QueryPie

QueryPie

QueryPie provides integrated data access control solutions, enhancing cybersecurity across various infrastructures while ensuring compliance with industry regulations.

Location: Korea
Software Type: Web App

Need help?

We can help you find specialists for QueryPie. Let us connect you with the right experts to assist you.

*User registration required

Are you an expert in QueryPie?

Description

QueryPie offers a suite of integrated access control solutions designed to enhance cybersecurity across various infrastructures, including databases, systems, and Kubernetes environments. The platform is built on the Zero Trust security framework, enabling centralized management of security policies for scattered data sources.

Key products include:
1. Database Access Controller (DAC): This tool features role-based and attribute-based access control, a web SQL editor, comprehensive auditing, and data masking policies. It supports multiple data sources, including both RDBMS and NoSQL databases, integrating seamlessly with existing environments and identity providers such as Azure Active Directory and Okta.
2. System Access Controller (SAC): Designed for cloud instances like AWS EC2, SAC allows administrators to monitor user commands and replay sessions for security analysis. It includes centralized server management, session recording, and a built-in web terminal for SSH access.
3. Kubernetes Access Controller (KAC): This solution provides granular permission management with Role-Based and Attribute-Based Access Control, supporting audit logging and automatic kubeconfig configuration for managing access to Kubernetes APIs across various cloud infrastructures.
4. AI Data Discovery (AIDD): AIDD automatically identifies and classifies sensitive information, generating tags for access control. It enhances data governance through intelligent data search and visualization tools.

These products aim to simplify the governance and sharing of sensitive data while ensuring robust security measures and compliance with industry regulations.

Features

Integrated Data Access Solutions

A comprehensive suite for managing access across databases, systems, and Kubernetes.

Automated Data Discovery

AI-driven identification and classification of sensitive data to enhance governance.

Centralized Security Policy Management

Utilizes the Zero Trust framework for managing security policies across various infrastructures.

Support for Multiple Identity Providers

Integrates with identity providers like Okta and Azure Active Directory for user management.

Auditing and Compliance Features

Comprehensive auditing capabilities for tracking access and ensuring regulatory compliance.

Tags

cybersecuritycloud managementdata governanceaccess control

Documentation & Support

  • Documentation
  • Online Support
  • Updates