Feature

Encrypt your data by design


All data is encrypted using Data Lock. Even with SA or DBA user, data will be unreadable

Encryption

99.9% of the biggest databases are unencrypted, leaving data as plaintext, ready to be read and used by anyone that could access it even without privileges. To be effective, data should be encrypted in it's raw state. When encrypted table, record or column data is intercepted by an unauthorized entity, the intruder has to guess which algorythms, keys and ciphers the sender used to encrypt the message, as well as what keys were used as variables. The time it takes to guess this information is what makes encryption such a valuable security tool

...

Asymmetric ciphers

Also known as public key encryption, use two different -- but logically linked -- keys. This type of cryptography often uses prime numbers to create keys since it is computationally difficult to factor large prime numbers and reverse-engineer the encryption. The Rivest-Shamir-Adleman (RSA) encryption algorithm is currently the most widely used public key algorithm. With RSA, the public or the private key can be used to encrypt a message; whichever key is not used for encryption becomes the decryption key.

...

Column-level encryption

Is an approach to database encryption in which information in every cell in a particular column has the same password for access, reading and writing purposes. Data Lock expanded this approach by creating a proprietary method to enhance and add additional layers of security checks.

...
Features

Multiple Data Security Access


Data Lock has 6 conditions that defines access to information

Single user

Only one user using the same code can access data at the same time. This prevents using a single user by multiple persons



Token access

Data Lock provides a complex securiry access combined with username/code

Location

Limit user access based on location



phone

Time period

Allow user access based on a specific schedule, specific days of a week, specific consecutive hours access



Object access

List only objects - tables, views, procedures, among others - that users can see

Data/row access

Apply filter conditions to allow only access to specific datasets (row level security)



How Does It Work?


Add our API layer to your ETL process. Read and Write will be as always, but data will never be exposed again.

Data Lock
1 Change your data connetion to use our API layer

Using our API, changing existing processes is easy and simple.

2 Setup all your users and app tokens

Every access token is individual. Create profiles and re-use them across multipe tokens

3 Data encrypted. Done

Check your data without using our API. It's qiBTIaKln4P4oAvt1lFkBO+XBXe4ZOyAlL5+jSg6Tls=


Already have a huge database exposed? No worries, we provide a re-write process to encrypt all your existing data

Talk with us

Want to know more about this solution or other service? Click in one of the options below

...