tencent cloud

Data Security Audit

An AI-based database security auditing system

Overview

Data Security Audit is an AI-based database security auditing system that can uncover various potential risks and hidden dangers during database running, ensuring the secure operation of your database.

Benefits
Comprehensive Asset Coverage

It supports multiple asset scenarios including public cloud and hybrid cloud, and also supports cloud databases, self-built databases, and big data auditing, achieving comprehensive asset coverage.

Full Data Audit

Session-based full audit, surpassing traditional security audit concepts by capturing all SQL operations of the database. Comprehensive audit categories and scalable storage space facilitate detailed traceability of operational behavior, providing convenient accountability basis for data security incidents.

Intelligent Threat Identification

Leveraging Tencent Cloud's professional deep learning algorithm models and a massive sample training environment, it can intelligently address various attack scenarios and monitor various variant attacks and uncommon threat operations. In the era of increasingly diversified data attacks, it offers more precise threat analysis and alarming for database security.

Multiple Risk Alarming

It offers various alarm methods such as SMS, Email, and WeCom, notifying security management personnel promptly upon threat detection, enabling swift actions to nip the hazard in the bud.

Regular Statistical Reports

Periodic statistical reports from Data Security Audit help administrators better control global security information. The product also features a professional level protection report, clearly and systematically presenting security measures that meet compliance regulations, assisting in passing compliance assessments for your network.

Ultra High Throughput Performance

It features a high-performance network engine and SQL statement analysis engine. A single node can support 30,000 SQL/second-level throughput and a storage rate of 10 million/hour, and easily handle higher concurrency based on TKE technology. With the 12 billion SQL statement online storage capability, it effortlessly enables massive data retrieval and analysis, restoring the full picture of data security incidents.

Application Scenarios

In the case of major security incidents such as data deletion, information tampering, and sensitive information leakage, a comprehensive incident restoration and serious accountability process are essential. Data Security Audit supports expandable SQL statement storage, ensuring that even if your database system is operating at full capacity, it can store logs for specified durations. Through deep retrieval of long-term historical information, administrators can clearly restore the full picture of the security incident and trace the issue easily.

The risks in the daily database operation apart from malicious attacks and dangerous operations, also come from performance issues such as downtimes caused by high SQL pressure. Data Security Audit can comprehensively monitor the real-time statement pressure of all databases and rank the statement pressure information, assisting administrators in getting an overview of the network performance of the data system. While displaying the database pressure across the network, Data Security Audit can also count the number of sessions and SQL statements based on the access IP range, providing solid evidence for administrators to troubleshoot statement pressure problems.

When you plan to periodically compile security information from across the network, Data Security Audit offers a powerful custom report feature, allowing you to tailor everything from global overviews to specific information for each instance, meeting different enterprises' customized statistical needs. It provides comprehensive analysis basis for your data security information and operational information.

Pricing

When you purchase Data Security Audit, the number of data assets requiring auditing is generally used as the basis. You can simply count the number of data assets before procurement to choose a suitable product specification. In addition to software specifications, Data Security Audit also supports extended asset authorization, storage, and log delivery features, allowing you to make selections based on your needs.