In addition to Weibo, there is also WeChat
Please pay attention
WeChat public account
Shulou
2025-03-26 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Database >
Share
Shulou(Shulou.com)06/01 Report--
Product introduction
Data Security situation Awareness system (VS-DSSA) is a data security protection and management system based on data access behavior analysis. Through the centralized processing of the information collected by various data security products, such as database audit, database firewall, data encryption, data desensitization and so on, the system unifies many kinds of heterogeneous data and carries out association analysis. the distribution of data assets and sensitive data access behavior are dynamically displayed, and the possible risk of leakage of data assets is predicted. Restore and show customers a clear, transparent and controllable distribution of data assets and access behavior.
Product function
Data distribution analysis
Count the number of databases, identify sensitive databases and their numbers, number of tables, number of sensitive tables, number of fields, number of sensitive fields, sensitive data categories, etc.
Show the static distribution and dynamic access of sensitive data, and intuitively show the data distribution and actual access by TOP10 based on different dimensions, such as the sensitive table of TOP10 with the most visits and TOP10 with the most visits.
Data flow analysis
Statistics of information such as total data access, sensitive data access, total number of requests, number of users and number of applications.
Show TOP10 applications with the most sensitive data visits, TOP10 data types with the most sensitive data visits, TOP10 users with the most sensitive data visits, TOP10IP with the most sensitive data visits, and sensitive data flow maps, etc. The real flow of the data can be shown through the intuitive data flow map.
User behavior analysis
Count the basic information of the user, such as the most recent active time, the number of applications, the total amount of data accessed, the source IP used, etc.
Show the sensitive data access of a user, and show the distribution of sensitive data types, the trend of the amount of sensitive data and the popularity of sensitive data access.
Traceability of user trajectory
It can track database users, clients, applications, visited databases, operation behaviors and other related information, and intuitively show the complete behavior information of users accessing data. All the access behavior information and details of the user are tracked through a multi-tier presentation.
Data traceability
According to the leaked data, you can paste the leaked data directly, or import the leaked data with text. According to the key fields, you can trace back the suspicious IP or user name, and add the database user, source IP address, database name, time and other backtracking conditions. The more detailed the conditions are, the more accurate the backtracking results will be.
Characteristic advantage
Multi-dimensional visual display of sensitive data distribution and its access
Accurate two-way parsing of multiple databases
High performance Statistical Retrieval based on ES Architecture
Anomaly Detection based on AI algorithm
Typical deployment
Customer value
Visually show the distribution and access of sensitive data
Show the risk of sensitive data flow at a glance
To specialize, so that more people can "see" the risk as well as "understand" it.
Classification and classification of sensitive data, so that customers have a clear idea of the data assets they own.
Compliance, supporting traceability of access behavior and access results
Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.
Views: 0
*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.
Continue with the installation of the previous hadoop.First, install zookooper1. Decompress zookoope
"Every 5-10 years, there's a rare product, a really special, very unusual product that's the most un
© 2024 shulou.com SLNews company. All rights reserved.