Horangi Warden Features
Security (4)
-
Compliance Monitoring
Monitors data quality and sends alerts based on violations or misuse.
-
Anomoly Detection
Constantly monitors acivity related to user behavior and compares activity to benchmarked patterns.
-
Data Loss Prevention
Stores data securely either on premise or in an adjacent cloud database to prevent loss of data at rest.
-
Cloud Gap Analytics
Analyzes data associated with denied entries and policy enforcement, giving information of better authentication and security protocols.
Compliance (3)
-
Governance
Allows users to create, edit, and relinquish user access privileges.
-
Data Governance
Ensures user access management, data lineage, and data encryption.
-
Sensitive Data Compliance
Supports compliance with PII, GDPR, HIPPA, PCI, and other regulatory standards.
Administration (6)
-
Policy Enforcement
Allows administrators to set policies for security and data governance.
-
Auditing
Analyzes data associated with web traffic and site performance to provide vulnerability insights and best practices.
-
Workflow Management
Creates new or streamlines existing workflows to better handle IT support tickets and service.
-
Auditing
Documents access and alterations of the database for analytics and reporting.
-
Data Discovery
Unveils data connected to infrastructure and applications used to help manage and maintain compliance within complex IT systems.
-
Access Control
Supports LDAP Protocol to enable access control and governance.
Data Protection (5)
-
Data Masking
Protects sensitive data by disguising or encrypting data, keeping it usable by the organization and approved parties.
-
Data Encryption/Security
Manages policies for user data access and data encryption.
-
Data loss Prevention
Stores data securely either on premise or in an adjacent cloud database to prevent loss of data at rest.
-
Anomoly Detection
Constantly monitors acivity related to user behavior and compares activity to benchmarked patterns.
-
Sensitive Data Compliance
Supports compliance with PII, GDPR, HIPPA, PCI, and other regulatory standards.
Analysis (3)
-
Cloud Gap Analytics
Analyzes data associated with denied entries and policy enforcement, giving information of better authentication and security protocols.
-
Compliance Monitoring
Monitors data quality and send alerts based on violations or misuse.
-
User Analytics
Allows for reporting and documentation of individual user behavior and privileges.

