dbsec-k8凯发游戏

dbsec data security products and services
lower the data breach risks,prevent sensitive data from being threatened,and meet the requirements of laws and regulations
data security products series
dbsec data asset carding system (dacs)
product overview
dbsec data asset carding system (dacs) is a database security product helps customers make clear sensitive data distribution and sensitive data use status by scanning and sniffing, traffic and log analysis, and sensitive data grading and classification. dacs helps customers with database discovery and sensitive data discovery in their network, and classifies their data assets according to its type and security classification, to achieve a differential and targeted protection to sensitive data. static carding: dacs locates databases in current network environment. dacs searches database in its networks regularly to provides accurate basis for database security management. dynamic carding: dacs provides the access popularity of database, monitors automatically the sensitive data use status on application side and operationg and maintenance side, discovers data abuse, and provides basis for core data security management and control. dacs also provides carding capability for data privilege. the security personnels will find the information of all users and their related priviliges in database from the carding result, and adjusts potential risk configuration, such as improper privileges and zombie accounts, and meets minimum authorization principle better requests by information security policies.
product values
security detection standards compliance
laws and regulations about sensitive data protection are clearly described in cybersecurity law of the people's republic of china, and we can also find specific data security regularions in various industries. however, in the complex and real customer environment, data asset always be of a large scope and distributed separately. in this case, security building will not make sense if their data asset are uncombed or graded and classified properly. dacs provides basis for customers in information security construction, by means of carding sensitive data privilege distribution statically, carding sensitive data use dynamically, assist to establish a data grading and classification system, etc.
data grading and classification assistance
dacs incorporation with manual work to grade and classify sensitive data, so as to help customers protect their sensitive data according to various requirements. there are three types of classification from the point of view of privacy security and protect cost. sensitive data: we can identify certain customers through the sensitive data, as sensitive data is closely related to user’s life. important data: we can get the commercial value of the product through the important data. important data is the user related data or product core data that needs to be used carefully. common data: common data is used to support business logic and operation. common data statitics, classification or processing will not affect the profit of users and companies.
carding sensitive data use status dynamically
most users start to analyze reasons of their security event only after its happens. dacs continuously monitors sensitive data using status in databases. it makes clear for customers the sensitive data is used by which user, which business system, by what means and at what time. it provides a summarizing result of dynamic carding that shows the data flow diagram of sensitive data.
locate data asset automatically
in the internal network environment, organizations probably are facing many unclear informations, such as how many databases are there , where are they sensitive datas, sensitive data access privileges, etc. dacs helps customers make clear the data asset: discover existing database in their network environment automatically by network sniffing technology. comb sensitive data distribution in database automatically by based-on-feature sensitive data sniffing technology. discover account privilege distribution in database automatically by database scanning technology.
product advantages
advanced database auto-sniffering and auto-identification
dacs supports discover multiple database types. when performing the discovering, customers can specify an ip range and port scope, or enable the “auto-discover” function to discover and identify databases automatically based on access traffic analysis.
discover sensitive data fastly to protect core data asset
generally speaking, there are thousands of tables in a back-end database. in order to protect the core database asset, customers need to know its location first of all. dacs can discover sensitive data from massive amounts of data, make clear its stored location and distribution situation, and gather statistic of its magnitude. dacs can discover data types like personal sensitive information, credit card account information, enterprise sensitive information and so on by row and column scaning of a certain table, and it also supports sensitive data key word customization.
data use monitoring and analysis technology
in the sensitive data use scenario, such as application system operating, development and tesing, external data forwarding, and front-end and back-end operation, dacs monitors its forwarding, storage and use status, and analyze the access popularity of sensitive data when it is used on application side, internal operating and maintenance side, and code developing and testing side.
periodically check: whether database permissions meet the minimum authorization principle
dacs monitors database premissions periodically for the organizations who ask for a more strict information security. it broke through the limitation of tradition products who act as only database security detection tool, can display the user change and permission change efficiently, bulids a solid security line, provides a assessment model combines security status report, analysis, qualitative and quantitative.
网站地图