Database Access Management & Dynamic Data Masking

Secure, monitor, and centrally manage access to your databases with Kron's Database Access Manager (DAM). Leverage advanced role-based access control, dynamic data masking, and comprehensive database activity monitoring to ensure sensitive data protection and real-time oversight of database actions.

Download Datasheet Request a Demo

How Dynamic Data Masking Works?

Kron’s Dynamic Data Masking utilizes a man-in-the-middle proxy to manage several databases, including IBM DB2, Microsoft SQL Server, MySQL, and Oracle, from a centralized location. User queries are sent to the database through SQL Proxy. The SQL Proxy captures user queries and applies policies. The integration of Kron’s Dynamic Data Masking delivers data security protection within the data layer and ensures excellent database security.

How Dynamic Data Masking Works?
Solid Protection for Database Security

Solid Protection for Database Security

Dynamic Data Masking prepares or masks individual pieces of information inside the filtered data set. The Kron DDM engine controls exactly who should gain access to what, where, when, why and how; down to the level of individual cells in database queries.