
Unified Data Dictionary
Our centralized repository forms the foundation of every module with bilingual (Arabic/English) support for all file-types, document-types and information-types. Essential foundation for consistent data governance.
Key Features
- ✓ Accepts patterns (regex), keyword lists, manual entries
- ✓ AI-suggested terms that learn over time
- ✓ Multi-format support: text, images, PDF/XPS, Office, CAD
- ✓ Feeds all modules for policy-driven consistency

Data Discovery System
Our dual-mode engines combine AI-powered contextual analysis with rule-based precision scanning to identify sensitive data across your entire organization. Critically identifies personal data subject to PDPL and critical/sensitive data defined by NCA frameworks; assists in creating a comprehensive data inventory (PDPL Article 14) and mapping data flows.
Key Features
- ✓ All data states coverage (at rest/in use/in motion)
- ✓ Scans endpoints, Exchange, SharePoint, file-servers
- ✓ Pre-built templates (PII, IP, financial)
- ✓ Scheduled scans & gradual roll-out capability
- ✓ Comprehensive PDPL & NCA-DCC audit reports
Document Tracker
Maintain complete visibility with a live hierarchical tree of every discovered file in your organization, with comprehensive management capabilities.
Key Features
- ✓ Action controls: Revoke, Take Ownership, Delete & Shred
- ✓ Auto-rights copy & key generation on new versions
- ✓ Real-time forensics & alerts (mass download, off-hours access)
- ✓ Endpoint agent keeps tree current even offline
- ✓ Ties into central Key Management System
Data Classification System
Classify and categorize data with automatic and manual labelling driven by AI, meta-rules or user plug-ins for Word, Excel, and Outlook. Implements the NCA ECC-1:2018 classification framework.
Key Features
- ✓ Traffic-light scheme aligned to PDPL/NCA tiers out-of-box
- ✓ Unlimited custom labels for organization-specific needs
- ✓ Visual markers: explorer overlays, headers/footers, watermarks
- ✓ Fine-grained policies (who can downgrade, mandatory vs. optional)
- ✓ Bilingual classification support (Arabic/English)
Data Rights Management System
Control access to sensitive data with auto-protection on label or manual wrap via plug-ins, featuring granular multi-axis rights management. Handles data subject access requests workflow (including right to erasure - PDPL Article 18) and enforces Zero-trust principles.
Key Features
- ✓ Granular rights across four axes: data, protection, time, location
- ✓ Pre-built templates (Finance-RO, R&D-Edit)
- ✓ Simple exit strategy to bulk-unprotect when needed
- ✓ Isolated KMS micro-service; supports external HSM/KV
- ✓ Zero-trust enforcement from endpoint to cloud
Data Leak Prevention System (DLP)
Prevent unauthorized data sharing with comprehensive protection across endpoints, email, and web, with unified incident management. Blocks actions like copying to USB, uploading to unauthorized cloud services, screen capture, or printing of sensitive/classified data; implements ECC-2:2018 data protection controls.
Key Features
- ✓ Endpoint protection: blocks USB, printing, screen capture, clipboard
- ✓ Email & Web Guards with real-time scanning
- ✓ Policy Matrix with content, classification and protection-based rules
- ✓ Dynamic watermarking with user, MAC, timestamp variables
- ✓ Unified logging and BI dashboards for 360° visibility
Air-Gap Share System
Specialized offline bulk encryption solution designed for the highest security environments like MoD, Oil & Gas rigs, and isolated labs. Creates physical separation specifically for cross-border transfer compliance needs.
Key Features
- ✓ Bulk archive encryption for secure transfers
- ✓ Decrypt via offline agent with multi-factor authentication
- ✓ USB token + PIN + biometric security options
- ✓ One-time key with full offline mode
- ✓ Complies with strictest security requirements
BI & Compliance Dashboards
Gain complete visibility into your data governance posture with comprehensive dashboards that instantly map to PDPL Articles & NCA-DCC controls. Provides automated reporting and serves as a security control implementation evidence repository.
Key Features
- ✓ Module-specific widgets for discoveries, classification status
- ✓ Protected documents and security incident tracking
- ✓ Instant mapping to PDPL Articles & NCA-DCC controls
- ✓ Exportable reports for auditors and compliance reviews
- ✓ Real-time compliance posture at a glance
