QueryPie
QueryPie provides integrated data access control solutions, enhancing cybersecurity across various infrastructures while ensuring compliance with industry regulations.
Need help?
We can help you find specialists for QueryPie. Let us connect you with the right experts to assist you.
*User registration required
Description
QueryPie offers a suite of integrated access control solutions designed to enhance cybersecurity across various infrastructures, including databases, systems, and Kubernetes environments. The platform is built on the Zero Trust security framework, enabling centralized management of security policies for scattered data sources.
Key products include:
1. Database Access Controller (DAC): This tool features role-based and attribute-based access control, a web SQL editor, comprehensive auditing, and data masking policies. It supports multiple data sources, including both RDBMS and NoSQL databases, integrating seamlessly with existing environments and identity providers such as Azure Active Directory and Okta.
2. System Access Controller (SAC): Designed for cloud instances like AWS EC2, SAC allows administrators to monitor user commands and replay sessions for security analysis. It includes centralized server management, session recording, and a built-in web terminal for SSH access.
3. Kubernetes Access Controller (KAC): This solution provides granular permission management with Role-Based and Attribute-Based Access Control, supporting audit logging and automatic kubeconfig configuration for managing access to Kubernetes APIs across various cloud infrastructures.
4. AI Data Discovery (AIDD): AIDD automatically identifies and classifies sensitive information, generating tags for access control. It enhances data governance through intelligent data search and visualization tools.
These products aim to simplify the governance and sharing of sensitive data while ensuring robust security measures and compliance with industry regulations.
Features
Integrated Data Access Solutions
A comprehensive suite for managing access across databases, systems, and Kubernetes.
Automated Data Discovery
AI-driven identification and classification of sensitive data to enhance governance.
Centralized Security Policy Management
Utilizes the Zero Trust framework for managing security policies across various infrastructures.
Support for Multiple Identity Providers
Integrates with identity providers like Okta and Azure Active Directory for user management.
Auditing and Compliance Features
Comprehensive auditing capabilities for tracking access and ensuring regulatory compliance.
Tags
Documentation & Support
- Documentation
- Online Support
- Updates