Documente Academic
Documente Profesional
Documente Cultură
sensitive info corporate databases contain. It has an intuitive user interface, can be
deployed with ease and helps to comply with database-specific security regulations.
DataSunrise firewall runs independently of any applications, does not require any
software agents and doesn’t inflict any additional load on protected database. It is
worth noting that DataSunrise does not store database passwords or any other
sensitive info.
Since most data leaks are caused by companies’ own employees, DataSunrise is
designed to protect corporate databases both from external data breaches and insider
threats.
DataSunrise deployment options
DataSunrise is compatible with 64-bit Windows and Linux operating systems. The
firewall can be installed on the database server or on a separate server in the cloud or
on premises alike. Depending on intended usage, DataSunrise can be deployed in the
following configurations.
Sniffer mode
While running in this mode, DataSunrise acts as a traffic analyzer: it logs all database
events. In this configuration, DataSunrise can not interfere database traffic, so it is
able to perform only data auditing functions. Running DataSunrise in sniffer mode
does not require any additional tweaking of databases or client applications.
Proxy mode
Data Audit
DataSunrise Data Audit component collects information on all user actions and
modifications made to database contents. The audit is used mostly for data breach
investigation and assessment of security system vulnerabilities. Continual data
auditing helps to detect data breach preparations and initiate its prevention.
DataSunrise features self-learning algorithm integrated into Data Audit component.
DataSunrise uses these algorithms to learn typical database user behavior and create a
White list of authorized SQL queries intended to be used by Data Security and Data
Masking components. The firewall administrator can use dedicated Learning Rules set
to manage self-learning process.
Data Security
Data Security component is the basic tool DataSunrise utilizes to counter various
harmful actions: it prevents unauthorized access and defends the database from SQL
injections.
Data Security functionality is based on a system of security policies. First, the firewall
administrator specifies which queries should be treated as malicious based on their
source and SQL code. Then DataSunrise performs smart analysis of database traffic.
If incoming query violates existing security policies, it is blocked. Then DataSunrise
informs the firewall administrator via Email.
Data Masking