Instantly locate sensitive documents
Manage critical data records
Alert users of potential data leaks before they happen
Discover patterns within sensitive data
Protect documents using seamless encryption
Immediately detect cyber breaches

Sign Up For a Demo

Learn More Contact Us


Stop security breaches before they happen with automatic data management

We understand that every organization has unique critical data characteristics, so manual policies are not sufficient in today’s world. Through advanced machine learning technologies, we automatically classify sensitive data, establish access rights to documents, and indicate possible data breaches.

Our solution provides:

  • Heat map visualizations of sensitive documents
  • User alerts for data leak prevention
  • Seamless sensitive document encryption
  • Indication of cyber breaches by detecting document access anomalies
Discover and Protect Critical Data
Prevent Data Theft on End Points, Mobile Devices and Cloud Services


Critical Data Heat Maps

Having a bird’s-eye view on critical data is essential to becoming more resilient to cyber-attacks and internal data exfiltration. Discover where sensitive documents are located and who has access to confidential data records.

  • Learn – The solution builds a unique statistical model using data samples
  • Discover – Agents are deployed across the organization to classify documents and report back
  • Visualize – The solution generates comprehensive reports including heat maps and risk assessment


Preemptive Data Leak Prevention

Prevent users from unintentional transfer of confidential information outside the organization. 


  • Learn – The solution builds a unique statistical model using data samples
  • Integrate – Agents are deployed across the organization to inspect data transfers
  • Prevent – The agent automatically detects sensitive document transfers then alerts the user and the IT security officers/li>

Secured Vault

A comprehensive solution for critical data protection anywhere, anytime.


  • Learn – The solution builds a unique statistical model using data samples
  • Classify -End point agents classify each document against sensitive data patterns
  • Protect – The agent encrypts sensitive documents and saves the key in the secured vault
  • Detect – The vault continuously detects any access anomalies and report to the IT team




Every organization has different DNA. We use advanced machine learning technology to learn its unique sensitive patterns.


Agents use the critical data model to classify sensitive documents in the cloud, end points and mobile devices.


Sensitive records are mapped throughout the organization. The system encrypts documents, prevents data breaches and alerts the end-user.


The system audits access to sensitive documents. Abnormal behavior is detected then reported to the security officers.


D.Day Labs analysis of intrinsic data patterns is key in becoming better protected against unforeseeable threats.

Ronen Lago, IS & GS CTO, Lockheed Martin

D.Day Labs solution could solve the need for data protection and the recent growing need for data accountability.

Tal Mozes, Head of Ernst & Young’s Advanced Security Center

Telecommunication enterprises today face immense data governance challenges, D.Day Labs data mapping solution could help us become more accountable for our data

Oran Hollander, Head of Cyber Security at Telefónica Germany


Pinhas Buchris

Board Member

Ret. Brig. General Pinhas Buchris is a recognized leader in the development of Israel’s cyber security technology capabilities (Former head of the Israeli Ministry of Defense) and an experienced investor.

Guy Leibovitz


An experienced entrepreneur specializing in bringing ideas from board sketches to industry grade products.


Interested in a Demo? Have a question or comment?
Get in touch with us.

You can also contact us for more information by phone or email. We look forward to speaking with you!

3 Rothschild Blvd 3, Floor 9
Tel Aviv

+972 (3) 54 999 3883

Your Message Has Been Sent! Thank you for contacting us.
Oops, An error has ocurred! See the marked fields above to fix the errors.