Platform

An uploads-first privacy operations workspace — from intake to audit-ready outputs

Sylure validates bundle intake, maps personal data exposure back to the underlying assets, supports DSAR workflows, and produces governance-ready reporting. Built to be readable for non-technical stakeholders — and practical for teams who need evidence, traceability, and controlled handling.

Core modules

Everything connects to the same evidence trail

Upload once, then route through discovery, triage, DSAR operations, or reporting. Each module reads from the same asset inventory.

Validated intake

Upload ZIP bundles with visible pipeline stages and predictable guardrails.

Asset-linked mapping

Findings stay tied to file paths so remediation and handoff are practical.

DSAR workflow

Search across assets, consolidate identifiers, and assemble subject bundles.

Audit-ready reporting

Scopeable analytics and exports for leadership and governance.

10+ common file typesContact • Identity • Financial • Government identifiersMasked evidence by default

End-to-end pipeline

Upload → Validate → Security scan → Extract & classify → Findings → Dashboards → DSAR → Governance outputs.

End-to-end platform flow
End-to-end pipelineIntake pipelineExtract & classifyOperational workflowsEvidence & oversightUpload bundlePENDING → RECEIVEDValidate intakeVALIDATING stageSecurity scanClamAV • SECURITY_SCANNINGExtract & classify personal dataSCANNING stage • IdentityHit extraction • Data categories: contact, identity, financial, gov IDExposuresFindings • risk bands • statusDashboardRisk summary • hotspotsDSAR SearchSubject bundles • exportsGovernance outputsAudit trail • workspace access control • retention & purge • Analytics exports

Platform

Core modules, aligned to real workflows

From validated intake to DSAR operations and audit-ready governance — each module stays tied to the underlying assets.

Sources

Validated intake with an auditable processing pipeline

Upload ZIP bundles (exports, archives, case folders) and move through a consistent pipeline. Intake is constrained with guardrails and recorded stages, so teams can confidently explain what was processed and when.

  • Uploads-first: start with the data you already have, without connector rollout overhead.
  • Guardrails for size, entry count, and extraction limits to keep intake predictable.
  • Processing stages are visible to reviewers (validation, security checks, indexing).
  • Bundle lifecycle controls support storage limitation and internal retention posture.
Validated bundle ingestionSecurity-first pipelineRetention-aware lifecycle

Intake & processing pipeline

Validated ingestion through VALIDATING → SECURITY_SCANNING → SCANNING stages with defensible outcomes.

Diagram view
Intake & processing pipelineIntake stagesSCANNING stageAuditabilityBundle uploadPENDING → RECEIVEDValidation guardrailsVALIDATING • size & limitsSecurity scanClamAV • SECURITY_SCANNINGExtract & classifySCANNING • IdentityHit detectionMap to assetsAsset paths • Finding creationUpload ledger & status historyCOMPLETED • COMPLETED_WITH_WARNINGS • FAILED_* outcomes • timings & metrics

Exposure findings

Exposure mapping that stays tied to the underlying asset

Sylure surfaces personal data signals and keeps every finding anchored to the source file and path. This makes remediation practical: you can hand results to engineering or data owners with exact context.

  • 10+ common file formats supported across real-world exports, documents, emails, and logs.
  • Governance-aligned categories: Contact, Identity, Financial, and Government identifiers (where present).
  • Filter by risk band, category, upload, and status to focus review on what matters.
  • Evidence is shown as masked snippets to validate context safely during review.
Categorised exposureReviewable findings tableMasked evidence by default

Exposure management

Assets linked to Findings with status tracking (active, superseded, resolved) and risk bands.

Diagram view
Exposure managementAsset-linked traceabilityReview workflowOutputsAssetFile path • IdentityHit[] • source uploadFindingRisk band • Exposure type • data typesTriage & filterRisk band • category • upload scopeStatus resolutionactive → superseded / resolved_removedRemediation handoff & evidenceMasked evidence snippets • asset references • exportable views

Dashboard

A single view of exposure footprint and risk concentration

See how exposure concentrates across assets and severity bands. The dashboard focuses stakeholders on what to prioritise next, without requiring them to interpret raw detections.

  • Exposure footprint and risk profile for the current analytics scope.
  • High-severity hotspots to guide remediation and reduce impact quickly.
  • Most exposed assets by volume and severity to drive accountable ownership.
  • Consistent risk language across the platform for clear reporting.
Risk summary at-a-glanceHigh-severity hotspotsRemediation handoff-ready

Risk dashboard

Exposure footprint, severity breakdown, and prioritisation for remediation.

Diagram view
Risk dashboardAnalytics scopeRisk summary tilesPrioritisationScope selectionRangeKey: 7d / 30d / all • upload filtersTotal exposedPersonal data countAssets affectedFiles with personal datariskScoreLow / Moderate / ElevateddsarSummarySubjects this monthPrioritise remediationhighRiskExposures hotspots • hitQuality (active vs ignored)

Analytics

Scopeable analytics for reporting and governance conversations

Switch between time ranges and uploads to answer stakeholder questions quickly. Analytics helps teams explain risk posture, coverage, and progress without exporting spreadsheets to stitch together later.

  • Time-range scoping (for example, last 7/30 days) and upload filters for targeted analysis.
  • Risk distribution and exposure counts for consistent reporting.
  • Identify highest-risk assets and most common high-severity categories.
  • Export and share outputs for internal reporting workflows.
Risk distributionExportable reportsGovernance-friendly summaries

Reporting & analytics

Scopeable views (7d, 30d, all) for DPOs, security engineers, and leadership stakeholders.

Diagram view
Reporting & analyticsReport scopeAnalysis viewsExportAnalytics scopeRangeKey: 7d / 30d / all • upload filtersData compositionPersonal data by typeTop assetsTopAssetsResponse • risk scoresCategory driversidentity / contact / financialStakeholder outputsCSV exports • leadership summaries • governance-ready reporting

DSAR operations

Search across uploads and consolidate into a subject bundle

Locate a data subject across assets using common identifiers, then consolidate results into a case-style bundle for review and export. It keeps DSAR workflows defensible without becoming a raw data warehouse.

  • Direct search across assets using email, phone, name, and address/postcode signals.
  • Subject bundle view consolidates multiple identifiers against the same individual.
  • Review results with masked evidence and asset references for traceability.
  • Exports support internal response workflows and QA of ignored vs active exposure.
Search across uploadsDSAR workflow supportEvidence-backed exports

DSAR operations

Subject search by email, phone, name → consolidated bundle → masked evidence export.

Diagram view
DSAR operationsSubject searchReview workflowExportDirect searchIdentifierKind: email, phone, name, postcodeSubject bundleSubjectProfile • consolidated identifiersMatches & evidenceAsset refs • masked snippets • valueHashDecisionInclude / suppress (IdentityOverride)DSAR response packSubjectJourneyResponse • SubjectSystemSummary • evidence-backed exports

Workspace

Invite teammates and manage roles in one workspace

Privacy operations is a team sport. Add colleagues with clear roles and keep access scoped to your workspace, supporting least-privilege workflows and operational continuity.

  • Role-based access patterns for admin, analyst, and viewer style workflows.
  • Invite teammates and manage seat usage from one place.
  • Clear separation of responsibilities for reviewers vs approvers.
  • Operationally simple: designed for small teams without enterprise overhead.
Workspace rolesLeast privilege postureAccountable actions

Workspace access control

Role-based access (Admin, Analyst, Viewer) with least-privilege enforcement.

Diagram view
Workspace access controlWorkspaceRole-based accessGovernanceWorkspace accessMembers • seats • role assignmentsAdminConfiguration • member mgmtAnalystReview • triage • DSAR opsViewerRead-only dashboard accessLeast-privilege enforcementRole capabilities auditable • AuditLog tracks actor + action + outcome

Audit log

An audit trail you can export for governance and assurance

Sylure records key actions and outcomes so teams can evidence operational control. Audit logs help support internal reviews, DPIA discussions, and external assurance conversations.

  • Action-level visibility (who did what, and when).
  • Outcome tracking for key workflows.
  • Exportable audit logs for internal compliance processes.
  • Supports traceability expectations in privacy and security programmes.
Audit-ready recordExport controlsOperational assurance

Audit trail

Action + outcome capture with exportable logs for governance reviews.

Diagram view
Audit trailCaptureOperateAssuranceAuditLog actionActor • AuditAction • target • metadataAuditOutcomeSUCCESS / FAILURE / DENIEDFilter & searchAction type • date range • actorExportCSV for governance reviewsEvidence of operational controlRequest context (IP, user agent) • immutable log for DPIA & governance

Retention & deletion

Prune and delete uploads with governance-aligned controls

Apply retention posture without manual clean-up. Schedule deletion of uploads and purge derived outputs to keep the platform aligned with internal policy and storage limitation principles.

  • Schedule deletion to immediately remove bundles from operational views.
  • Purge derived outputs to permanently remove computed results when required.
  • Retention posture can align to your storage and lifecycle configuration.
  • Designed to support data minimisation and safe handling of derived outputs.
Retention postureOperational controlsGovernance alignment

Retention & deletion

Soft delete → purge workflow with audit trail for storage limitation compliance.

Diagram view
Retention & deletionData lifecycleLifecycle actionsComplianceRaw bundlesUpload archives • quotaReservedBytesDerived dataFindings • Assets • IdentityHitsSchedule deletiondeletedAt • deleteReason • soft deletePurge derived outputspurgeAt → purgedAt • permanent removalDeletion audit trailTombstone records • deleteReason captured • storage limitation compliance
Coverage

Coverage that's operational — not theoretical

The goal isn't just detection — it's defensible operations. Sylure focuses on mapping exposure back to assets, supporting consistent review outcomes, and producing outputs that stakeholders can actually use.

What Sylure reads

CSVLOGTXTXLSXJSONHTMLXMLPDFDOCXEML

Personal data categories

Contact, Identity, Financial, and Government identifiers — surfaced as governance-aligned categories.

Designed for review

Masked evidence snippets help validate context while reducing unnecessary exposure during analysis.

Exposure management

Assets linked to Findings with status tracking (active, superseded, resolved) and risk bands.

Findings & exposure
Exposure managementAsset-linked traceabilityReview workflowOutputsAssetFile path • IdentityHit[] • source uploadFindingRisk band • Exposure type • data typesTriage & filterRisk band • category • upload scopeStatus resolutionactive → superseded / resolved_removedRemediation handoff & evidenceMasked evidence snippets • asset references • exportable views

Filter and triage

Scope by risk band, upload, and status to focus review on the exposures that matter most.

Evidence and traceability

Findings stay tied to the underlying asset path so remediation and governance remain defensible.

Controls

Governance controls that mirror the real workspace

Sylure is designed to support internal assurance: access control, auditability, and retention-aligned workflows. These controls sit alongside the operational modules — not in a separate "compliance portal".

Evidence handling & retention

Workspace access control

Role-based access (Admin, Analyst, Viewer) with least-privilege enforcement.

Architecture
Workspace access controlWorkspaceRole-based accessGovernanceWorkspace accessMembers • seats • role assignmentsAdminConfiguration • member mgmtAnalystReview • triage • DSAR opsViewerRead-only dashboard accessLeast-privilege enforcementRole capabilities auditable • AuditLog tracks actor + action + outcome

Workspace members & roles

Invite teammates and apply clear roles to support least-privilege review workflows.

Audit trail

Action + outcome capture with exportable logs for governance reviews.

Architecture
Audit trailCaptureOperateAssuranceAuditLog actionActor • AuditAction • target • metadataAuditOutcomeSUCCESS / FAILURE / DENIEDFilter & searchAction type • date range • actorExportCSV for governance reviewsEvidence of operational controlRequest context (IP, user agent) • immutable log for DPIA & governance

Exportable audit log

Capture actions and outcomes so teams can evidence operational control during assurance.

Retention & deletion

Soft delete → purge workflow with audit trail for storage limitation compliance.

Architecture
Retention & deletionData lifecycleLifecycle actionsComplianceRaw bundlesUpload archives • quotaReservedBytesDerived dataFindings • Assets • IdentityHitsSchedule deletiondeletedAt • deleteReason • soft deletePurge derived outputspurgeAt → purgedAt • permanent removalDeletion audit trailTombstone records • deleteReason captured • storage limitation compliance

Retention, deletion & purge

Schedule deletion and prune derived outputs to align with retention posture and storage limitation.

Next step

See Sylure on your exports

We'll walk through intake, findings, DSAR workflow, reporting, and governance controls — using your typical bundle shape.