Technical Support

Need PKWARE technical support? You’ve come to the right place. Visit our extensive online support library or reach out to one of our product experts.

Frequently Asked Questions

Why do organizations rely on PKWARE to manage personal data across the enterprise?

PKWARE delivers a unique approach to discovering and protecting sensitive and personal data assets in many different platforms and databases across the enterprise both on-premise and in the cloud. The data discovery is foundational, scaling both horizontally and vertically and scanning multiple petabytes of data, across different repositories and versions. Data discovery leads to data-centric protection that can be done via intelligent masking and/or encryption.

What types of organizations work with PKWARE?

PKWARE customers span a broad range of industries—financial services, insurance, healthcare, government, technology, and retail—and include some of the world’s largest, industry-leading companies. We work with organizations that embrace the tremendous potential of data and are committed to being responsible data stewards.

What business goals does PKWARE help organizations achieve?

PKWARE helps organizations minimize risk and costs as they store and use personal information and other sensitive data to drive business growth.

How does the PKWARE discovery process work?

The PKWARE discovery process begins by defining a policy, which allows organizations to select which sensitive elements they need to discover. The rest of the process is automated; scanning itself is agentless, via remote components called Intelligent Data Processors (IDPs) that can scan both data at rest and in motion. The discovery process leverages a combination of pattern matching, contextual analysis, data profiling, full or fuzzy reference data matching, supervised and unsupervised machine learning. Not every type of sensitive element will require all these methods; the complexity of the underlying sensitive type determines exactly how many of these heuristics will be leveraged. For optimal efficiency, each platform and object type supported by PKWARE has a native connector built for it.

Why is data-centric security important?

There are two main reasons that data-centric security is imperative:

  • The infrastructure level security is necessary, but not sufficient. Safeguarding the infrastructure and repositories from external and internal forces is never foolproof and once penetrated, often leaves the data exposed. Hence, proper optics into the sensitivity of data enables proper controls to be implemented at the data level.
  • To unlock the utility and usefulness of data, it has to be shared with the authorized users. Based on the sensitivity of the information, data sharing policies then define whether or not data can be fully shared by itself, or if it has to be masked. This means scanning and protecting data at the data level to enable dev/test or analytics.
How complex are the setup and operation of PK Discovery and PK Protect?

PK Discover and PK Protect products are designed to maximize ease of use, simplicity, and automation. Installation and configuration take only a few minutes and the product can be operational and produce reports and protected data at the same time. The product can be easily operated by web-based UI or orchestrated via any of the popular workflow solutions.

Do discovery and protection rely on metadata or the actual data?

PKWARE prides itself in building a technology that can scale to scan and protect multiple petabytes of raw data across the enterprise. Metadata—although not necessary—may play an important role in either assisting in scanning performance or by helping ambiguous data elements to be correctly classified with the right semantic definition. PKWARE can generate metadata as a result of its scanning process. If there is metadata that already exists, PKWARE solutions can use it in the ways mentioned above.

Support Resources


Visit our online Support Center


Contact Customer Support

Please provide as much detail as possible in the contact form below.
Include product name, version number, and any error messages you’ve encountered.
The more information you provide, the better we will be able to assist you!