The database manufacturer’s driver augmented with ALTR technology to place a broker in between those that are requesting data and the data itself.
Highly optimized to create little to no latency in database response
Enable deployment without any changes to applications or databases, no additional database load
Better than proxies and other data brokering methods that introduce vulnerabilities
A patented, private blockchain architecture that underlies all ALTR solutions. ALTRchain maintains unparalleled integrity and security for data, and is deployed for each customer.
Private, permissioned, centrally managed, high-performance
Nodes can be on-premise, in private or public clouds, or in any hybrid configuration
The ALTRchain API supports programmatic data security and the building of next-generation blockchain applications
A comprehensive, immutable view of the truth about who is accessing data, when and how often.
ALTR augments the manufacturer's driver with intelligence that places security in between the users that request data and the data itself.
ALTR Monitor collects data on how applications and users consume sensitive data, logging all data requests and repsonses immutably.
ALTR Monitor reports on the confluence of data and user risk to inform policy, and serves events to central monitoring tools.
A data valve that enforces who can access what data, when, from where, and how much.
Establish data access policy between logical groups of users and logical groups of data.
Impose thresholds on how much data can be accessed based on normal usage patterns.
All administrative rights changes and anomalies are logged immutably to the blockchain.
A keyless vault that renders data useless for bad actors but fully operational for the business.
On a column-by-column basis, sensitive data is replaced by hash values.
Data is broken into fragments and scattered into multiple blockchains. Each fragment references the next, creating keyless protection.
Reference values retain most data operations, and data is reassembled rapidly when requested. All records of the re-assembly of data are logged immutably to the blockchain.