Real-time access monitoring and analytics
Identify malicious activity and maintain a forensic record
Centralized Auditing & Reporting
Okera ensures you are providing least privileged access to data. Gain visibility on who’s accessing sensitive data, when and how often
Comprehensive Audit of All Activity
Every action on data or metadata – whether it be a query request or a change in policy – that goes through Okera is captured in our audit logs. These logs remain consistent for every tool accessing the data lake. Audit data is persisted as JSON files, which can be integrated with SIEM tools like Splunk or Sumologic for real-time monitoring and data breach alerts.
Built-In Reporting to Answer Important Questions
Okera provides a number of reports in the UI that answer questions such as:
- What data is being accessed in the lake and when?
- Which users have accessed sensitive data?
- Which tools are accessing sensitive data and how much did they read?
- Are my policies maintaining least privilege access to data?
User-Centric Auditing
For any given user, data stewards can drill down into their specific activity to get precise, actionable detail that can spell the difference between normal and suspect access patterns.
Reports and Just-In-Time Insights to Manage Least Privilege Access to Data
Discover and report on data access anomalies. to ensure least privileged access to data. Monitor who’s accessing what data, when and how often – down to the cell level. Proactively deter any potential breaches and leaks exposing personally identifiable information (PII).
Integrate your catalogue
Using REST API integration we can integrate your Data Catalogue or issue management platform with Okera to manage potential or actual data breaches and build the links between governance, your catalogue and data access management