
An all-in-one data security solution that provides various features, such as sensitive data detection, classification, grading, and de-identification, to help you meet compliance requirements specified in General Data Protection Regulation (GDPR) and personal information protection.
Vendor
Alibaba Cloud
Company Website


Overview
An all-in-one data security solution that provides various features, such as sensitive data detection, classification, grading, and de-identification, to help you meet compliance requirements specified in General Data Protection Regulation (GDPR) and personal information protection.
Benefits
- Agentless Deployment
- You can use DSC without deploying an agent. This saves your resources. After you activate DSC, you can directly use the out-of-the-box features that are secure and efficient.
- Diversified Data Sources Supported
- DSC protects the data in diversified data sources on the cloud. You can manage data security in a centralized manner since mainstream databases and different types of big data services are supported.
- Accurate and Automatic Sensitive Data Discovery & Classification
- DSC accurately identifies, classifies, and grades sensitive data in your cloud assets. DSC allows you to use various standard algorithms and defense rules to manage sensitive data assets in a centralized manner.
Features
End-to-End Data Monitoring and Management with Data Security Compliance Audits Sensitive Data Detection DSC can discover, determine, and protect objects in a large amount of data. DSC performs comprehensive scanning, classification, and grading on structured and unstructured data using built-in algorithms and customizable sensitive data detection rules. DSC provides security protection based on the detection results. Sensitive Data De-Identification DSC provides diversified built-in de-identification algorithms that allow you to create custom de-identification rules. You can use DSC to de-identify sensitive data in the production environment. Then, you can use the de-identified data in non-production environments, such as development and test environments. DSC ensures the authenticity and availability of the de-identified data. Contribution to Security Policies You can control the security risks and hazards in your enterprise data and optimize relevant security policies based on the information that is displayed in the DSC console. For example, the DSC console displays the storage objects that contain sensitive data, visitors that access data, and anomalous data flows and activities.