The Central Point for Managing Data Security
Secure.Manager is the central point of control for the administration and management of corporate security policies and procedures. It defines user settings, roles, privileges, sensitive data, encryption algorithms and keys, and security parameters.
Designed to meet the security needs of large distributed enterprises, Secure.Manager can deploy the security policy database on one or more servers that may be centrally located or globally dispersed. It is so flexible that you can perform global updates of privileges or capabilities without having to modify the authorizations of every individual user.
Secure.Manager performs several major tasks, including:
- Defining administrator permissions. With Secure.Manager, you can designate who is responsible for security policy over which pieces of data. While most data security tools by default assign administrator privileges to DBAs, with Secure.Manager, you can designate security administrators or domain or process specialists who may "own" the data.
- Defining end user authorizations. Using a global security policy database, Secure.Manager allows you to assign up to ten levels of security authorizations for users who can be identified by name, role, or organization.
- Managing encryption keys. Secure.Manager generates master keys, encrypts them, and stores them in its security policy database. Thanks to our patented technology, keys can be varied down to the individual record (column and row) level, and can be automatically changed randomly or periodically.
- Maintaining audit trails. Our logging facilities provide an audit mechanism that is independent of the database. Secure.Manager's audit mechanism can track any database activity that is protected by Protegrity's Secure.Server. Our logs can track all selects, inserts, updates, deletes, and unauthorized access attempts. Log records encrypted by Secure.Server are sent to Secure.Manager for storage, and disseminated using Crystal Reports.