In addition to Weibo, there is also WeChat
Please pay attention
WeChat public account
Shulou
2025-01-15 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Database >
Share
Shulou(Shulou.com)06/01 Report--
product introduction
Database Dynamic Desensitization System (VS-DM), through intercepting and modifying database communication content, on-line shielding, deformation, character replacement, random replacement of sensitive data in the database, to achieve user access to sensitive data true content of the authority control. For sensitive data stored in the database, users with different permissions will get different results through desensitization system. The system supports two deployment modes: bypass agent and direct agent. It has the advantages of excellent performance, flexible configuration, simple use and stable operation. It can help customers reduce the risk of sensitive data leakage in production libraries, reduce data leakage during development, testing and data delivery, and easily meet compliance requirements for privacy data management.
product features
real-time dynamic desensitization
For production data that needs to be shared or data testing and training scenarios with high timeliness requirements, dynamic desensitization technology based on gateway proxy mode is provided to achieve the effect of real-time fuzzy sensitive data. Dynamic desensitization enables transparent, real-time desensitization of sensitive data in business system databases.
Dynamic desensitization can control access based on multiple identity characteristics such as database username, IP, client tool type, access time, etc.
Dynamic desensitization can release, mask, hide, return row control and other desensitization strategies to the data returned from the production database.
desensitization log audit
The system transfers the generated logs to the desensitization system, and users can query and count the logs of operation and maintenance personnel operating the database to realize the function of auditing the database. Audit fields include: occurrence time, connection rule, database, security rule, action, SQL, client user name, client host, client program, login account, etc.
typical deployment
product advantages
·Meet national and industry requirements such as security, business confidentiality, Ministry of Industry and Information Technology documents, and central bank documents
·Greatly reduce the possibility of data leakage
·Support cloud applications
·Transparent desensitization from the data source without changing the structure of the original application system and database
·Support applications and operations to access the database
product characteristics
·Dynamic desensitization, replacement, hiding, etc. in real time
·Restrict illegal access through screen capture and full tables
·Prevent privileged operations such as DDL/DML/DCL
·Provide detailed audits for easy traceability
·Maintain integrity and consistency of legacy systems without changing data in the database
·Easy to implement, built-in desensitization rule template, can complete the implementation of complex business systems within a week
·Multiple databases can be supported in one deployment
System Support Scope
Oracle, MySQL, etc.
Support desensitization methods
·Data substitution: substitute fictitious data for true values
Truncate, encrypt, hide, or invalidate: replace true values with "invalid" or *,#
Randomization: replacing truth values with random data
Offset: changing digital data by random shifting
·Character subchain masking: Create custom masking for specific data
Limit the number of rows returned: Provide only a small subset of the available responses
·Masking based on other references: changing only part of the response according to predefined rules (e.g. masking VIP customer names but showing other customer names)
Product form and performance
·Hardware form
·Software form
·Dynamic desensitization: up to 20000 pen/s request
Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.
Views: 0
*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.
Continue with the installation of the previous hadoop.First, install zookooper1. Decompress zookoope
"Every 5-10 years, there's a rare product, a really special, very unusual product that's the most un
© 2024 shulou.com SLNews company. All rights reserved.