Databases are at the heart of every business application. They store critical, personal, and sensitive information. Companies in general have to manage a number of heterogeneous database technologies to accomplish all tasks they need for their business to be successful. Databases are accessed by a multitude of users and applications, coming from disparate sources and running diverse queries.
The Auditing and recording of database activity plays an essential role in achieving data privacy laws compliance: This ongoing exercise is a mandatory requirement from: ie GDPR, HIPAA, SOX, PCI. Companies need the ability and ease to perform monitoring of constant solicitation to their databases but also prevent data breaches through detection of unusual activity.
Agents monitor network traffic to capture queries. Local activities such as Oracle Bequeath connections are also monitored and captured.
Dataskope agents will not cause any service outage since they do not work as a middle-man, therefore as a single point of failure risk.
Dataskope server runs on a hardened Windows server or Linux box you own. Unlike other systems, no password is hidden from you, you have all the passwords to login to Dataskope server and perform maintenance tasks. Every audit record is stored with a hash value to provide log integrity.
Dataskope supports local and LDAP authentication as well as role-based-authorization to ensure logs can only be viewed by an authorized operator. You can determine who-can-see-what as well as who-can-do-what. All operator activities are also logged.
Dataskope can recognize and mask sensitive/personal information (credit card numbers, email addresses, medical records, etc.). Recognizers can be extended and configured via regular expressions. Dataskope comes with built-in user id chain detection that lets you discover the actual user behind "runas", "su", and "sudo".
A sophisticated complex-event-processing-engine enables you to correlate, search, define log collection policies and alerts.
Dataskope offers a sophisticated set of policies to enable detection of unusual activity or unauthorized connection. Upon detection of such event, Dataskope can abort the activity and kill the connection, and also send alerts.
A portfolio of products to ensure activity monitoring intelligence and prevention for all your software assets. (Ask us about Infraskope)
Dataskope key differentiators:
Begin your digital transformation journey now! Partner with us and put your business on the right track to success!