banner背景图 21
Data Security Classification System
Application Scenarios
Data Security Protection (Joint Prevention and Control)
Data Security Protection (Joint Prevention and Control)
By sharing the classification and grading results with systems for Data Masking System, Watermarking, Encryption System, and others, a united front for protection is established, creating a closed-loop system for data security. This synergy leads to an enhanced effect of joint prevention and control.
Asset Risk Assessment (Permissions, Vulnerabilities)
Asset Risk Assessment (Permissions, Vulnerabilities)
By integrating data asset access rights and vulnerability detection, the system assists users in conducting a comprehensive risk assessment of data assets.
Asset Valuation (Identifying High-Value Assets)
Asset Valuation (Identifying High-Value Assets)
The system aids users in pinpointing high-value data through the automatic identification of sensitive and core data, thereby completing the valuation assessment of data assets.
Asset Visualization (Database Assets, Data Assets)
Asset Visualization (Database Assets, Data Assets)
With automatic discovery and organization of data assets, the system helps users to compile statistics and create visual representations of data assets.
Product Capabilities
Results Presentation and Output
Results Presentation and Output
The system presents the results of data asset distribution, classification, and grading with visual representations across various dimensions, including data categorization, data grading, database types, associated business units, and organizational structures. It also supports external output in the form of files or through interfaces.
Data Classification
Data Classification
The system includes built-in support for user-defined data classification and grading standards and models. By performing the classification and grading tasks, it quickly assists customers in completing the data sorting process and outputs a data classification and grading inventory.
Sensitive Data Identification
Sensitive Data Identification
Incorporating built-in support for custom sensitive data types and feature libraries, the system automatically identifies and discovers sensitive data types while also allowing for manual correction. This facilitates an efficient and rapid generation of a comprehensive sensitive data inventory.
Account authority combing
Account authority combing
Automated grooming and risk assessment of access rights to database assets, support for setting up and maintaining attribution of database assets.
Data Asset Inventory
Data Asset Inventory
The process automates the identification of all data assets within the customer's network environment through automatic IP and port scanning. This aids the customer in gaining a clear understanding of data information, including the distribution and usage of data assets, data volume levels, and the distribution of sensitive data. Ultimately, it culminates in the creation of a comprehensive data asset inventory.
Product Advantage
Data Asset Maps for Asset Visualization
Data Asset Maps for Asset Visualization
The system features automated asset sorting and supports the visual display of asset maps, intuitively showcasing database data information, sensitive data details, and data classification and grading information from various dimensions. This enables users to gain a clear understanding of asset distribution.
With Multiple Sets of Built-in Classification and Grading Criteria
With Multiple Sets of Built-in Classification and Grading Criteria
The system includes a variety of pre-set industry classification and grading standards such as general, medical, financial, government, industrial, and others, with support for standard customization. Leveraging AI algorithms and an intelligent labeling feature alongside manual assistance, it aids enterprises in swiftly accomplishing data classification and grading tasks.
Classification and Grading Results Shared
Classification and Grading Results Shared
The product offers a multitude of external interfaces that can be integrated with ANKKI's existing security products and third-party security management platforms. This integration achieves a synergistic effect of joint defense and control, creating a closed-loop system for data security protection.
Support for a Rich Variety of Database Types
Support for a Rich Variety of Database Types
The system supports common relational databases such as Oracle, MySQL, SQL Server, Sybase, etc.; it also supports Chinese databases like GBase, DM, Kingbase, Shenzhou, etc; in addition, it supports popular big data platforms, including Hive and HBase.
Experience security protection for free now