iMONITOR
Access Monitoring and Documentation for Production Databases
iMonitor provides next generation security access monitoring and documentation for sensitive data residing in production databases. iMonitor documents the detailed data needed to comply with privacy legislation, and has actionable alerts including intrusion detection, attack termination, victim notification and internal controls.
The power to terminate attacks
When suspicious activity is detected, iMonitor’s alert engine verifies that the access is unauthorized, and then sends actionable alerts to designated pagers, hand-held computers, or email inboxes; in real time if you like. With accurate information in hand, your staff can determine the right course of action and even stop an intrusion already in progress using iMonitor tools.
Rock solid compliance & internal controls
iMonitor’s continuous tracking and alerting systems enable your company to demonstrate thorough and independent controls over private data access.
iMonitor’s logs are comprehensive and can pinpoint the exact database areas the intruder accessed down to the actual row, and in some cases the SQL statement used.
iMonitor will satisfy Internal IT auditors, the Security Office, & multiple Legislative Compliance mandates.
Notify your customers with confidence
Until iMonitor,
determining what specific data was actually breached makes compliance with new privacy legislation slow and accurate victim notification impossible. With speed, accuracy and detail, iMonitor assesses the intrusion, and then records the specific rows, columns and timestamp of the data accessed. Instead of the cost and exposure of notifying untold numbers of victims, your organization can narrow the notifications to only those that were truly affected. If you add iMask and iScramble to your suite of products, you can also see if the data the intruder accessed was something they could use or not, further narrowing the notification list and adding the power of knowledge about the attack.
A formerly weak position is now one of strength; a differentiation that your customers will appreciate.
Efficient, Low cost architecture. complete solutions.
When combined with iMask and iScramble, iMonitor offers a complete solution for protecting enterprise databases; both production and non-production. Simple, easy to use interfaces allow collaboration between IT, Audit, Security & compliance groups within your organization, streamlining compliance, security audit costs and efforts.
iMonitor uses the Oracle database technology stack; no additional software licensing is required. iMonitor, iScramble and iMask reside on a single server and are maintained via a shared admin console with a common interface. The interface manages the entire framework including instances, users, jobs, etc. iMonitor, iScramble and iMask share common content authoring and a single installation.