Database & Data Security, Data Masking, Data Audit and Data Discovery from DataSunrise

DataSunrise Database Security solves real-time database protection needs and data security compliance requirements.
DataSunrise data-centric security includes database application firewall to detect and block SQL injections and unauthorized access attempts, database activity monitoring and data auditing, data masking solutions to obfuscate sensitive data in order to prevent the accidental data leaks and data classification to discover any sensitive data.

DataSunrise is hiding and securing the databases it protects. DataSunrise can be deployed easily in the cloud or on-premises.

DataSunrise Database Security supports all major vendors of databases and data warehouses. DataSunrise secures databases running on most operating systems (Windows, Linux, UNIX) and features a user-friendly, comprehensive user interface.

DataSunrise’s Discovery of Sensitive and Privacy Data enables the visibility into security intelligence, classification of the data and empowers organizations to mitigate the risks.

DataSunrise can be integrated with third-party SIEM systems such as Splunk, HP ArcSight, IBM QRadar, McAfee or other security solutions.

DataSunrise helps in ensuring the compliance with security standards such as HIPAA, ISO 27001, PCI or GDPR.

Key Benefits
Real-Time
Real-Time

DataSunrise Database Security protects your data and databases both from external and internal threats while performing database audit, activity and traffic monitoring in real-time with high performance.

Cross-Platform
Cross-Platform

DataSunrise Database Security is actively available on the spot to protect data in Oracle, DB2, Teradata, MySQL, MSSQL, PostgreSQL, MariaDB, Greenplum, Amazon Redshift, Amazon Aurora and Netezza databases. Due to its cross-platform capabilities, DataSunrise database firewall is compatible with databases running on most popular platforms such as Linux, Unix(AIX, Sun Solaris, HP UX, etc.) and Windows. The wide heterogeneous support and unified security control is especially important when enterprises and organizations run different database and operating system platforms in their environments, both on premises and in cloud.

Self-Learning
Self-Learning

DataSunrise includes highly efficient Data-Centric security governance policies and controls. The database firewall enables its user to customize the security rule set to easily adapt it to specific application requirements. Moreover, DataSunrise can configure itself automatically due to integrated self-learning algorithms. During the learning period DataSunrise utilizes its Learning Mode functionality to research database users behavior and create a “White List” of typical SQL statements.

Database Audit and Protection
DataSunrise database auditing and security is based on the following features:
White List

The “White List” consisting of SQL statements that comply with the firewall’s data security policy.

Black List

The “Black List” of SQL statements that are defined as harmful and should be blocked by the firewall when detected.

armor

Safety rules system (includes Database Audit, Data Security and Data Masking rules). It is used to control the firewall behavior based on admin-defined parameters such as database client’s IP address, application, user attributes, SQL statements category and database objects.

Dynamic Data Masking and SQL injection prevention
Data Masking

DataSunrise gives its user the possibility of controlling sensitive data access due to its data masking capability. DataSunrise prevents sensitive data misuse by letting unauthorized users to see the obfuscated or fake (yet realistic-looking) data instead of the actual data. Depending on security policies set by the Database Security or Firewall administrators, DataSunrise will mask an entire database or just separate database elements such as columns.

SQL injection attacks prevention

DataSunrise Database Security has built-in advanced algorithms to detect suspicious SQL statements and SQL injections.
DataSunrise performs continuous database traffic analysis by inspecting the code of each incoming SQL query. In cases when the query contains any “prohibited” statements from the “Black list”, DataSunrise blocks it immediately and notifies the data security administrators via email.

System Requirements
64 or 32 bitWindows or Linux