We are primarily using it for data security posture management (DSPM) and cloud security posture management (CSPM). It is a data discovery and classification tool. We can classify the data based on its sensitivity on a day-to-day basis across the organization's data repository, which is huge with more than 10 petabytes. It is an ongoing task. It is something that needs to be done in the background every day. We have to analyze the data to scan the data. We have to classify the data and see who has access to it and what is the sensitivity level.
Security Engineer at a recreational facilities/services company with 1,001-5,000 employees
Real User
Top 20
2023-06-07T16:34:00Z
Jun 7, 2023
Initially, it was to get an idea of where sensitive data was, but now, the way I've been using it is to supplement our CNET where we have a view list. So, when I get the findings there, I'll go look in Cyera and make sure that there's no sensitive data, and if there is, that'll help me build a better story when I go to get it remediated by the stakeholders. We're using its latest version. It's deployed on Azure and AWS.
What is database security? Database security consists of a range of security controls, tools and practices designed to protect the database management system (DBMS). There are several security measures your organization should implement, from protecting the physical infrastructure holding the servers to securing the network and access to the data.
Database security tools and practices should protect:
Data inside the database
The database management system
Data in transit from and to...
We are primarily using it for data security posture management (DSPM) and cloud security posture management (CSPM). It is a data discovery and classification tool. We can classify the data based on its sensitivity on a day-to-day basis across the organization's data repository, which is huge with more than 10 petabytes. It is an ongoing task. It is something that needs to be done in the background every day. We have to analyze the data to scan the data. We have to classify the data and see who has access to it and what is the sensitivity level.
Initially, it was to get an idea of where sensitive data was, but now, the way I've been using it is to supplement our CNET where we have a view list. So, when I get the findings there, I'll go look in Cyera and make sure that there's no sensitive data, and if there is, that'll help me build a better story when I go to get it remediated by the stakeholders. We're using its latest version. It's deployed on Azure and AWS.