We are primarily using it for data security posture management (DSPM) and cloud security posture management (CSPM). It is a data discovery and classification tool. We can classify the data based on its sensitivity on a day-to-day basis across the organization's data repository, which is huge with more than 10 petabytes. It is an ongoing task. It is something that needs to be done in the background every day. We have to analyze the data to scan the data. We have to classify the data and see who has access to it and what is the sensitivity level.
Security Engineer at a recreational facilities/services company with 1,001-5,000 employees
Real User
Top 20
2023-06-07T16:34:00Z
Jun 7, 2023
Initially, it was to get an idea of where sensitive data was, but now, the way I've been using it is to supplement our CNET where we have a view list. So, when I get the findings there, I'll go look in Cyera and make sure that there's no sensitive data, and if there is, that'll help me build a better story when I go to get it remediated by the stakeholders. We're using its latest version. It's deployed on Azure and AWS.
Database Security is essential for protecting sensitive data, preventing breaches, and ensuring regulatory compliance. It involves various measures such as encryption, access controls, and monitoring tools.
Effective strategies are crucial to safeguarding critical information stored in databases from unauthorized access, misuse, or cyberattacks. Solutions in this category typically offer a suite of features designed to protect data at rest and in transit, enforce security policies,...
We are primarily using it for data security posture management (DSPM) and cloud security posture management (CSPM). It is a data discovery and classification tool. We can classify the data based on its sensitivity on a day-to-day basis across the organization's data repository, which is huge with more than 10 petabytes. It is an ongoing task. It is something that needs to be done in the background every day. We have to analyze the data to scan the data. We have to classify the data and see who has access to it and what is the sensitivity level.
Initially, it was to get an idea of where sensitive data was, but now, the way I've been using it is to supplement our CNET where we have a view list. So, when I get the findings there, I'll go look in Cyera and make sure that there's no sensitive data, and if there is, that'll help me build a better story when I go to get it remediated by the stakeholders. We're using its latest version. It's deployed on Azure and AWS.