Real-time access monitoring and analytics

 Identify malicious activity and maintain a forensic record


Audit and Analyze Sensitive Data Usage

Internal and external Threat Protection

Centralized Auditing & Reporting

Okera ensures you are providing least privileged access to data. Gain visibility on who’s accessing sensitive data, when and how often

Comprehensive Audit of All Activity

comprehensive access auditEvery action on data or metadata – whether it be a query request or a change in policy – that goes through Okera is captured in our audit logs. These logs remain consistent for every tool accessing the data lake. Audit data is persisted as JSON files, which can be integrated with SIEM tools like Splunk or Sumologic for real-time monitoring and data breach alerts.

Built-In Reporting to Answer Important Questions

Okera provides a number of reports in the UI that answer questions such as:

  • What data is being accessed in the lake and when?
  • Which users have accessed sensitive data?
  • Which tools are accessing sensitive data and how much did they read?
  • Are my policies maintaining least privilege access to data?

User-Centric Auditing

For any given user, data stewards can drill down into their specific activity to get precise, actionable detail that can spell the difference between normal and suspect access patterns.

Reports and Just-In-Time Insights to Manage Least Privilege Access to Data

Discover and report on data access anomalies.  to ensure least privileged access to data.  Monitor who’s accessing what data, when and how often – down to the cell level. Proactively deter any potential breaches and leaks exposing personally identifiable information (PII). 

Integrate your catalogue

Using REST API integration we can integrate your Data Catalogue or issue management platform with Okera to manage potential or actual data  breaches and build the links between governance, your catalogue and data access management