Welcome to IG Technologies

  • Mon - Fri: 9.00 am - 5:00 pm

All-in-One Database Security

All-In-One Database Security

Activity Monitoring. Access Governance. Posture Management.

The solution that covers all aspects of data protection, security, and compliance for Microsoft 365. Hornetsecurity is a leading global provider of next-generation cloud-based security, compliance, backup, and security awareness solutions that help companies and organizations of all sizes around the world.

Its flagship product, 365 Total Protection, is the most comprehensive cloud security solution for Microsoft 365 on the market. Driven by innovation and cybersecurity excellence, Hornetsecurity is building a safer digital future and sustainable security cultures with its award-winning portfolio.

Comprehensive Data Security

Elevating Security. Simplifying Governance.

Secures All Databases and Data Lakes

 

Cyral’s Data Security platform provides a rich set of features and capabilities for database and data lakes storing structured and semi-structured data. The product works uniformly for cloud and on-prem data repositories. Our architecture supports both no-code and infrastructure-as-code operating models.

 

Bringing Access Control to Data Security

IAM has historically been the cornerstone of all corporate security. However, databases are generally managed though roles which cannot be inherited from IAM entitlements. Additionally, most consumers of data lakes use visualization tools and apps to consume data, which hides their activity behind service accounts. 

Cyral’s unique capability is to integrate data security governance with an organization’s IAM solutions, without impacting workflows and workloads. Additionally, Cyral’s Data Security Platform consolidates key capabilities into a single solution which replace the need for niche tools and products.

Our platform includes:

—— Discovery & Classification

Cyral’s discovery and classification capability is built to handle the
unique needs of multiple teams collaborating using different tools
and approaches. Cyral helps create a central index of all sensitive
data within database and data lakes using the following techniques:

  • Continuously scanning data repositories
  • Pulling in metadata from data catalogs
  • Integrating with purpose-built discovery tools
  • Annotations supplied by developers in code

—— Access Control

Cyral’s access control capability is designed to address the unique
challenges of federating access to databases with conventional IAM
tools. Cyral seamlessly extends IAM controls to all databases for all
users and applications by:

  • Federating authentication with existing identity provider
  • Eliminating users from having database passwords
  • Leveraging IAM entitlements for administering access
  • Mapping queries from service accounts to user identities

—— Fine-Grained Authorization

Cyral’s enables policies to control access to specific rows, columns,
documents and objects within various databases and data lakes.
Cyral unifies how policies can be applied for users and applications
across a variety of data repositories. Policies are specified using
centralized IAM roles and entitlements, and are easy to build and
maintain.

—— Monitoring & Reporting

Cyral provides real-time visibility into all data activity across all data
endpoints from any user, application, tool or service. It reports who
has access to what data and why, helping organizations simplify audits,
speed up forensics and reduce mean time to resolution.