Data privacy has gone mainstream from industry-specific regulations like GLBA and HIPAA to broader compliance concerns such as GDPR. All of these regulations require transparency into the accessibility and use of sensitive data.
Traditional database logs and monitoring products don’t return complete information, especially in terms of what specific data was used. Monitoring can usually be easily turned off for periods of time, and the logs themselves are often stored insecurely and can be edited or deleted.
ALTR Monitor is a next-generation monitoring technology that embeds directly in the critical path between users that consume data and the data itself and provides a complete, tamperproof record of data use that is stored out into an enterprise-class private blockchain.
ALTR installs using Smart Database Drivers, which take minutes to install and don’t require changes to existing infrastructure. This makes them ideal for legacy applications where some of the most difficult-to-protect account information lies.
ALTR’s Smart Database Drivers encrypt and send all audit information into a high-performance private blockchain called an ALTRchain. As the “truth keeper,” this cloud-based vault ensures that audit information remains complete, quantum-safe, and protected – even from insiders.
Many monitoring tools introduce performance concerns, especially on the database server side. ALTR Monitor’s Smart Database Drivers are integrated directly into application stack and log asynchronously without impairing any data access activity, do not rely on the native logging of DBMS’s, and put no load on the database server.
Most monitoring tools see only the query side of the conversation, whereas database drivers can also see all records that are sent back in response to queries. In addition, every query can be tagged with identity and processing activity metadata, creating a data transaction-level compliance hook to support full reporting.
The ALTR Smart Database Driver also supports easy extension to ALTR Govern, which establishes and enforces policy around which users are allowed to consume which data types, dynamically masking outgoing data and slowing down or blocking inappropriate access. All policy and administrative actions are also logged to the ALTRchain.