Ensuring Data Protection and Compliance in the Oracle Cloud
DISCOVER, AUDIT, MASK and PROTECT SENSITIVE DATA IN OCI
Automatically Identifies & Classifies Sensitive Data
Audits, Analyzes & Reports on Sensitive Data Access
Automatically Creates Sensitive Data Masking & Access Controls
Comprehensive Data Protection and Automation Minimize Risks and Maximize Protection
Teleran’s Data Protection and Compliance Solution enables customers to quickly and automatically identify, audit, and protect sensitive data in Oracle Cloud Infrastructure (OCI) data warehousing including Oracle DBaaS and Autonomous Data Warehouse. It is uniquely designed to protect data independent of the databases and the applications. What makes Teleran’s solution different is automation. Leveraging expert systems and AI, it automates manual tasks to improve effectiveness of data protection, and reduce the time, cost and effort to implement and maintain.
Key Benefits
- Improves accuracy, cost-efficiency and productivity with automated processes
- Minimizes risks of data breaches and compliance violations
- Integrates with SIEM and other compliance and security systems
- Deploys quickly and easily
Download Fact Sheet
Cloud Data Protection and Compliance Challenges
Data warehouse usage patterns are unpredictable and complex. They are accessed by powerful analytical applications that enable users to circumvent native database security controls through inferencing, brute force, and other techniques.
Comprehensive Data Protection and Compliance
Teleran’s patented Data Protection and Compliance software is specifically designed to address the unique vulnerabilities of data warehouses including preventing inferencing, brute force and other data protection challenges. Teleran’s solution delivers a powerful centralized platform for sensitive data discovery, contextualized auditing, automated policy creation, dynamic data masking, and real-time data access policy enforcement and alerting. It complements and extends native Oracle database security in OCI, hybrid and on premises data warehouses.
Key Capabilities
- Automated PII Discovery identifies sensitive data in databases related to leading data privacy regulations
- Automatically Creates Sensitive Data Masking and Access Control Policies integrated with Discovery process
- Closes Native Database Gaps by preventing inferencing or brute force attacks that database masking functions do not address
- Continuous Auditing tracks PII access by user, query, and application
- Patented Real-time Policy Action Engine dynamically masks sensitive data or prevents inappropriate and non-compliant data access
- Automated Alerting communicates real-time warnings to security staff
- Network Agent installs quickly and requires no performance degrading “in-the-database” agents or monitors