+852 - 2155 8000

info@dbtronix.com.hk

  1. Home
  2. /
  3. DatAdvantage

+852 - 2155 8000

info@dbtronix.com.hk

  1. Home
  2. /
  3. DatAdvantage

DatAdvantage

Data-Centric Audit and Protection

DatAdvantage is the heart of our Data Security Platform, giving you complete visibility and control over your critical data and hybrid IT infrastructure.

We bring data security
and cost-savings together

DatAdvantage maps who can access data and who does access data – across file and email systems, shows where users have too much access, and then safely automates changes to access control lists and security groups.

Visualize who can access sensitive and regulated information

Audit every single file and email touch on-premises and in the cloud

Simulate changes in a sandbox and safely commit them when ready

Eliminate repetitive clean-up projects and automate manual data protection tasks

Assess, prioritize, and mitigate your biggest IT security risks

Our dashboards show where you’re at risk, and track your progress as you lock things down. Quickly pinpoint exposed folders, stale data, or inactive accounts that are still enabled. With Data Classification Engine, which looks inside files, you’ll also see where you have regulated and sensitive data that’s at risk.

Get a panoramic view of data access

DatAdvantage has a bi-directional view: just double-click on a folder, site, or mailbox to see who has access to it, or click on a user or group to see everything they can access – across all your data stores. DatAdvantage figures out nested groups, permissions, inheritance, and even identifies folders where permissions aren’t functioning correctly.

Simulate and commit changes to safely remediate risk

A powerful commit engine can simulate access control changes in a sandbox and commit them when ready. DatAdvantage tracks and reports on multiple jobs, prevents errors with logic checks, and rolls changes back if needed.

Take remediation a step further. Automation Engine finds and safely fixes global groups and inconsistent permissions on entire servers with just a few clicks, making remediation projects exponentially faster than manual techniques.

 

Search a Unified Audit Trail of Events

With a unified audit trail, admins or security analysts are only a few clicks away from knowing who’s been opening, creating, deleting, or modifying important files, sites, Azure Active Directory objects, emails, and more.

Investigate security incidents and troubleshoot issues with a searchable, sortable interface. See a user’s activity across cloud and on-premises systems in a single view. Your complete audit history is always at your fingertips – there’s no need to roll or archive logs.

AI-Powered
Recommendations

Our machine learning algorithm flags users with unnecessary access. Acting on these recommendations is a fast and accurate way to reduce risk and get to least privilege. Model permissions changes in a sandbox and commit changes to Office 365 with just a few clicks.

Schedule a personalized
data risk assessment

Our assessments are 100% obligation-free and non-intrusive

A dedicated engineer will do all the heavy-lifting and you’ll get a comprehensive report that highlights at-risk sensitive data, flags access control issues, and quantifies risk – so that when you’re asked what you’re doing to prevent becoming the next cybersecurity headline, you’re already ahead of the game.

    Deep coverage of enterprise data stores

    Unlike many products that take the mile-wide, inch-deep approach, DBTRONIX is consistently extending its full suite of data security functionality to the systems that are most important to our customers.

    Active Directory

    Windows

    Sharepoint

    Exchange

    UNIX/Linux

    Office 365

    Dell EMC

    NetApp

    Nasuni

    HPE

    box

    Perimeter Telemetry

    DNS

    Proxy

    VPN

    Deep coverage of enterprise data stores

    Unlike many products that take the mile-wide, inch-deep approach, DBTRONIX is consistently extending its full suite of data security functionality to the systems that are most important to our customers.

    Active Directory

    Windows

    Sharepoint

    Exchange

    UNIX/Linux

    Office 365

    Dell EMC

    NetApp

    Nasuni

    HPE

    box

    Perimeter Telemetry

    DNS

    Proxy

    VPN

    Leverage dozens of built-in reports

    Get trend reports, reports on permissions, active data, stale data, things that’ve changed, and things that need to be fixed. Run reports on demand, or schedule them for automatic delivery.

    Uncover misconfigurations and security gaps

    Dashboards and reports help you find and fix things like overexposed sensitive data, misconfigured Active Directory settings, broken permissions, and more.

    Monitor privileged accounts

    DatAdvantage auto-identifies executives, service accounts, and admins based on user behavior, group memberships, and other metadata. DBTRONIX builds a baseline of normal activity and alerts you when anything anomalous happens.

    Find and archive stale data

    DatAdvantage isolates stale data based on actual access activity from human users. Use Data Transport Engine’s flexible rules engine to automatically archive unused data based on your retention policies.

    Detect internal and external threats with DatAlert

    With DatAlert, get notified when something needs urgent attention – like someone accessing or encrypting a bunch of sensitive files, reading an executive’s email, or making changes to group policy outside of normal change control hours.

    Identify and involve data owners

    Identify owners through DatAdvantage, and then assign them, so they get reports about their data and their groups automatically. With DataPrivilege, you can give owners control – so they can safely manage and review access without IT’s help.

    Frequently Asked

    Questions

    What hardware/software do I need?

    • Windows Server 2008 or newer (can be virtual) with 80GB disk, 8GB RAM, and 2.3 GHz CPU or better
    • SQL Server 2008 or newer
    • A service account for crawling AD and file systems

    Get in touch for custom specs.

    Does DBTRONIX need to run as Domain Admin?

    Nope. We’ll need admin credentials to install, but our services do not need to run as domain admin once they’re there.

    In fact, we really prefer they don’t. To monitor Windows servers, for example, we need a domain user with backup operator and power user rights. In UNIX, we run as a normal user.

    Is there any performance impact on my production servers?

    We typically measure between a 1% and 2% increase in CPU utilization for NAS devices. Our Windows agent/filter usually takes between 0-1% CPU, 6-10 MB of RAM, and we never write to disk on the system we’re monitoring. For Windows, SharePoint and UNIX/Linux environments, the DBTRONIX agent is co-installed with a ‘watchdog’ service that ensures it never exceeds defined boundaries of CPU and memory utilization.

    Do you require agents to get audit events?

    It depends on the platform we’re monitoring:

    • Windows = agent
    • SharePoint = agent
    • UNIX/Linux = agent
    • Exchange = agent
    • Active Directory = no agent
    • Office 365 = no agent
    • NAS = no agent on most platforms

    Ew, agents?

    We all wish every platform had good built-in auditing, but many don’t.

    So we’ve been writing file-system filters (agents) since 2005, tackling Windows, Solaris, Linux, AIX, SharePoint and Exchange (online and on-prem). DBTRONIX filters/agents have been battle-tested with thousands of customers. Our Windows filter, for example, usually takes between 0-1% CPU, 6-10 MB of RAM.

    No agents are required to get permissions, users & groups, or classify data.

      What's a free risk assessment?

      • We’ll build a personalized risk report that showcases your security wins and vulnerabilities.
      • We outline your problem areas – wondering about global access? Exposed sensitive data? Stale data? We got this. We’ll prioritize risk, and give you concrete steps to take to improve your data security
      • We’ll help you fix real production security issues
      • While we’re running, we’ll even enable automatic detection for things like ransomware, privilege escalations, misconfigurations, and odd user behaviors

      Contact Us

      We are here to help. Call us and speak with a secure erase specialist who will answer any questions you might have

      WhatsApp