Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Description

Simplifying data leakage prevention in your application is now easier than ever with the Acra encryption suite, which offers robust data protection for distributed systems, as well as web and mobile applications, utilizing PostgreSQL, MySQL, and KV backends through targeted encryption methods. The encryption of sensitive and personal information is not only a regulatory requirement under laws such as GDPR, HIPAA, CCPA, and PCI DSS but also aligns with the best practices established within the industry. Nonetheless, incorporating cryptography into distributed applications can often prove to be a complex endeavor, frequently resulting in limited security benefits and various architectural compromises. Acra aims to transform this landscape by offering a singular solution that encompasses nine essential data security controls, designed to effectively reduce data leakage risks while ensuring comprehensive defense mechanisms throughout the entire data lifecycle in the application. The integration of Acra is straightforward, requiring minimal changes to your existing codebase, and it enhances data security while decreasing mean time to detection (MTTD) and mean time to recovery (MTTR). Additionally, Acra equips developers with an integration library that enables the encryption of any record using keys from AcraServer, further streamlining the security process. Ultimately, Acra is positioned as a vital tool for any organization striving to maintain data integrity and compliance in today's digital landscape.

Description

High-performance database security software Data-Centric. Compliance with SOX and HIPAA, GDPR and PCI DSS, as well as other privacy laws and standards. Hybrid and Multicloud Database Security Proxy on AWS Azure, Google, and On-Prem Active protection, discovery, and auditing of sensitive and PII data. Data Auditing allows for real-time monitoring of user actions and data changes to ensure compliance and increased visibility. Database Firewall, role-based and location-aware Data Access Control & Protection. Protect corporate databases in the cloud and on-prem from hostile, negligent actions. Secures sensitive data in testing and development environments; Encryption completely eliminates the possibility of reverse engineering the masked data. Production data can be hidden using real-time location and role-based data masking. Protects sensitive privacy data from being exposed even if production data is not physically altered.

API Access

Has API

API Access

Has API

Screenshots View All

Screenshots View All

Integrations

Amazon RDS
Docker
Google Cloud SQL
HAProxy Enterprise
HashiCorp Vault
MySQL
OpenText Analytics Database (Vertica)
PostgreSQL
Recruitee
django CMS

Integrations

Amazon RDS
Docker
Google Cloud SQL
HAProxy Enterprise
HashiCorp Vault
MySQL
OpenText Analytics Database (Vertica)
PostgreSQL
Recruitee
django CMS

Pricing Details

$10000 per year
Free Trial
Free Version

Pricing Details

No price information available.
Free Trial
Free Version

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Vendor Details

Company Name

Cossack Labs

Founded

2014

Country

United Kingdom

Website

www.cossacklabs.com/acra/

Vendor Details

Company Name

DataSunrise

Founded

2014

Country

United States

Website

www.datasunrise.com

Product Features

Cloud Security

Antivirus
Application Security
Behavioral Analytics
Encryption
Endpoint Management
Incident Management
Intrusion Detection System
Threat Intelligence
Two-Factor Authentication
Vulnerability Management

Product Features

Database

Backup and Recovery
Creation / Development
Data Migration
Data Replication
Data Search
Data Security
Database Conversion
Mobile Access
Monitoring
NOSQL
Performance Analysis
Queries
Relational Interface
Virtualization

Alternatives

Alternatives

IRI DMaaS Reviews

IRI DMaaS

IRI, The CoSort Company
EncryptRIGHT Reviews

EncryptRIGHT

Prime Factors
HashiCorp Vault Reviews

HashiCorp Vault

HashiCorp