Network Security Internet Technology Development Database Servers Mobile Phone Android Software Apple Software Computer Software News IT Information

In addition to Weibo, there is also WeChat

Please pay attention

WeChat public account

Shulou

Data security situational awareness

2025-03-26 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Database >

Share

Shulou(Shulou.com)06/01 Report--

Product introduction

Data Security situation Awareness system (VS-DSSA) is a data security protection and management system based on data access behavior analysis. Through the centralized processing of the information collected by various data security products, such as database audit, database firewall, data encryption, data desensitization and so on, the system unifies many kinds of heterogeneous data and carries out association analysis. the distribution of data assets and sensitive data access behavior are dynamically displayed, and the possible risk of leakage of data assets is predicted. Restore and show customers a clear, transparent and controllable distribution of data assets and access behavior.

Product function

Data distribution analysis

Count the number of databases, identify sensitive databases and their numbers, number of tables, number of sensitive tables, number of fields, number of sensitive fields, sensitive data categories, etc.

Show the static distribution and dynamic access of sensitive data, and intuitively show the data distribution and actual access by TOP10 based on different dimensions, such as the sensitive table of TOP10 with the most visits and TOP10 with the most visits.

Data flow analysis

Statistics of information such as total data access, sensitive data access, total number of requests, number of users and number of applications.

Show TOP10 applications with the most sensitive data visits, TOP10 data types with the most sensitive data visits, TOP10 users with the most sensitive data visits, TOP10IP with the most sensitive data visits, and sensitive data flow maps, etc. The real flow of the data can be shown through the intuitive data flow map.

User behavior analysis

Count the basic information of the user, such as the most recent active time, the number of applications, the total amount of data accessed, the source IP used, etc.

Show the sensitive data access of a user, and show the distribution of sensitive data types, the trend of the amount of sensitive data and the popularity of sensitive data access.

Traceability of user trajectory

It can track database users, clients, applications, visited databases, operation behaviors and other related information, and intuitively show the complete behavior information of users accessing data. All the access behavior information and details of the user are tracked through a multi-tier presentation.

Data traceability

According to the leaked data, you can paste the leaked data directly, or import the leaked data with text. According to the key fields, you can trace back the suspicious IP or user name, and add the database user, source IP address, database name, time and other backtracking conditions. The more detailed the conditions are, the more accurate the backtracking results will be.

Characteristic advantage

Multi-dimensional visual display of sensitive data distribution and its access

Accurate two-way parsing of multiple databases

High performance Statistical Retrieval based on ES Architecture

Anomaly Detection based on AI algorithm

Typical deployment

Customer value

Visually show the distribution and access of sensitive data

Show the risk of sensitive data flow at a glance

To specialize, so that more people can "see" the risk as well as "understand" it.

Classification and classification of sensitive data, so that customers have a clear idea of the data assets they own.

Compliance, supporting traceability of access behavior and access results

Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.

Views: 0

*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.

Share To

Database

Wechat

© 2024 shulou.com SLNews company. All rights reserved.

12
Report