DataSunrise is sponsoring AWS re:Invent 2023 in Las Vegas, please visit us in DataSunrise's booth # 1359 at re:Invent
DataSunrise has achieved Amazon RDS Ready Designation.
This website stores cookies to collect information about how you interact with our website. To find out more visit our Privacy Policy.
This section contains detailed guides on how you can mask your data, set up your database auditing and make your data and database secure.
Introduction Welcome to our latest blog post where we dive into the specifics of running pgbench through a DataSunrise proxy for PostgreSQL databases, particularly for version 14 and later. These versions of PostgreSQL come with an activated feature known as SCRAM authentication, enhancing security through…
In DataSunrise we always strive to make our users’ experience easier. Logging in to numerous services and websites can take a lot of time. Plus there is also a variety of different difficult passwords that you should remember or restore every time you forget it….
Previously, we described how to make Single sign-on authentication (SSO) based on SAML with the help of Okta. SSO is a useful tool when you need to authenticate in different applications or websites with one set of credentials. That is why we also implemented SSO…
To provide our clients with a powerful data discovery tool, some time ago we presented the OCR (Optical Character Recognition) functionality integrated into our Data Discovery module. This feature enables you to search for sensitive data such as personal data, credit card numbers, driver licenses,…
Previously we described how to configure DataSunrise on Microsoft Azure using Azure Resource Manager. As far as High Availability configuration requires accurate setting implementation with all the dependencies applied correctly, there is no doubt that templates are useful. Without them the product installation might take…
DataSunrise application can protect not only single node database servers but also cluster type database servers. Let us take a deep look into integration of DataSunrise application with SQL Server Always On Cluster. An availability group supports a replicated environment for a discrete set of…
Nowadays Cloud Computing technology is the most efficient and convenient way to run the production environment in. Many companies are willing to store their data and deploy applications to the cloud to be able to build, run, and manage their services across multiple clouds using…
Azure
Cloud Computing
DataSunrise now has the capability of Static Data Masking for MongoDB. Earlier, only Dynamic Masking was supported. Now you can use all DataSunrise functionality with a variety of masking methods including Format-Preserving Encryption (FPE), Format-Preserving Tokenization (FPT), and Lua script to implement custom masking algorithms….
MongoDB
Along with other functionalities, DataSunrise features a dedicated auditing tool, the DB Audit Trailing, based on usage of database native auditing tools and mechanisms. In this article we explain how to configure DataSunrise and your MySQL database hosted on MS Azure to do DB Audit…
Along with other functionalities, DataSunrise features a dedicated auditing tool, the DB Audit Trailing, based on usage of database native auditing tools and mechanisms. In this article we explain how to configure DataSunrise and your PostgreSQL database hosted on MS Azure to do DB Audit…
PostgreSQL
We expand our opportunities by introducing Dynamic Masking for Amazon Athena. Now you can obfuscate sensitive data from Athena on-the-fly to protect it from unauthorized persons. Client applications use an encrypted connection to connect to Athena. DataSunrise can mask data in Athena only in Proxy…
DataSunrise is compatible with various operating systems and Red Hat Enterprise Linux (RHEL) is one of them. No wonder sooner or later you can face the need to upgrade your OS. We wrote this guide to help you evade any possible issues of upgrading an…
Overview of database activity auditing methods Today, database auditing becomes more and more important because of numerous legal acts and regulations dedicated to sensitive data protection such as GDPR, KVKK, etc. Technically, there are multiple database auditing methods exist, the most popular are: Database traffic…
The majority of databases support verification of server identity by using certificates. Thus a verifying procedure is performed during a connection to a server: if the certificate received from the server is authentic, a connection will be established; otherwise it will be considered as a…
Database Proxy
SSL Certificates
DataSunrise provides multi-layered protection for your databases and as a result operates on a huge amount of data. Audit rules, security rules, several types of Masking rules… It’s easy to get confused with all this, and it takes a lot of time to get information…
Reports
Today, the activity of any organization is associated with the operation of a large amount of information, access to which has a wide range of people. Consequently, the complexity of ensuring the confidentiality of sensitive data increases, along with the growth of the volume of…
Redshift
Today it is almost unsurprising to see another headline related to data breaches or data privacy. This affects you personally as a customer of those companies – you want someone to take good care of your data. It also affects you professionally; as a person…
Amazon RDS
Preface Amazon Relational Database Service (Amazon RDS) is a web service that makes it easier to set up, operate, and scale a relational database in the AWS Cloud. It provides cost-efficient, resizable capacity for an industry-standard relational database and manages common database administration tasks. DataSunrise…
EC2
Oracle
Basically, the first thing to be done is to check the Dashboard to determine if a connection is established with DataSunrise Security Suite proxy. The established connections count is shown in the Dashboard section: For example, in this screenshot you can see that there are…
Linux Checking Process
Windows Checking Process
You must consider many nuances during developing tools that interact with various DBMS, because the same things could be implemented in different ways and a SQL standard could be supported in different ways, too. When considering enough amount of DBMS, it turns out that there…
Remove a Function
Remove a Procedure
Managing access to a substantial volume of data within an organization poses considerable challenges. Particularly when numerous individuals are involved, ensuring controlled access becomes a complex endeavor. Given these circumstances, the need for data protection becomes paramount. Unauthorized access and manipulation can lead to significant…
Dynamic Masking
Data in Clouds We are living in a world where data is one of the most valuable assets. And the IT industry is constantly developing ways of storing this data in the most convenient way. Storing data in clouds is one of the most popular…
Amazon S3
Data in Clouds
One of the ways to protect sensitive data inside databases is data masking. In this article we are going to learn more about in-place data masking and steps to mask your data in place using DataSunrise Database Security. Static Masking and In-place Masking In-place Masking…
In-place Masking
Static Masking
Introduction This document describes how DataSunrise masks sensitive data on-the-fly and how masking is performed for SQL and NoSQL database types. Data Masking Principles Let’s start from the beginning and get familiar with two basic principles of data masking in the database: Masking method based…
SQL
The main goal of Dynamic Data Masking from DataSunrise is to prevent accidental and deliberate data exposure. This goal is achieved by converting original real data into fake one. This database protection tool is very convenient when a company needs to provide access to its…
Static Data Masking tool is a constituent part of the DataSunrise Database Security Suite. It is a special database protection mechanism aimed at protecting sensitive data from any kind of inside and outside threats. All customer sensitive data is obfuscated thus making it useless for…
Introduction DataSunrise Database Security is a powerful Database Activity Monitoring/Data Auditing and real-time Data Protection and Database Firewall solution that significantly increases data and database security level both on-premise and in the cloud. Often, it is difficult to understand what data should be protected, where…
Best Practices
When working with the Data Discovery feature, DataSunrise enables you to use a variety of prebuilt search filters for various types of sensitive data. But is there a way of searching for unique data? Yes, to accomplish this task you can use Lua. The Lua…
Data Discovery
JSON file
Lua script
The Data Security component protects target databases against unauthorized queries and SQL injection attacks. Data protection functionality is available in the Proxy mode only. Deployed as an intermediary between users and databases, DataSunrise intercepts all incoming and outcoming queries. With the help of advanced SQL…
Security Rule
SQL injection is a web security vulnerability that allows a cybercriminal to get access to a database through a web application linked to this database. The attacker interferes with the queries from this web application directed at the database. As a result, the attacker can…
Security
SQL Injections
The data auditing capability enables real-time database activity monitoring and logging the information about queries reaching the database, such as database content modification, extraction or deletion. DataSunrise provides real-time tracking of database user actions, also monitors changes in database configuration and system settings. The audit…
Audit Rule
Database protection from DataSunrise is effected through sets of audit, security and masking rules. This approach makes protection very versatile and highly customizable. However, DataSunrise is constantly thinking how to make database protection even more user-friendly and efficient. DataSunrise can analyze all corporate traffic and…
Audit
Rules
DataSunrise provides an intelligent way of managing Rules triggering sequence to efficiently capture targeted information within your database. Whilst maintaining this level of focus, DataSunrise eliminates redundant execution and/or generation of audit records by the same Rule module twice, so that should be kept in…
Audit Rules
Security Rules
For your convenience, we have created a DataSunrise DEB Repository and added a possibility to install DataSunrise from it. To do it, run the Terminal and execute the following commands: 1. Install the dirmgr package for accessing the OpenPGP keyservers and the ca-certificates package to…
DEB repository
DataSunrise is pleased to announce DataSunrise Centralized Console which is aimed at easy management for multiple DataSunrise installations in your environment. This standalone application will help you to aggregate your DataSunrise management endpoint in one application in order to ease the pains of managing large…
DSCC
For your convenience, we created a DataSunrise RPM Repository and added a possibility to install DataSunrise from it. To do it, run the Linux Terminal and execute the following commands: For RHEL 8, CentOS 8 Run the Linux Terminal and execute the following commands: Import…
CentOS
RHEL