Skip to content
DataKeep Revers

POLICY-BASED ACCESS CONTROLS

You Control Who Sees Encrypted Data

The Challenge

While hackers get a lot of the attention, some of the largest and most notable data breaches have resulted from insider actions -- both accidental and malicious -- most caused by vulnerabilities like broadly defined or excessive access permissions and privileged user escalations. Additionally, the growth in virtualization and software defined data centers has brought with it concerns around shared resources and multi-tenancy.

Our Solution

Techniques such as role-based access, workload isolation and application whitelisting are key towards managing these concerns. DataKeep automatically denies data access to all users unless they have been specifically granted permission using “deny by default”. DataKeep allows you to define access policies that can be as narrow as a specific user, where an individual can only see specific data decrypted, when using a specific hashed process/application on a specific server.

DataKeep™ Protects Your Data Your Brand And Your Reputation

  • White Checkmark

    Encrypts personal data-at-rest and manage encryption keys

  • White Checkmark

    Manages access to personal data by role or process

  • White Checkmark

    Audits data access requests / denials for encrypted personal data

sheild

Prepare and Protect with DataKeep

DataKeep is built upon customer-defined policies of who, what, when, where and how users access decrypted data. Only those needing data access are allowed with policies using role-based access control (RBAC), privileged access management (PAM) and default to least privileged access (LPA). DataKeep logs all user data access requests, whether approved or denied, in real time to allow for prompt remediation and logging for compliance audits. DataKeep can leverage templates and REST APIs to help automate policy creation.

Disclaimer: Gartner does not endorse any vendor, product or service depicted in our research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner’s research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.

Copyright © 2019 Security First Corp.     Terms of Use     Privacy Policy     Support Desk    Contact Us

Pin It on Pinterest