Categories
Problems that solves
Shortage of inhouse software developers
Shortage of inhouse IT resources
High costs of IT personnel
Shortage of inhouse IT engineers
Values
Reduce Costs
Ensure Security and Business Continuity
Sonrai Security Platform
Identity and Data Governance for AWS, Azure, Google Cloud, and Kubernetes
About Product
Description
Identity Risk Monitoring and Access Graphing
Uncover all identity and data relationships between people and non-people identities (admins, roles, compute instances, serverless functions, and containers) across multi-cloud accounts and 3rd-party data stores. Sonrai Dig, our identity and data governance platform, graphs all access paths to enforce Least Privilege, and workflow enables certification of identities. Risks eliminated include:
- Separation of duties
- Privilege escalation
- Toxic Combinations
- Dormant identities
- Who/what has access rights?
- What is normal access behavior?
- What or who can access this resource and from where?
- What is accessing this resource?
- What has changed?
- What is the blast-radius?
- GDPR, HIPAA, PCI dashboards and more
- Data sovereignty monitoring
- Data asset inventory
- Customizable controls and compliance dashboards
- Monitoring PII data movement
- Workflow Automation
- Context-based alerting
- Automate DevSecOps
- Remediation & Prevention Bots
- Code Promotion Blocking
- Public Cloud Platforms: AWS, Azure, Google Cloud (GCP)
- IAM: AWS IAM, Azure AD, GCP IAM
- Audit: AWS CloudTrail, Azure activity logs, GCP Stackdriver
- Data Stores: DynamoDB, RDS, Cosmos DB, Data Lake, SQL, Big Table
- Key Stores: KMS, HashiCorp Vault
- Infrastructure: Kubernetes, WAF, Cloudfront, ELB Compute: ECS, Lambda, Azure Serverless