Scoping made easy for payment card data security and compliance

Card Recon is the industry-leading solution for identifying payment card data, specifically designed for PCI DSS compliance. Supporting controls across the latest version of the standard, Card Recon delivers a simplified approach to scoping and data management for PCI DSS compliance.

Card Recon Desktop

Lightweight PCI DSS data discovery for end-user devices

Card Recon Server

Out-of-the-box payment card data discovery trusted by QSAs


Key feature differencesCard Recon DesktopCard Recon Server
DesktopWindows
macOS
ServerWindows
Linux
FreeBSD
Solaris
HP-UX
AIX
EBCDIC
Target typesLocal storage
Free space
Shadow volumes
Memory
File typesText files
All encodings
Office docs
Compressed files
Audio files (incl. DTMF)
OCR files
Other benefitsMulti-Format reporting
Data remediation
LicensingPer desktopPer target

Go beyond PCI data discovery and credit card scanning

Need to scan your company’s emails, documents, databases and other sources of structured and unstructured data?

McDonald's
Thales
Verifone
BP
UNICEF Australia
The Ritz-Carlton
Hallmark
Oxfam
CDC: Centers for Disease Control and Prevention

Diagram of connected systems representing a data-centric approach to asset management with Enterprise Recon

Enhancing asset management with Enterprise Recon: A data-centric approach

Digital assets are critical to modern business operations. These assets – devices, platforms, applications and services – are responsible for storing, processing and transmitting the data that powers the organization. Yet, many organizations still struggle to maintain a complete and accurate inventory of these assets, exposing them to cyber-attack and compliance risks.  Effective asset management…

The real cost of legacy data – Managing the ROT

As organizations are looking to modernize their technology estate, many remain burdened with legacy data, costing millions of dollars a year to host and maintain. The risks posed by legacy and redundant, obsolete and trivial (ROT) data present a very real threat in today’s progressive cybercrime landscape. In this post we’ll consider the hidden costs…

A security shield on a network concept background representing data discovery for ISO27001 compliance

The value of data discovery for ISO27001

The international standard ISO27001 is one of the longest-standing and most widely recognized benchmarks for cybersecurity and privacy protection worldwide. Introduced initially as BS 7799 in 2995 and updated to ISO27001 in 2005, the standard establishes an information security management system (ISMS), delivering a comprehensive framework for organizational security and information risk management.  The standard…

a globe surrounded by model people of all races on a green background representing privacy law compliance

Mastering privacy compliance with PII discovery and data management

The number of data protection and privacy laws in place globally have increased dramatically over the last decade. According to the latest UNCTAD figures, 137 countries have enacted privacy laws protecting personal data rights of residents. Almost 80% of the world’s population is protected by privacy legislation – around 6.3 billion people.  While historically, data…

A union jack flag and judges gavel representing UK Data Use and Access Act 2025 – What you should know

UK Data Use and Access Act 2025 – What you should know

The UK Data Use and Access Act 2025 (DUAA) passed through both parliamentary houses and received Royal Assent on June 19, 2025. The bill is an important milestone for data protection legislation in the UK.  In this post, we’ll explain what you should know about the DUAA and its implications for businesses, enforcement timelines and…