Average Ratings 0 Ratings
Average Ratings 0 Ratings
Description
Protect, Monitor, and Discover enterprise sensitive data across multiple platforms and environments. Automate your subject rights response and demonstrate regulatory compliance - all in one solution
Description
MyDiamo was developed by Penta Security Systems (APAC leader in encryption technology) and is available to all for noncommercial use. Enterprises and organizations who require additional features can obtain a commercial license.
Index searching is possible with column-level encryption or partial encryption
- Minimal system performance changes guaranteed
- Compatible with open-source DBMS such as MySQL, MariaDB and Percona
- GDPR/PCI DSS/HIPAA compliant
- Code modification is not required, it works parallel at the engine level
API Access
Has API
API Access
Has API
Integrations
Amazon DynamoDB
Amazon Redshift
Amazon S3
Apache HBase
Azure Databricks
Google Cloud Build
Google Drive
Hadoop
Hive
Mage Dynamic Data Masking
Integrations
Amazon DynamoDB
Amazon Redshift
Amazon S3
Apache HBase
Azure Databricks
Google Cloud Build
Google Drive
Hadoop
Hive
Mage Dynamic Data Masking
Pricing Details
No price information available.
Free Trial
Free Version
Pricing Details
No price information available.
Free Trial
Free Version
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Vendor Details
Company Name
Mage Data
Founded
2014
Country
United States
Website
magedata.ai/
Vendor Details
Company Name
Penta Security Systems Inc.
Founded
1997
Country
South Korea
Website
mydiamo.com
Product Features
Data Discovery
Contextual Search
Data Classification
Data Matching
False Positives Reduction
Self Service Data Preparation
Sensitive Data Identification
Visual Analytics
Data Privacy Management
Access Control
CCPA Compliance
Consent Management
Data Mapping
GDPR Compliance
Incident Management
PIA / DPIA
Policy Management
Risk Management
Sensitive Data Identification
Data Security
Alerts / Notifications
Antivirus/Malware Detection
At-Risk Analysis
Audits
Data Center Security
Data Classification
Data Discovery
Data Loss Prevention
Data Masking
Data-Centric Security
Database Security
Encryption
Identity / Access Management
Logging / Reporting
Mobile Data Security
Monitor Abnormalities
Policy Management
Secure Data Transport
Sensitive Data Compliance
GDPR Compliance
Access Control
Consent Management
Data Mapping
Incident Management
PIA / DPIA
Policy Management
Risk Management
Sensitive Data Identification
Product Features
Endpoint Protection
Activity Log
Antivirus
Application Security
Behavioral Analytics
Device Management
Encryption
Signature Matching
Web Threat Management
Whitelisting / Blacklisting
Risk Management
Alerts/Notifications
Auditing
Business Process Control
Compliance Management
Corrective Actions (CAPA)
Dashboard
Exceptions Management
IT Risk Management
Internal Controls Management
Legal Risk Management
Mobile Access
Operational Risk Management
Predictive Analytics
Reputation Risk Management
Response Management
Risk Assessment
Web Application Firewalls (WAF)
Access Control / Permissions
Alerts / Notifications
Automate and Orchestrate Security
Automated Attack Detection
DDoS Protection
Dashboard
IP Reputation Checking
Managed Rules
OWASP Protection
Reporting / Analytics
Secure App Delivery
Server Cloaking
Virtual Patching
Zero-Day Attack Prevention