Alert the suspicious activities
Creating and managing rules to detect patterns, violations, suspicious behavior and attacks.
Notification in real time
Always connected by receiving notifications via email, SMS and SysLog, set by the tool management team.
Simplicity in investigations
Audit and transaction viewing performed at specific times, providing forensic analysis.
Detecting internal attackers
Detects and alerts on abnormal behavior and therefore suspected of any database user.
Keep the focus on what really matters
A Private Cloud solution to analyze all transactions of your databases. Simple and efficient.
Access and manage the security of your data from any device at any time.
Reports and Statistics
Detailed information about the transactions, events, connections, and rules violations.
Using LDAP as a basis for authentication and authorization tool users.
Personalized dashboards based on customers need, assisting the decision making of your security team.
Architecture and Installation
Designed to support a large volume of data, with unmatched performance and quality.
The tool is designed and developed to support a large volume of data, processing tens of millions of concurrent transactions based on a distributed and redundant storage structure. Moreover, it was designed to be horizontally scalable, depending only on the customer's needs.
The deployment of the solution is performed by network traffic collection (port mirror) or collecting logs (SysLog) directly from databases.
We have a qualified team ready to help you with any questions.
Address: Rua São José, 90 - Room 1108
Centro, RJ, Brasil
Phone: +55 (21) 3197-6069
Learn more about this solution and protect the critical data of your company.