The Kron™ PAM Database Access Manager provides session logging functionality to database admins. All database queries can be logged for security and compliance purposes. The user experience is unchanged as they continue to use their own database client. The client can communicate with the Database Access Manager through the standard protocol used by the database.
Kron PAM comprehensively logs all privileged session database connections and activities that may generate data breaches and impact business continuity.
Kron PAM efficiently and centrally secures and controls privileged access to databases and provides users a dedicated access to the information that is assigned to them, not any other information.
Database admins can control logging as well as user permissions to execute SQL commands, by employing policy enforcement and database masking as preventive actions.
Data masking technology is a crucial defense against the misuse of sensitive information. It works by providing users with fictitious or concealed data, rather than exposing real and sensitive information. This proactive approach is essential for safeguarding data at rest, found in non-production databases, as well as data in transition, often encountered in production databases.
Dynamic Data Masking becomes indispensable, especially in scenarios like application testing, where representative and coherent data are required. DDM is a key strategy to limit sensitive data exposure, masking it for non-privileged users. Kron PAM’s Database Access Manager employs DDM with a range of masking rules, including redaction/nulling, shuffling, blurring, tokenization, substitution, and custom rules defined by regular expressions.
DDM allows configuration to conceal sensitive data in query result sets without altering the underlying database content. This strategic implementation ensures that while users see masked data, the actual data in the database remains unchanged.
Kron PAM’s Database Access Manager takes data security a step further by providing four robust methods for policy enforcement:
Database admins gain granular control over user permissions, enabling them to define SQL query rules that align with established security requirements. Secure your data effectively with Kron PAM’s dynamic and fine-tuned Dynamic Data Masking capabilities.
Kron’s Database Access Manager (DAM) and Dynamic Data Masking (DDM) work seamlessly to fortify your database security. Acting as a man-in-the-middle proxy, DAM takes command of diverse databases—Cassandra, Hive, IBM DB2, Microsoft SQL Server, MySQL, Oracle, Teradata, and more—from a centralized hub.
Experience unparalleled control and security at every step of your database interactions with Kron’s DAM and DDM integration.