Database Activity Monitoring

Activity Monitoring Intelligence
and Prevention for Databases

Databases are at the heart of every business application. They store critical, personal, and sensitive information.
Companies in general have to manage a number of heterogeneous database technologies to accomplish all tasks they need for their business to be successful.
Databases are accessed by a multitude of users and applications, coming from disparate sources and running diverse queries.
The Auditing and recording of database activity plays an essential role in achieving data privacy laws compliance.This ongoing exercise is a mandatory requirement from: ie GDPR, HIPAA, SOX, PCI.
Companies need the ability and ease to perform monitoring of constant solicitation to their databases but also prevent data breaches through detection of unusual activity.

What is Dataskope

Dataskope monitors any activity happening to all your databases and can help you detect and take action to prevent malicious tempering of your most personal and sensitive data.
Dataskope records all activities and provides reporting and analytics to fulfill your auditing and compliance requirements. Privileged user and application access monitoring is accomplished independently from native database logging and audit functions (that often induce performance issues). It can function as a compensating control for privileged user ensuring separation-of-duties by monitoring administrator activity.
"We did not have to turn-on DB2 auditing that was causing serious performance issues, and we still have what we need to comply to the requirements of our industry."
What is Dataskope
Image

Main Features

  • Monitor successful and failed logons and ensure they are from predefined and valid legitimate sources.
  • Monitor and audit all DML, DDL, TCL and DCL commands (SELECT, UPDATE, DELETE, EXEC, and other SQL statements).
  • Monitor who is accessing sensitive information. When the unexpected happens generate alerts and/or prevent it from happening.
  • Audit dba/developer activity and configuration changes to the database system.
  • Generate reports, and dashboards, Perform analytics and M/L: predefined policies and reports for PCI, SOX, and other generic compliance requirements; highlighting “data product” consumption, derived from the activities using analytics and M/L.