SlideShare a Scribd company logo
1 of 2
Download to read offline
Dataleakageresultsinlostrevenueandprivacyviolations
Occurring with greater and greater frequency, data leakage is the collection of your valuable first-party
data by the various third parties accessing your site, which then resell your data or redirect your web
audience to competitive sites, without ever notifying or compensating your company. Unfortunately,
most marketing and web security teams fail to track and monitor these third parties, so they never
realize their valuable audience data is leaking off the site.
Along with lost revenue, having a host of unwanted or unknown trackers on your site may also violate
your own IT governance and privacy policies as well as the growing collection of governmental regula-
tions and mandates. Collectively, these can damage both your brand and your corporate reputation.
HowMediaScannerpreventsdataleakage
By scanning your website on a continuous, 24/7 basis, The Media Trust’s Media Scanner for Data
Protection prevents data leakage by monitoring, analyzing and reporting on vendors, domains and data
tracking elements present on your site, which provides timely and actionable information to quickly
resolve issues with your data, analytics and advertising partners.
From a large array of servers located in 500 cities spread across six continents, which utilize many
browser/OS combinations and automated user-interactions, the Media Scanner solution scans your
website at appropriate frequencies to ensure your first-party data is protected on a 24/7 basis.
The Media Trust’s Media Scanner for Data Protection provides you with:
•	Immediate notification and alerting so you can quickly resolve data leakage issues
•	Granular visibility and continuous control of what’s on your website, how long it’s been there and its
purpose or function
•	24/7 in-house, on-shore technical support
•	Comprehensive, yet flexible reporting that gives you the detailed visibility and control needed to manage
and protect your site
A Security-as-a-Service offering, Media Scanner for Data Protection detects, catalogues and alerts on
a wide range of data leakage elements, including:
•	Domains/hosts/URLs
•	Pixels
•	HTTP/HTTPS utilization
•	Unique/non-unique categorization
•	Browser cookies
•	DOM storage manipulation
•	Flash cookies
•	Segment lifespan and expiration
Media Scanner for Data Protection—Websites
The Media Trust
6861 Elm Street, Suite 3A
McLean, VA 22101
703.893.0325
www.themediatrust.com
The Media Trust
With a physical presence in 65 countries and 500 cities located around the globe, The Media Trust’s
proprietary website and ad tag scanning technology provides continuous, non-stop protection against
malware, site performance issues and data leakage, which can lead to lost revenue and privacy violations.
The Company also enables comprehensive quality assurance of an ad campaign’s technical and
creative components, supporting display, rich-media, video, search and mobile advertising. In addition,
The Media Trust’s technology provides publishers with visual ad verification for geographically-targeted
campaigns, ensuring thousands of media buys are executed correctly, reducing discrepancies, errors
and make-good scenarios in-flight.
The solution also provides detailed background information on the domains and cookies present in the
scan execution, including:
•	Vendor name and parent company, if relevant
•	Company description
•	Company contact information
•	Services provided
•	Browser cookie definition, classification and description
Furthermore, the solution easily lets you define your own white list and black list of domains and cookies.
You can also change or modify this list at any time. With this approach, your team only focuses its time
on domains and cookies detected that are new or unauthorized. If your team does not currently categorize
these entities, The Media Trust can assist you in defining, organizing and managing them.
HowMediaScannerforDataProtectionworks
To get started with Media Scanner for Data Protection, you enter the site domain(s) into the system
along with the desired scan frequency, the geographic areas to scan, your white/black list of domains,
and your cookies and other data collection methods you want flagged. Once this information is entered,
the system will immediately start scanning.
Upon detection of an unknown or black listed third-party code, the Media Scanner system immediately
notifies you via email, so you can remove and block the offending code, preventing any more of your
first-party data from leaving the page.
If the domain is unknown or of concern to the Media Scanner Technical Support Team, they notify the
company’s Malware Team, which will immediately capture and isolate the code and begin an immediate
forensic examination to determine its intent, purpose, pathway and possible origins.
The Media Scanner successfully detects and removes 98% of all suspect activity prior to the malicious
code from inflicting any harm. The Media Trust’s continuous monitoring, inspecting and analyzing of
all suspicious activity, anomalies or overt malware protect your website from the constant, unending
threat of web-based malware.
Customizedreportingandalerts
Whether detecting for malware, HTTPS, data leakage or site performance issues, the Media Scanner
provides you and your team with robust alert and reporting engines, which enable instant, real-time
alerting and notification as well as reports detailing site activity generated daily, weekly or any
client-defined frequency and distribution. The solution is also able to export issues directly to your
upstream partners, which speeds the resolution of the issue more quickly and efficiently.
© 2014 — The Media Trust

More Related Content

Viewers also liked

практическая работа анимации на слайде
практическая работа анимации на слайдепрактическая работа анимации на слайде
практическая работа анимации на слайдеliza2209
 
графические объекты на слайдах
графические объекты на слайдахграфические объекты на слайдах
графические объекты на слайдахliza2209
 
аквариум
аквариумаквариум
аквариумliza2209
 
понятие о файле и папке
понятие о файле и папкепонятие о файле и папке
понятие о файле и папкеliza2209
 
устройства компьютера
устройства компьютераустройства компьютера
устройства компьютераliza2209
 
графический редактор
графический редакторграфический редактор
графический редакторliza2209
 
объекты и их свойства
объекты и их свойстваобъекты и их свойства
объекты и их свойстваliza2209
 
Amyotrophic lateral sclerosis (ALS)
Amyotrophic lateral sclerosis (ALS)Amyotrophic lateral sclerosis (ALS)
Amyotrophic lateral sclerosis (ALS)Sourabh Jain
 
NGHIÊN CỨU ĐẶC ĐIỂM LÂM SÀNG, CẮT LỚP VI TÍNH VÀ MÔ BỆNH HỌC CỦA TÍNH VÀ MÔ B...
NGHIÊN CỨU ĐẶC ĐIỂM LÂM SÀNG, CẮT LỚP VI TÍNH VÀ MÔ BỆNH HỌC CỦA TÍNH VÀ MÔ B...NGHIÊN CỨU ĐẶC ĐIỂM LÂM SÀNG, CẮT LỚP VI TÍNH VÀ MÔ BỆNH HỌC CỦA TÍNH VÀ MÔ B...
NGHIÊN CỨU ĐẶC ĐIỂM LÂM SÀNG, CẮT LỚP VI TÍNH VÀ MÔ BỆNH HỌC CỦA TÍNH VÀ MÔ B...Luanvanyhoc.com-Zalo 0927.007.596
 
Estou desempregado e agora? Como me recolocar como QA.
Estou desempregado e agora? Como me recolocar como QA.Estou desempregado e agora? Como me recolocar como QA.
Estou desempregado e agora? Como me recolocar como QA.Robson Agapito Correa
 

Viewers also liked (12)

Cuc marí
Cuc maríCuc marí
Cuc marí
 
MASTERY_WEBSPHERE__9
MASTERY_WEBSPHERE__9MASTERY_WEBSPHERE__9
MASTERY_WEBSPHERE__9
 
практическая работа анимации на слайде
практическая работа анимации на слайдепрактическая работа анимации на слайде
практическая работа анимации на слайде
 
графические объекты на слайдах
графические объекты на слайдахграфические объекты на слайдах
графические объекты на слайдах
 
аквариум
аквариумаквариум
аквариум
 
понятие о файле и папке
понятие о файле и папкепонятие о файле и папке
понятие о файле и папке
 
устройства компьютера
устройства компьютераустройства компьютера
устройства компьютера
 
графический редактор
графический редакторграфический редактор
графический редактор
 
объекты и их свойства
объекты и их свойстваобъекты и их свойства
объекты и их свойства
 
Amyotrophic lateral sclerosis (ALS)
Amyotrophic lateral sclerosis (ALS)Amyotrophic lateral sclerosis (ALS)
Amyotrophic lateral sclerosis (ALS)
 
NGHIÊN CỨU ĐẶC ĐIỂM LÂM SÀNG, CẮT LỚP VI TÍNH VÀ MÔ BỆNH HỌC CỦA TÍNH VÀ MÔ B...
NGHIÊN CỨU ĐẶC ĐIỂM LÂM SÀNG, CẮT LỚP VI TÍNH VÀ MÔ BỆNH HỌC CỦA TÍNH VÀ MÔ B...NGHIÊN CỨU ĐẶC ĐIỂM LÂM SÀNG, CẮT LỚP VI TÍNH VÀ MÔ BỆNH HỌC CỦA TÍNH VÀ MÔ B...
NGHIÊN CỨU ĐẶC ĐIỂM LÂM SÀNG, CẮT LỚP VI TÍNH VÀ MÔ BỆNH HỌC CỦA TÍNH VÀ MÔ B...
 
Estou desempregado e agora? Como me recolocar como QA.
Estou desempregado e agora? Como me recolocar como QA.Estou desempregado e agora? Como me recolocar como QA.
Estou desempregado e agora? Como me recolocar como QA.
 

Similar to Media-Scanner-for-Data-Protection-Websites

Media-Scanner-for-Data-Protection-Ad-Tags
Media-Scanner-for-Data-Protection-Ad-TagsMedia-Scanner-for-Data-Protection-Ad-Tags
Media-Scanner-for-Data-Protection-Ad-TagsKenan Marks
 
Unveiling the Threat: The Impact of Spooling Attacks in Cybersecurity
Unveiling the Threat: The Impact of Spooling Attacks in CybersecurityUnveiling the Threat: The Impact of Spooling Attacks in Cybersecurity
Unveiling the Threat: The Impact of Spooling Attacks in CybersecurityShubhamGupta410081
 
10 ways to protect your e commerce site from hacking & fraud
10 ways to protect your e commerce site from hacking & fraud10 ways to protect your e commerce site from hacking & fraud
10 ways to protect your e commerce site from hacking & fraudWebSitePulse
 
ITSolutions|Currie Network Security Seminar
ITSolutions|Currie Network Security SeminarITSolutions|Currie Network Security Seminar
ITSolutions|Currie Network Security SeminarDaniel Versola
 
Global Media Company - Media Scanner
Global Media Company - Media ScannerGlobal Media Company - Media Scanner
Global Media Company - Media ScannerKenan Marks
 
Managed Takedown Service - Digital Shadows
Managed Takedown Service - Digital ShadowsManaged Takedown Service - Digital Shadows
Managed Takedown Service - Digital ShadowsDigital Shadows
 
Intelligence-Driven Fraud Prevention
Intelligence-Driven Fraud PreventionIntelligence-Driven Fraud Prevention
Intelligence-Driven Fraud PreventionEMC
 
Cyber Security School Workshop
Cyber Security School WorkshopCyber Security School Workshop
Cyber Security School WorkshopRahul Nayan
 
What Strategies Are Crucial for Ensuring eCommerce Security in the Digital Era?
What Strategies Are Crucial for Ensuring eCommerce Security in the Digital Era?What Strategies Are Crucial for Ensuring eCommerce Security in the Digital Era?
What Strategies Are Crucial for Ensuring eCommerce Security in the Digital Era?Lucy Zeniffer
 
Clearswift f5 integration
Clearswift f5 integrationClearswift f5 integration
Clearswift f5 integrationMarco Essomba
 
Media Scanner for Resolution Services - Client
Media Scanner for Resolution Services - ClientMedia Scanner for Resolution Services - Client
Media Scanner for Resolution Services - ClientKenan Marks
 
Digital Shadows and Demisto Enterprise Integration Datasheet
Digital Shadows and Demisto Enterprise Integration DatasheetDigital Shadows and Demisto Enterprise Integration Datasheet
Digital Shadows and Demisto Enterprise Integration DatasheetDigital Shadows
 
Cyberattacks on the Rise: Is Your Nonprofit Prepared?
Cyberattacks on the Rise: Is Your Nonprofit Prepared?Cyberattacks on the Rise: Is Your Nonprofit Prepared?
Cyberattacks on the Rise: Is Your Nonprofit Prepared?TechSoup
 
Ds cookie consent_050417 (2)
Ds cookie consent_050417 (2)Ds cookie consent_050417 (2)
Ds cookie consent_050417 (2)ionita marin
 
How Can I Reduce The Risk Of A Cyber-Attack?
How Can I Reduce The Risk Of A Cyber-Attack?How Can I Reduce The Risk Of A Cyber-Attack?
How Can I Reduce The Risk Of A Cyber-Attack?Osei Fortune
 
Cybercrime - Stealing in the Connected Age
Cybercrime - Stealing in the Connected AgeCybercrime - Stealing in the Connected Age
Cybercrime - Stealing in the Connected Agedlblumen
 
Network security
Network securityNetwork security
Network securityROBERT S
 

Similar to Media-Scanner-for-Data-Protection-Websites (20)

Media-Scanner-for-Data-Protection-Ad-Tags
Media-Scanner-for-Data-Protection-Ad-TagsMedia-Scanner-for-Data-Protection-Ad-Tags
Media-Scanner-for-Data-Protection-Ad-Tags
 
Unveiling the Threat: The Impact of Spooling Attacks in Cybersecurity
Unveiling the Threat: The Impact of Spooling Attacks in CybersecurityUnveiling the Threat: The Impact of Spooling Attacks in Cybersecurity
Unveiling the Threat: The Impact of Spooling Attacks in Cybersecurity
 
10 ways to protect your e commerce site from hacking & fraud
10 ways to protect your e commerce site from hacking & fraud10 ways to protect your e commerce site from hacking & fraud
10 ways to protect your e commerce site from hacking & fraud
 
ITSolutions|Currie Network Security Seminar
ITSolutions|Currie Network Security SeminarITSolutions|Currie Network Security Seminar
ITSolutions|Currie Network Security Seminar
 
Global Media Company - Media Scanner
Global Media Company - Media ScannerGlobal Media Company - Media Scanner
Global Media Company - Media Scanner
 
Managed Takedown Service - Digital Shadows
Managed Takedown Service - Digital ShadowsManaged Takedown Service - Digital Shadows
Managed Takedown Service - Digital Shadows
 
Intelligence-Driven Fraud Prevention
Intelligence-Driven Fraud PreventionIntelligence-Driven Fraud Prevention
Intelligence-Driven Fraud Prevention
 
Cyber Security School Workshop
Cyber Security School WorkshopCyber Security School Workshop
Cyber Security School Workshop
 
What Strategies Are Crucial for Ensuring eCommerce Security in the Digital Era?
What Strategies Are Crucial for Ensuring eCommerce Security in the Digital Era?What Strategies Are Crucial for Ensuring eCommerce Security in the Digital Era?
What Strategies Are Crucial for Ensuring eCommerce Security in the Digital Era?
 
Clearswift f5 integration
Clearswift f5 integrationClearswift f5 integration
Clearswift f5 integration
 
McAfee
McAfeeMcAfee
McAfee
 
Media Scanner for Resolution Services - Client
Media Scanner for Resolution Services - ClientMedia Scanner for Resolution Services - Client
Media Scanner for Resolution Services - Client
 
Site guard
Site guardSite guard
Site guard
 
Digital Shadows and Demisto Enterprise Integration Datasheet
Digital Shadows and Demisto Enterprise Integration DatasheetDigital Shadows and Demisto Enterprise Integration Datasheet
Digital Shadows and Demisto Enterprise Integration Datasheet
 
Cyberattacks on the Rise: Is Your Nonprofit Prepared?
Cyberattacks on the Rise: Is Your Nonprofit Prepared?Cyberattacks on the Rise: Is Your Nonprofit Prepared?
Cyberattacks on the Rise: Is Your Nonprofit Prepared?
 
Ds cookie consent_050417 (2)
Ds cookie consent_050417 (2)Ds cookie consent_050417 (2)
Ds cookie consent_050417 (2)
 
How Can I Reduce The Risk Of A Cyber-Attack?
How Can I Reduce The Risk Of A Cyber-Attack?How Can I Reduce The Risk Of A Cyber-Attack?
How Can I Reduce The Risk Of A Cyber-Attack?
 
Cybercrime - Stealing in the Connected Age
Cybercrime - Stealing in the Connected AgeCybercrime - Stealing in the Connected Age
Cybercrime - Stealing in the Connected Age
 
Network security
Network securityNetwork security
Network security
 
Internal Audit
Internal AuditInternal Audit
Internal Audit
 

Media-Scanner-for-Data-Protection-Websites

  • 1. Dataleakageresultsinlostrevenueandprivacyviolations Occurring with greater and greater frequency, data leakage is the collection of your valuable first-party data by the various third parties accessing your site, which then resell your data or redirect your web audience to competitive sites, without ever notifying or compensating your company. Unfortunately, most marketing and web security teams fail to track and monitor these third parties, so they never realize their valuable audience data is leaking off the site. Along with lost revenue, having a host of unwanted or unknown trackers on your site may also violate your own IT governance and privacy policies as well as the growing collection of governmental regula- tions and mandates. Collectively, these can damage both your brand and your corporate reputation. HowMediaScannerpreventsdataleakage By scanning your website on a continuous, 24/7 basis, The Media Trust’s Media Scanner for Data Protection prevents data leakage by monitoring, analyzing and reporting on vendors, domains and data tracking elements present on your site, which provides timely and actionable information to quickly resolve issues with your data, analytics and advertising partners. From a large array of servers located in 500 cities spread across six continents, which utilize many browser/OS combinations and automated user-interactions, the Media Scanner solution scans your website at appropriate frequencies to ensure your first-party data is protected on a 24/7 basis. The Media Trust’s Media Scanner for Data Protection provides you with: • Immediate notification and alerting so you can quickly resolve data leakage issues • Granular visibility and continuous control of what’s on your website, how long it’s been there and its purpose or function • 24/7 in-house, on-shore technical support • Comprehensive, yet flexible reporting that gives you the detailed visibility and control needed to manage and protect your site A Security-as-a-Service offering, Media Scanner for Data Protection detects, catalogues and alerts on a wide range of data leakage elements, including: • Domains/hosts/URLs • Pixels • HTTP/HTTPS utilization • Unique/non-unique categorization • Browser cookies • DOM storage manipulation • Flash cookies • Segment lifespan and expiration Media Scanner for Data Protection—Websites
  • 2. The Media Trust 6861 Elm Street, Suite 3A McLean, VA 22101 703.893.0325 www.themediatrust.com The Media Trust With a physical presence in 65 countries and 500 cities located around the globe, The Media Trust’s proprietary website and ad tag scanning technology provides continuous, non-stop protection against malware, site performance issues and data leakage, which can lead to lost revenue and privacy violations. The Company also enables comprehensive quality assurance of an ad campaign’s technical and creative components, supporting display, rich-media, video, search and mobile advertising. In addition, The Media Trust’s technology provides publishers with visual ad verification for geographically-targeted campaigns, ensuring thousands of media buys are executed correctly, reducing discrepancies, errors and make-good scenarios in-flight. The solution also provides detailed background information on the domains and cookies present in the scan execution, including: • Vendor name and parent company, if relevant • Company description • Company contact information • Services provided • Browser cookie definition, classification and description Furthermore, the solution easily lets you define your own white list and black list of domains and cookies. You can also change or modify this list at any time. With this approach, your team only focuses its time on domains and cookies detected that are new or unauthorized. If your team does not currently categorize these entities, The Media Trust can assist you in defining, organizing and managing them. HowMediaScannerforDataProtectionworks To get started with Media Scanner for Data Protection, you enter the site domain(s) into the system along with the desired scan frequency, the geographic areas to scan, your white/black list of domains, and your cookies and other data collection methods you want flagged. Once this information is entered, the system will immediately start scanning. Upon detection of an unknown or black listed third-party code, the Media Scanner system immediately notifies you via email, so you can remove and block the offending code, preventing any more of your first-party data from leaving the page. If the domain is unknown or of concern to the Media Scanner Technical Support Team, they notify the company’s Malware Team, which will immediately capture and isolate the code and begin an immediate forensic examination to determine its intent, purpose, pathway and possible origins. The Media Scanner successfully detects and removes 98% of all suspect activity prior to the malicious code from inflicting any harm. The Media Trust’s continuous monitoring, inspecting and analyzing of all suspicious activity, anomalies or overt malware protect your website from the constant, unending threat of web-based malware. Customizedreportingandalerts Whether detecting for malware, HTTPS, data leakage or site performance issues, the Media Scanner provides you and your team with robust alert and reporting engines, which enable instant, real-time alerting and notification as well as reports detailing site activity generated daily, weekly or any client-defined frequency and distribution. The solution is also able to export issues directly to your upstream partners, which speeds the resolution of the issue more quickly and efficiently. © 2014 — The Media Trust