Average Ratings 0 Ratings
Average Ratings 0 Ratings
Description
Amazon Security Lake seamlessly consolidates security information from various AWS environments, SaaS platforms, on-premises systems, and cloud sources into a specialized data lake within your account. This service enables you to gain a comprehensive insight into your security data across the entire organization, enhancing the safeguarding of your workloads, applications, and data. By utilizing the Open Cybersecurity Schema Framework (OCSF), which is an open standard, Security Lake effectively normalizes and integrates security data from AWS along with a wide array of enterprise security data sources. You have the flexibility to use your preferred analytics tools to examine your security data while maintaining full control and ownership over it. Furthermore, you can centralize visibility into data from both cloud and on-premises sources across your AWS accounts and Regions. This approach not only streamlines your data management at scale but also ensures consistency in your security data by adhering to an open standard, allowing for more efficient and effective security practices across your organization. Ultimately, this solution empowers organizations to respond to security threats more swiftly and intelligently.
Description
Tokern offers an open-source suite designed for data governance, specifically tailored for databases and data lakes. This user-friendly toolkit facilitates the collection, organization, and analysis of metadata from data lakes, allowing users to execute quick tasks via a command-line application or run it as a service for ongoing metadata collection. Users can delve into aspects like data lineage, access controls, and personally identifiable information (PII) datasets, utilizing reporting dashboards or Jupyter notebooks for programmatic analysis. As a comprehensive solution, Tokern aims to enhance your data's return on investment, ensure compliance with regulations such as HIPAA, CCPA, and GDPR, and safeguard sensitive information against insider threats seamlessly. It provides centralized management for metadata related to users, datasets, and jobs, which supports various other data governance functionalities. With the capability to track Column Level Data Lineage for platforms like Snowflake, AWS Redshift, and BigQuery, users can construct lineage from query histories or ETL scripts. Additionally, lineage exploration can be achieved through interactive graphs or programmatically via APIs or SDKs, offering a versatile approach to understanding data flow. Overall, Tokern empowers organizations to maintain robust data governance while navigating complex regulatory landscapes.
API Access
Has API
API Access
Has API
Integrations
AWS Glue
Amazon Web Services (AWS)
AWS Lambda
Abstract Security
Amazon Athena
Amazon EventBridge
Amazon OpenSearch Service
Amazon Redshift
Amazon S3
Amazon Simple Notification Service (SNS)
Integrations
AWS Glue
Amazon Web Services (AWS)
AWS Lambda
Abstract Security
Amazon Athena
Amazon EventBridge
Amazon OpenSearch Service
Amazon Redshift
Amazon S3
Amazon Simple Notification Service (SNS)
Pricing Details
$0.75 per GB per month
Free Trial
Free Version
Pricing Details
No price information available.
Free Trial
Free Version
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Vendor Details
Company Name
Amazon
Founded
1994
Country
United States
Website
aws.amazon.com/security-lake/
Vendor Details
Company Name
Tokern
Founded
2019
Country
United States
Website
tokern.io
Product Features
Cloud Security
Antivirus
Application Security
Behavioral Analytics
Encryption
Endpoint Management
Incident Management
Intrusion Detection System
Threat Intelligence
Two-Factor Authentication
Vulnerability Management
Product Features
Data Governance
Access Control
Data Discovery
Data Mapping
Data Profiling
Deletion Management
Email Management
Policy Management
Process Management
Roles Management
Storage Management
Data Lineage
Database Change Impact Analysis
Filter Lineage Links
Implicit Connection Discovery
Lineage Object Filtering
Object Lineage Tracing
Point-in-Time Visibility
User/Client/Target Connection Visibility
Visual & Text Lineage View