Capabilities

NT Analyzer has an assortment of powerful tools and capabilities to generate an action-driven assessment that can be used by in-house legal and IT teams. These features rely on NT Analyzer’s unique, data-driven privacy forensics.

What NT Analyzer can reveal:

  1. What data is transmitted—and when
    We identify categories of personal data and technical identifiers observed in real transmissions, including obfuscated/encoded values where present.
  2. Who receives the data
    We map transmissions to the companies and services receiving them, including downstream recipients where relevant.
  3. Where the data goes
    We identify server destinations and geographies (e.g., city/country), supporting cross-border data transfer assessments and vendor diligence.
  4. Whether consent and opt-outs work in practice
    We test cookie banners, consent states, and opt-out behavior to confirm whether tracking and data sharing change as intended—across pages, sessions, and configurations.
  5. Hidden tracking techniques
    We flag indicators of less transparent tracking behaviors (such as fingerprinting-related signals) that can increase compliance and reputational risk.
  6. Web code behavior and third-party logic (web properties)
    We analyze third-party scripts to understand what they can access and what they’re designed to collect.
  7. Data flow context and purpose
    We provide a contextual view of data flows—who receives data and for what business and technical purposes—to help prioritize risk and remediation.
  8. What to fix and how
    We translate findings into prioritized, engineer-ready remediation actions, supported by evidence excerpts that privacy teams can use to align marketing, product, and engineering.

Methods we use:

  • API mapping
  • JavaScript file analysis
  • Fingerprinting indicators
  • Server location analysis
  • Opt-out/consent enforcement analysis
  • Host mapping
  • Third-party attribution
  • Host origin/family tree
  • Precise data detection
  • Key/value payload review

Categories of transmitted data we can detect:

  • Personally identifiable information
  • Advertising IDs
  • Device IDs
  • Network IDs
  • Cookies
  • Geolocation, lat long/street address
  • Content (health, financial services, sexual orientation)
  • “Fingerprinting” data
  • Encoded or obfuscated data
  • Custom as designated by client

Attributes of all parties receiving data:

  • Host name and IP address
  • Third party companies corresponding to the host names
  • The function/role of the third party receiving data
  • Server location by city/country

Contact Us

For more information about NT Analyzer or to schedule a demo of the tool suite, please send us a request using the form.