DataSunrise database activity monitoring capabilities enable the real-time tracking of all user actions and changes made to database. While the database auditing is used mostly for data breaches investigation, the continuous monitoring of activities helps detecting the attempts of access rights abuse and preventing the data breach preparations in advance.
DataSunrise utilizes the intelligent self learning algorithms with behavioral analysis to speed up the database firewall deployment process. DataSunrise analyzes the typical user and application behavior and creates a “White List” of SQL queries considered as safe ones by default.
DataSunrise Data Protection module is the primary tool defending the corporate databases against harmful and hostile actions and be in compliance.
Armed with continuous traffic monitoring and advanced SQL analysis algorithms, DataSunrise detects the SQL injections and unauthorized access attempts on-the-fly in the real-time. When DataSunrise database firewall reveals any security policy violation, it blocks any malicious SQL query immediately and notifies administrators via available methods such as SMTP or SNMP.
DataSunrise prevents sensitive data exposure with its Dynamic Data Masking capabilities.
DataSunrise Data Masking secures the business-critical information by hiding the data from the entire database, or just selected tables, or columns from any unwanted user. DataSunrise masks the data by replacing the actual database entries with randomly generated or user predefined values.
The security policy specified entries are masked on-the-fly in the real-time, before the data is extracted from database in order to avoid a potential data leakage and stay in compliance.
DataSunrise ensures protection of business-critical data with its Static Data Masking feature.
It obfuscates data duplicated for development and testing environments. It creates an offline or testing database and masks the entire database, replacing actual database entries with randomly generated or predefined values. Data in replicated database is not readable and has no value but remains looking consistent and realistic.
Unmasked data never leaves the source database and this ensures security of data in transit. It is the suitable masking method when working with third-party contractors, outsourced developers and testing teams.
DataSunrise discovers where sensitive and confidential data resides across the organization. It allows companies to understand what information resources they process and what level of control would be appropriate for each type of data.
DataSunrise data search capability helps to acquire complete visibility into enterprise information resources. Fast and accurate search of data ensures that appropriate security policies will be created to protect exactly what needs to be protected.