DataSunrise has achieved Amazon RDS Ready Designation.
This website stores cookies to collect information about how you interact with our website. To find out more visit our Privacy Policy.
This section contains detailed guides on how you can mask your data, set up your database auditing and make your data and database secure.
Today, the activity of any organization is associated with the operation of a large amount of information, access to which has a wide range of people. Consequently, the complexity of ensuring the confidentiality of sensitive data increases, along with the growth of the volume of…
Redshift
Nowadays Cloud Computing technology is the most efficient and convenient way to run the production environment in. Many companies are willing to store their data and deploy applications to the cloud to be able to build, run and manage their services across multiple clouds using…
Azure
Cloud Computing
Today it is almost unsurprising to see another headline related to data breaches or data privacy. This affects you personally as a customer of those companies – you want someone to take good care of your data. It also affects you professionally; as a person…
Amazon RDS
PostgreSQL
Preface Amazon Relational Database Service (Amazon RDS) is a web service that makes it easier to set up, operate, and scale a relational database in the AWS Cloud. It provides cost-efficient, resizable capacity for an industry-standard relational database and manages common database administration tasks. DataSunrise…
EC2
Oracle
Basically, the first thing to be done is to check the Dashboard to determine if a connection is established with DataSunrise Security Suite proxy. The established connections count is shown in the Dashboard section: For example, in this screenshot you can see that there are…
Linux Checking Process
Windows Checking Process
You must consider many nuances during developing tools that interact with various DBMS, because the same things could be implemented in different ways and a SQL standard could be supported in different ways, too. When considering enough amount of DBMS, it turns out that there…
Remove a Function
Remove a Procedure
Data in Clouds We are living in a world where data is one of the most valuable assets. And the IT industry is constantly developing ways of storing this data in the most convenient way. Storing data in clouds is one of the most popular…
Amazon S3
Data in Clouds
One of the ways to protect sensitive data inside databases is data masking. In this article we are going to learn more about in-place data masking and steps to mask your data in place using DataSunrise Database Security. Static Masking and In-place Masking In-place Masking…
In-place Masking
Static Masking
Introduction This document describes how DataSunrise masks sensitive data on-the-fly and how masking is performed for SQL and NoSQL database types. Data Masking Principles Let’s start from the beginning and get familiar with two basic principles of data masking in the database: Masking method based…
Dynamic Masking
SQL
The main goal of Dynamic Data Masking from DataSunrise is to prevent accidental and deliberate data exposure. This goal is achieved by converting original real data into fake one. This database protection tool is very convenient when a company needs to provide access to its…
Static Data Masking tool is a constituent part of the DataSunrise Database Security Suite. It is a special database protection mechanism aimed at protecting sensitive data from any kind of inside and outside threats. All customer sensitive data is obfuscated thus making it useless for…
Introduction DataSunrise Database Security is a powerful Database Activity Monitoring/Data Auditing and real-time Data Protection and Database Firewall solution that significantly increases data and database security level both on-premise and in the cloud. Often, it is difficult to understand what data should be protected, where…
Best Practices
When working with the Data Discovery feature, DataSunrise enables you to use a variety of prebuilt search filters for various types of sensitive data. But is there a way of searching for unique data? Yes, to accomplish this task you can use Lua. The Lua…
Data Discovery
JSON file
Lua script
The Data Security component protects target databases against unauthorized queries and SQL injection attacks. Data protection functionality is available in the Proxy mode only. Deployed as an intermediary between users and databases, DataSunrise intercepts all incoming and outcoming queries. With the help of advanced SQL…
Security Rule
SQL injection is a web security vulnerability that allows a cybercriminal to get access to a database through a web application linked to this database. The attacker interferes with the queries from this web application directed at the database. As a result, the attacker can…
Security
SQL Injections
The data auditing capability enables real-time database activity monitoring and logging the information about queries reaching the database, such as database content modification, extraction or deletion. DataSunrise provides real-time tracking of database user actions, also monitors changes in database configuration and system settings. The audit…
Audit Rule
Database protection from DataSunrise is effected through sets of audit, security and masking rules. This approach makes protection very versatile and highly customizable. However, DataSunrise is constantly thinking how to make database protection even more user-friendly and efficient. DataSunrise can analyze all corporate traffic and…
Audit
Rules
DataSunrise provides an intelligent way of managing Rules triggering sequence to efficiently capture targeted information within your database. Whilst maintaining this level of focus, DataSunrise eliminates redundant execution and/or generation of audit records by the same Rule module twice, so that should be kept in…
Audit Rules
Security Rules
DataSunrise is pleased to announce DataSunrise Centralized Console which is aimed at easy management for multiple DataSunrise installations in your environment. This standalone application will help you to aggregate your DataSunrise management endpoint in one application in order to ease the pains of managing large…
DSCC
For your convenience, we created a DataSunrise RPM Repository and added a possibility to install DataSunrise from it. To do it, run the Linux Terminal and execute the following commands: Import the public GPG key: sudo rpm –import http://rpm_repo.datasunrise.com/key.pub Сreate the /etc/yum.repos.d/DS.repo file: sudo touch…
CentOS
RHEL
For your convenience, we have created a DataSunrise DEB Repository and added a possibility to install DataSunrise from it. To do it, run the Terminal and execute the following commands: 1. Install the dirmgr package for accessing the OpenPGP keyservers: sudo apt-get -y install dirmngr…
DEB repository