Massachusetts Institute of Technology
Sign in | Create Account

Identity Finder software demo

This 5 minute demo shows how to use Identity Finder to scan your computer for sensitive files, to take action if sensitive files are found, and to save a report. Select the "toggle fullscreen" option for optimized viewing.

Comments (0)

It looks like no one has posted a comment yet. You can be the first!

You need to log in, in order to post comments. If you don’t have an account yet, sign up now!

Information Systems and Technology (IS&T)

Information Systems and Technology (IS&T)

Category: Technology | Updated 4 months ago

June 01, 2011 14:32
All Rights Reserved (What is this?)
Additional Files

4402 times

More from Information Systems and Technology (IS&T)

How to Lock a Computer Screen

How to Lock a Computer Screen

Added over 4 years ago | 00:03:16 | 9034 views

Spam Quarantine: What You Need to Know

Spam Quarantine: What You Need to Know

Added over 1 year ago | 00:03:36 | 1196 views |

How to Install and Use the MIT Mobile App

How to Install and Use the MIT Mobi...

Added almost 2 years ago | 00:00:00 | 1947 views

Connecting to with iOS Devices

Connecting to with iO...

Added 2 years ago | 00:06:41 | 2718 views

Encrypting Sensitive Data: What You Need to Know

Encrypting Sensitive Data: What You...

Added 2 years ago | 00:03:33 | 1994 views |

ServiceNow Change Management Demo

ServiceNow Change Management Demo

Added 9 months ago | 00:13:36 | 942 views |