Data Security and Compliance

the BUILDING BLOCKS

Teleran’s advanced patented technologies combine contextualized database monitoring, sophisticated data usage and user behavior analytics, machine learning and real-time access controls.

isight-logo

Comprehensive Monitoring

Advanced Analytics

Unobtrusive Architecture

iSight™ establishes a unique user, application and organizational context to provide more effective security analytics, threat detection, user behavior analytics, and more accurate and effective access controls.

Identity Persistence™

It is critical to know who your users really are. You need to identify who is generating bad queries, or accessing sensitive data, or who may be using an unauthorized application. But, most database monitors lose the user ID due to applications using connection pooling, single sign-on/LDAP or generic database IDs. So if you are just monitoring at the database, you can’t determine who is doing what. iSight’s patented Identity Persistence™ feature associates the named business user with the actual query that gets processed by the database. It ensures the user’s identity is not lost, guaranteeing the effectiveness of Teleran’s user behavior analytics, reporting and query control policies.

Business Context™

Teleran also delivers Business Context, a feature that associates users with their specific organizational context including location, geography, role, and function or department. This enables deeper insight and context for profiling expected user behavior, identifying malicious or inappropriate behavior, and delivering actionable real-time alerts and user controls without impeding users’ legitimate data access and business process

Application Context™

It is not only important to identify and track contextualized user activity. But it is also critical to understand how users are interacting with the applications, and integrating that with what is happening at the data layer. Teleran’s Application Context™ deploys several patented methods to unobtrusively capture application level metrics including application user ID, application names, report names, application server activity, and in the case of leading BI and analytical applications, semantic layer activity. Now you have the deeper context, across users, applications and database activity, to establish effective user behavior profiling, rapid threat identification and response, comprehensive reporting, as well as more effective real-time user and query controls.

Advanced Analytics

iSight Analytics gives you dramatic visibility and insight into your data-intensive environments. It transforms the comprehensive usage metrics captured by iSight into actionable information, leveraging a fast in-memory analytical and visualization engine for easy-to-use and intuitive dashboards, analysis, reporting and alerting. iSight Analytics delivers a series of ready-to-go analytics and reporting solution packages.

Unobtrusive Software Architecture

iSight’s continuous and unobtrusive monitoring captures 100% of user and application traffic without putting overhead on the databases. Its patented software network agents monitor at the database network protocol layer, delivering complete visibility of sensitive data access activity across your environments without interfering with internal database processes or slowing application performance.

iguard

Real-Time Access Policy Enforcement

iGuard™ is a patented user and query policy action engine that prevents users or applications from launching unauthorized or inappropriate queries. iGuard operates in conjunction with iSight on the network. It automatically applies activated user and query control policies via its patented high speed policy engine. This highly efficient, small memory foot-print process evaluates queries in milliseconds and introduces no material latency. iGuard policies are easy to customize and apply with Teleran’s policy wizard. Designed for non-technical staff, iGuard’s SQL policy wizard enables you to apply over 70 policies by user, user group, application, or database objects and time period.

Request a Demo!

READ MORE – Click on link below: