eCloud Data Mosaic is a data security product that fundamentally addresses the sensitive information protection and high-risk behavior management involved in the data access process. It frees users from the complexities of data access protocols and specialized security knowledge, allowing them to build a secure bastion of data access directly, quickly and consistently, enabling a complete data usage security-oriented solution.
Core Functions
Privacy data discovery, sorting and arrangement
Desensitization template management
Sovereign key and reverse desensitization
Sensitive information desensitization
Risky behavior blocking
User Scenarios
Data interaction between different departments within the organization
Privacy isolation and security defense for O&M personnel
Protection against application-side data access vulnerability and privacy data leakage
Data fusion between units, cross-border data exchange and data transactions
Security of data retrieval behavior, content desensitization and results auditing
Feature Highlights
Privacy data discovery, sorting and arrangement
Automatically detects target data objects and data changes based on access rights identifies and marks privacy types by the algorithm and customizes the security protection level of data access.
Enables multi-dimensional policy management, legal identity assessment and risk behavior blocking
Supports flexible access policies, the multi-dimensional definition of access behavior, and the assessment of the identity legitimacy of the source end of the access session to achieve differentiated and refined data access behavior management, and determines the risk level of access behavior through intelligent identification technology to support a variety of protection operations such as blocking, restricting and releasing.
Sovereign watermark protection and disclosure traceability and sovereign key and reverse desensitization
Locates the leakage behavior by matching the sovereign watermark of outgoing data and identifies the scope of data leakage Performs reverse desensitization operations on the desensitized data when sovereign keys are matched.
Desensitization template management
Allows administrators to generate different desensitization scenarios based on baseline templates.
Sensitive information desensitization
Automatically identifies the sensitive information during the access process with the sensitive information filtering function, so that the access results can be handled with constraints according to pre-defined policies and supports the desensitized data to maintain the same structure and properties as the real data with the high-simulation desensitization capability.
Permission management and auditing
Supports the three-party management (administrator, operator and auditor) and multi-tenant mode