S-0271
Server Data Analysis Service (User & Data)
Give IT total visibility and control over their unstructured and semi-structured data, ensuring that only the right users have access to the right data at all times, use is monitored, and potential abuse is flagged.
Unstructured and semi-structured data governance
Artificial Intelligence (AI)
Data Analytics
The software can help you answer the following questions:
1. WHO has access to a data set?
2. WHO should have access to data set?
3. WHO has been accessing it?
4. WHICH data is sensitive?
5. WHO is the data owner?
6. WHERE is my sensitive data overexposed, and how do I fix it?
Also, it can help IT for the following issues:
1. Identify Data Owners
2. Remove Global Access Groups
3. Perform Data Entitlement Reviews
4. Revoke Unused and Unwarranted Permissions
5. Audit Permissions Changes
6. Audit Group Membership Changes
7. Audit Data Access
8. Prioritize Data
9. Align Security Groups to Data
10. Lock Down, Delete, or Archive Stale Data
Next step, use web-based dashboards to help score, classify, analyse, prioritize alerts and take action to resolve identified issues:
1. Ransomware behavior
2. Unauthorized access attempts
3. Accumulative analysis on idle and sensitive data
4. Unusual encryption activity
5. Misconfigurations
6. System intrusion
6. Unauthorized privilege escalations
8. Modifications to critical GPOs
9. Suspicious access activity
10 Brute force
11 attacks Exploitation tools
DBTRONIX (Far East) Ltd
21558111
11/F, Guangdong Finance Bldg., 88 Connaught Road West, HK
If any government department would like to conduct PoC trial or technology testing on the I&T solution, please contact Smart LAB.