Product Brief

Data Security as a Service: How It Works

A holistic solution that provides data access monitoring, access governance, and at-rest protection for sensitive PII, PHI, and PCI data — no matter where your data is.

Once you understand the problems that ALTR solves, you are probably wondering how we do it.

In this short Product Brief we will cover:

  • The two ways to integrate
  • Core services we offer
  • How to get started

If you are ready to look under the hood and see what makes ALTR the most powerful Data Security solution on the market, download this Product Brief.

Register Here

Data Security as a Service: How It Works

A holistic solution that provides data access monitoring, access governance, and at-rest protection for sensitive PII, PHI, and PCI data — no matter where your data is.

Published on Jan 26, 2020
Reading Time:

HOW ALTR DSAAS WORKS

ALTR has two ways of integrating client side, each with its own unique integration point to serve different datastore types.

ALTR DB: Uses a smart database driver to integrate with applications that use ODBC/JDBC  to  connect to Oracle, SQL Server, MySQL, PostGres, and DB2.

ALTR API: Uses API calls to integrate with applications that access non-relational or unstructured  data stores.

Diagram - How ALTR Works

ONCE INTEGRATED, THE CORE ALTR SERVICE PROVIDES:

ALTR MONITOR - Data Access Monitoring as a Service

Creates a comprehensive, immutable record and visibility into who is accessing specific data, when, and how often -- unmatched capabilities supporting compliance.

ALTR GOVERN - Data Access Governance as a Service

Introduces data governance with dynamic masking, providing run-time policy controls by automatically enforcing who can access what data, when, from where, and at what volume.

ALTR PROTECT - Data At-Rest Protection as a Service

Adds a keyless vault that tokenizes and secures at-rest data, solving for the performance and security concerns that often make encryption unworkable.

THE ALTR SERVICE ALSO FEATURES:

  • ALTRchain, an advanced cloud vault that leverages private blockchain technology to ensure audit and tokenized data security and integrity.
  • Integrations with SIEM and Identity providers to decrease complexity, not create more work.
  • Included support and implementation services.

GETTING STARTED WITH ALTR:

INSTALLATION: Get up and running on an application -- from a few hours to a few weeks for larger installs.

MONITORING AND POLICY DEVELOPMENT: Understand access to sensitive data and develop simple rules to govern and protect (30-60 days).

POLICY IMPLEMENTATION AND TUNING: Implement rules and adjust as needed (a few days to implement, then ongoing).

Download this resource

Authors

Speakers

No items found.