当前位置:网站首页>Star ring technology data security management platform defender heavy release
Star ring technology data security management platform defender heavy release
2022-07-05 17:57:00 【Star Ring Technology】

With the smooth flow of the international Internet information highway and international information exchange , Extensive business expansion , The risk of data security is also deteriorating dramatically . To ensure information security , The state has successively promulgated many safety related laws and regulations , In especial 2021 In the 《 Data security law 》 and 《 Personal information protection law 》 Data classification and hierarchical management 、 Personal information protection has put forward requirements . therefore , How to classify and classify large quantities of complex data in enterprises 、 How to master the flow direction and distribution of sensitive assets 、 How to ensure the security of the sharing of sensitive assets , Will become a challenge for enterprises to carry out business compliance transformation .

Xinghuan technology believes that enterprises need to achieve business legal compliance , The business system needs to meet four requirements : First of all , Classification, classification and protection of data ; second , Outbound security compliance of data ; Third , Personal information protection ; Fourth , Data supply chain security compliance . In order to meet these four requirements , Enterprises need to build a series of security technologies around the data life cycle , These include : Classification and grading 、 Desensitization watermark, etc . meanwhile , Enterprises also need to build a set of data security governance and monitoring system , Promote the implementation of business safety and compliance . in addition , It also requires continuous training and supervision of employees , Finally, the legal compliance of the business will be realized .

For the above problems , The data security management platform independently developed by star ring technology Transwarp Defensor stay 2022 The spring product launch week is a blockbuster launch ,Defensor It is a data centric data security protection tool , It can help enterprises understand the distribution of internal data sensitive information , Identify potential risks in a timely manner , And monitor the compliance use of important data ; meanwhile ,Defensor It can also classify and grade sensitive enterprise data , Encrypt and desensitize the data for business development , To prevent data leakage .

Transwarp Defensor The business value of

Transwarp Defensor Around data security laws and regulations and industry standards , Create a series of data security core functions , Help enterprises quickly build data security technology capabilities , Meet the demands of enterprises in data security compliance .

Transwarp Defensor Six core competencies

First of all , Identification and classification of sensitive data , Help enterprises comprehensively sort out sensitive assets , And draw a map of classified and graded assets .Defensor Built in classification and grading standard reference , It covers many industry laws and regulations , And in-depth cooperation with lawyers , A large number of rules have been jointly implemented ; Based on regular expressions 、 Keyword content 、 Algorithm matching 、 Dictionary matching, etc , Automatically scan global sensitive data , Provide timing sensitive identification scanning task .
second , Provide data desensitization and watermarking capabilities , So that sensitive data can be desensitized to serve the business , And can trace the source after the leakage . Various desensitization algorithms are preset on the platform , Open the box , Meet different scenarios , Desensitization requirements for different safety levels . When sensitive data needs to be circulated , Supports embedding watermarks in data sets , When data leaks , It can be traced through watermark analysis .
Third , Be able to identify and monitor sensitive data operations , Be able to identify the sensitive data in the flow and trigger the corresponding management strategy . basis GB/T 35273—2020《 Information security technology personal information security specifications 》 And other specifications define sensitive information , Configure the audit objects and data fields to which the rules apply , Generate alarm rules for data leakage class in the background , Audit to sensitive data leakage , Timely alarm and notify relevant personnel to block .
Fourth , Operation audit of big data platform and database , Avoid data security risks caused by illegal operations . The platform can implement bypass audit through the image gateway , You can also collect audit logs of big data components for analysis . The platform supports the login of big data platform 、 jurisdiction 、 Audit the source of database operation events , And preset a variety of audit alarm rules , Able to operate with high authority 、 Database high risk operation 、 Violations, SQL、 Abnormal behavior and other scenarios realize audit alarm .
The fifth , be based on GB/T 37964-2019《 Information security technology personal information de-identification guidelines 》《 Information security technology -- Specification for graded evaluation of the effect of personal information de labeling 》 Realize automatic personal information identification 、 De identification and de identification rating , Realize the protection of enterprise personal information assets .
The sixth , Data security protection strategy based on classification and grading results , It can support the flexible data compliance requirements of the business layer . Data security protection strategy based on classification and grading results , this 6 Three core competencies can help enterprises in the big data area 、 Big data application area , The production database area realizes complete data consolidation and legal compliance .
Besides ,Defensor stay 2021 In, it passed the special evaluation of the basic ability of data desensitization tools of the Chinese Academy of information and communications , It also proves the completeness and maturity of the function of the product .
Defenser Core strengths

Defensor Based on the classification and grading standards of the financial industry 50 Several industry sensitive rules are out of the box , It also supports customization , And the customization method is very flexible , For field names in structured data 、 Field contents 、 Field annotation and other matching fields , Comprehensive discovery of sensitive assets .
Defensor It can identify the derivative sensitive assets generated during the data processing based on the data blood source , For example, it is processed based on sensitive fields 、 Can identify and grade .
Defensor Be able to identify sensitive operations in the business operation process , It's not only for SQL For recording , Also able to SQL The library table columns accessed inside are parsed , It is convenient to judge rules based on classification results SQL Whether sensitivity is involved , Sensitive to SQL Perform sensitivity analysis .
Finally, a sensitive asset risk assessment report can be generated , Tell Enterprise Classification , What is the status of the assets , Whether the safety measures are implemented , And what potential security risks exist , Finally, it aims at the big data basic platform of starring technology Transwap Data Hub,Defensor It can provide more powerful security protection capability .
Defensor + Transwap Data Hub, Build a safe and reliable big data platform

Defensor Some security compliance toolsets are provided on the upper layer , It can realize sensitive identification and classification 、 Sensitive data operation monitoring and auditing 、 Static desensitization 、 Data watermark , Risk assessment of sensitive assets and protection strategies based on classification and grading , And the underlying big data infrastructure TDH Support service security isolation 、 Container isolation 、 Network isolation 、 Database row and column permission control 、 Database storage supports transparent encryption 、 Database endogenous support involves sensitivity SQL Dynamic audit 、 SQL Dynamic desensitization .

Denfensor Can accurately identify TDH Sensitive data in , At the same time, it can identify the derivative sensitive assets generated in the process of data processing based on data kinship , And configure data security protection strategies based on these sensitive assets , Issue to TDH platform , Once there is access to sensitive assets ,TDH It can realize dynamic desensitization or access interception according to relevant policies , Achieve end-to-end data security .

Dynamic desensitization based on database computing engine
Conclusion

Transwarp Defensor Combined with the security capability of the star ring big data platform , While supporting the business of enterprise big data platform , It can help enterprises build data centric data security protection , Provide classification 、 Sensitive operation monitoring 、 Data desensitization 、 Data watermark 、 Data security protection strategy 、 Security technology capabilities such as risk assessment of sensitive assets , Help the person in charge of enterprise data security understand the current situation of enterprise sensitive asset protection , Achieve in-process control over sensitive assets , It can be checked afterwards , Finally realize the legal compliance of the business .
边栏推荐
- MATLAB查阅
- 使用QT设计师界面类创建2个界面,通过按键从界面1切换到界面2
- Mask wearing detection based on yolov3
- Thesis reading_ Medical NLP model_ EMBERT
- ISPRS2020/云检测:Transferring deep learning models for cloud detection between Landsat-8 and Proba-V
- 怎么选择外盘期货平台最正规安全?
- Independent development is a way out for programmers
- Sentinel-流量防卫兵
- VBA drives SAP GUI to realize office automation (II): judge whether elements exist
- 使用QT遍历Json文档及搜索子对象
猜你喜欢
![[JMeter] advanced writing method of JMeter script: all variables, parameters (parameters can be configured by Jenkins), functions, etc. in the interface automation script realize the complete business](/img/a6/aa0b8d30913dc64f3c0cd891528c40.png)
[JMeter] advanced writing method of JMeter script: all variables, parameters (parameters can be configured by Jenkins), functions, etc. in the interface automation script realize the complete business

Server configuration jupyter environment

Redis Foundation

EPM related

服务器配置 jupyter环境

PMP认证需具备哪些条件啊?费用多少啊?

Matlab reference

修复漏洞 - mysql 、es

神经网络自我认知模型

統計php程序運行時間及設置PHP最長運行時間
随机推荐
Mongodb (quick start) (I)
Cartoon: looking for the best time to buy and sell stocks
LeetCode每日一题:合并两个有序数组
Knowing that his daughter was molested, the 35 year old man beat the other party to minor injury level 2, and the court decided not to sue
Cmake tutorial Step4 (installation and testing)
「运维有小邓」用于云应用程序的单点登录解决方案
mybash
Use QT designer interface class to create two interfaces, and switch from interface 1 to interface 2 by pressing the key
LeetCode 练习——206. 反转链表
統計php程序運行時間及設置PHP最長運行時間
Disabling and enabling inspections pycharm
Easynmon Usage Summary
rsync
Teamcenter 消息注册前操作或后操作
GFS distributed file system
热通孔的有效放置如何改善PCB设计中的热管理?
Operation before or after Teamcenter message registration
matlab内建函数怎么不同颜色,matlab分段函数不同颜色绘图
tkinter窗口预加载
数据访问 - EntityFramework集成