TRITON - Data Security Help/content/support/library/data/v753/help/preciseid_summary.aspx
TRITON - Data Security Help v7.5
PreciseID Fingerprinting
One of the ways that you can classify data in your organization is by “fingerprinting” it using the Websense patented PreciseID™ technology. (Other ways include identifying key phrases, regular expression patterns, dictionaries, or file types.)
The power of PreciseID techniques is its ability to detect sensitive information despite manipulation, reformatting, or other modification. Fingerprints enable the protection of whole or partial documents, antecedents, and derivative versions of the protected information, as well as snippets of the protected information whether cut and pasted or retyped.
PreciseID technology can fingerprint 2 types of data: structured and unstructured.
* Structured fingerprinting defines what tables and what data inside the table should be fingerprinted. (To set this up, select Main > Policy Management > Content Classifiers > PreciseID Fingerprinting - Database Records.)
* Unstructured fingerprinting defines files and folders that should be fingerprinted. (To set this up, select PreciseID Fingerprinting - Files & Directories.)
PreciseID classifiers not only define what to fingerprint, but when and how often to run the fingerprinting scan. That way, if files or data change after fingerprinting, Data Security stays up to date.
At scan time, PreciseID technology examines the content of documents or raw data and extracts a set of mathematical descriptors or “information fingerprints.” These fingerprints are compact and describe the underlying content. By assigning unique identities to each information asset, PreciseID technology can track information in motion with great precision. Original content cannot be recreated or reverse engineered from the PreciseID information fingerprint.
Click View Complete Document for more.