NT Analyzer has an assortment of powerful tools and capabilities to generate an action-driven assessment that can be used by in-house legal and IT teams. These features rely on NT Analyzer’s unique, data-driven privacy forensics.
What NT Analyzer can reveal:
- What data is transmitted—and when
We identify categories of personal data and technical identifiers observed in real transmissions, including obfuscated/encoded values where present. - Who receives the data
We map transmissions to the companies and services receiving them, including downstream recipients where relevant. - Where the data goes
We identify server destinations and geographies (e.g., city/country), supporting cross-border data transfer assessments and vendor diligence. - Whether consent and opt-outs work in practice
We test cookie banners, consent states, and opt-out behavior to confirm whether tracking and data sharing change as intended—across pages, sessions, and configurations. - Hidden tracking techniques
We flag indicators of less transparent tracking behaviors (such as fingerprinting-related signals) that can increase compliance and reputational risk. - Web code behavior and third-party logic (web properties)
We analyze third-party scripts to understand what they can access and what they’re designed to collect. - Data flow context and purpose
We provide a contextual view of data flows—who receives data and for what business and technical purposes—to help prioritize risk and remediation. - What to fix and how
We translate findings into prioritized, engineer-ready remediation actions, supported by evidence excerpts that privacy teams can use to align marketing, product, and engineering.
Methods we use:
- API mapping
- JavaScript file analysis
- Fingerprinting indicators
- Server location analysis
- Opt-out/consent enforcement analysis
- Host mapping
- Third-party attribution
- Host origin/family tree
- Precise data detection
- Key/value payload review
Categories of transmitted data we can detect:
- Personally identifiable information
- Advertising IDs
- Device IDs
- Network IDs
- Cookies
- Geolocation, lat long/street address
- Content (health, financial services, sexual orientation)
- “Fingerprinting” data
- Encoded or obfuscated data
- Custom as designated by client
Attributes of all parties receiving data:
- Host name and IP address
- Third party companies corresponding to the host names
- The function/role of the third party receiving data
- Server location by city/country
Contact Us
For more information about NT Analyzer or to schedule a demo of the tool suite, please send us a request using the form.