate and overcome the challenges of locating and classifying unstructured data. We deliver real-time data and risk analytics enterprise-wide.
Risk Profile Report For: {Company Name}
Prepared by: Heureka Software, LLC
Date of Report: {date_mdy}
Example Risk Costs
30
Average # of sensitive documents per workstation
4,440*
Potential cost per workstation if breached
70
Average # of sensitive documents per terabyte(TB) on a file share
70
Average # of sensitive documents per TB on a file share
111,000*
Potential cost per terabyte if breached
*Based on Ponemon Institute, LLC average cost per file of $148 published in 2018 “Cost of a Data Breach Study”
Examples of Sensitive Data
Sensitive PII: Contains private information that may harm an individual or corporation if exposed. Examples include credit cards, bank routing information, social security or national identification, medical record numbers, passport information, intellectual property, formulas, etc.

PDF files containing information like SSN or credit card numbers.

Word documents of employee records containing PII and PHI information.

CAD drawing containing intellectual property.

PowerPoint containing sensitive collegiate football and basketball plays and signs.

Text files containing new proprietary automotive paint formula.

Excel spreadsheets containing sensitive investor names, addresses and, bank routing information.

{Company Name} Environment Overview
{TB's of Data on File Shares:3} TB's
Data on file share(s) with approximately {Potential File Server Risk File Count} files at risk
{Employees}
Employee machine(s) with approximately {Potential Endpoint Risk File Count} files at risk
{Company Name}’s Potential Risk Related To Unstructured Data
*The cost of a data breach differs for every organization based on many factors that we have built into our algorithm.
Your personalized profile is based on your company being in the {Industry} industry, the information you provided about your environment, data provided by the Ponemon Institute in their “2018 Cost of a Data Breach” study, and Heureka client data/experience. The risk profile outlines the potential impact a data breach could have on your organization.
{Risk Cost Per File}
Average Cost Per Record
{Risk Per Machine}
Potential Risk Per Employee Machine
{Risk Per TB}
Potential Risk per TB of Data on File Share(s)
The Heureka Intelligence Platform
The Heureka Intelligence Platform gives you real-time access to unstructured data on network file systems, servers, VM’s, laptops and desktops from a single user interface and provides remediation tools including file collection, quarantine or delete.
Heureka Solutions

Heureka For GDPR
Easily comply with GDPR requirements such as responding to Subject Access Requests, Right To Be Forgotten, Right to Data Portability, and more.
Learn More

Heureka For Compliance
Enforce document retention policies, eliminate ROT, and automatically classify sensitive data in-place to meet regulatory & compliance requirements and reduce exposure.
Learn More

Heureka For E-Discovery
Search and analyze data at the point of creation allowing you to surgically target and collect only the most relevant data to reduce time and processing costs.
Learn More
The Heureka Intelligence Platform gives you real-time access to unstructured data on network file systems, servers, VM’s, laptops and desktops from a single user interface and provides remediation tools including file collection, quarantine or delete.

Heureka For GDPR
Easily comply with GDPR requirements such as responding to Subject Access Requests, Right To Be Forgotten, Right to Data Portability, and more.

Heureka For Compliance
Enforce document retention policies, eliminate ROT, and automatically classify sensitive data in-place to meet regulatory & compliance requirements and reduce exposure.

Heureka For E-Discovery
Search and analyze data at the point of creation allowing you to surgically target and collect only the most relevant data to reduce time and processing costs.