Satori Data Security Platform Features
Data Masking (5)
Sensitive Fields
The ability to create fields that automatically mask data such as credit card numbers or passwords.
Dynamic Masking
The ability to mask data in real time as it is entered.
Static Masking
The ability to apply or remove masking after data has been entered.
Consistent Masking
Tools to mask data using a consistent ruleset.
Random Masking
Tools to mask data using random characters and data.
Administration (11)
Supported Databases
Supports different database platforms and data types. Typically integrates with a variety of existing databases.
Data Management
Administrators can access and organize data related to incidents to produce reports or make data more navigable.
Logging and Reporting
Provides required reports to manage business. Provides adequate logging to troubleshoot and support auditing.
API / integrations
Application Programming Interface - Specification for how the application communicates with other software. API's typically enable integration of data, logic, objects, etc. with other software applications.
Data Modelling
Tools to (re)structure data in a manner that allows extracting insights quickly and accurately
Recommendations
Analyzes data to find and recommend the highest value customer segmentations.
Workflow Management
Tools to create and adjust workflows to ensure consistency.
Dashboards and Visualizations
Presents information and analytics in a digestible, intuitive, and visually appealing way.
Auditing
Documents access and alterations of the database for analytics and reporting.
Data Discovery
Unveils data connected to infrastructure and applications used to help manage and maintain compliance within complex IT systems.
Access Control
Supports LDAP Protocol to enable access control and governance.
Governance (3)
Compliance
Supports compliance with PII, GDPR, HIPPA, PCI, and other regulatory standards.
Access Management
Allows administrators to set user access privileges to permit approved parties to access sensitive data.
Multi-Factor Authentication
Requires a second level of authentication, such as sms messaging or customized tokens, to access data.
Protection (4)
Database Activity Monitoring
Documents the actions related to the database. Alerts users of incidents and abnormal activities and documents the access point.
Firewall
Protects database and sensitive information from a variety of attacks and malware threats.
Data Masking
Protects sensitive data by disguising or encrypting data, keeping it usable by the organization and approved parties.
Audits
Perform ad-hoc or ongoing IT audits at different levels of the company.
Compliance (6)
Sensitive Data Compliance
Supports compliance with PII, GDPR, HIPPA, PCI, and other regulatory standards.
Training and Guidelines
Provides guidelines or training related to sensitive data compliance requirements,
Policy Enforcement
Allows administrators to set policies for security and data governance
Compliance Monitoring
Monitors data quality and send alerts based on violations or misuse
At-Risk Analysis
Uses machine learning to identify at-risk data.
DLP Configuration
Offers data loss prevention tools to protect data from leaving the environments it is allowed to.
Data Protection (11)
Data Masking
Protects sensitive data by disguising or encrypting data, keeping it usable by the organization and approved parties.
Data Encryption/Security
Manages policies for user data access and data encryption.
Anomoly Detection
Constantly monitors acivity related to user behavior and compares activity to benchmarked patterns.
Sensitive Data Compliance
Supports compliance with PII, GDPR, HIPPA, PCI, and other regulatory standards.
Sensitive Data Discovery
Includes funcationality to automatically discover and classify sensitive and other defined data.
Structured and Unstructured Data
Can protect both structured and unstructured data using automated discovery tools.
Encryption
Includes encryption methods to protect data.
Persistent Protection
Protects data at rest, in transit, and in use.
Data Masking
Provides data masking functionality that hides specific data within a dataset based on the data's specific use policies.
Data Governance and Access Management
Provides policies and access controls to ensure the data is only handled by permisssioned users and processes.
Audit and Reporting
Includes audit and reporting functions to know exactly what actions have been taken on data, such as who has accessed it and when.
Analysis (3)
Cloud Gap Analytics
Analyzes data associated with denied entries and policy enforcement, giving information of better authentication and security protocols.
Compliance Monitoring
Monitors data quality and send alerts based on violations or misuse.
User Analytics
Allows for reporting and documentation of individual user behavior and privileges.
Usability (3)
Visualization
Offers tools to help administrators visualize the flow of data, whether that be processes or data flows.
AI Algorithyms
Offers machine learning to locate data security risks and make recommendations on how to mitigate those risks.
Cross-Platforms
Allows data to move across multiple platform types and remain protected.
Functionality (10)
Structure type
Searches structured, semi-structured, and unstructured data for sensitive data.
Contextual search
Offers contextual search functions to understand factors such as file type, sensitivity, user type, location, and other metadata.
Template algorithms
Has template rules and pattern matching algorithms (PII, PCI, PHI and more)
Custom algorithms
Offers the option to create custom templates and rules based on department, user type and data type.
False-positive management
Offers false-positive management functions
Multiple file and location types
Search multiple file types (images, PDFs, etc.) and repository locations (such as on-premise databases, cloud storage, email servers, websites, etc.)
Real-time monitoring
Monitors data stores in real-time searching for newly created sensitive data.
Dashboard
Offers a dashboard showing specific location of sensitive data.
Compliance
Facilitates compliance and enables adherence to common industry regulatory standards such as GDPR, CCPA, HIPAA, PCI DSS, ISO, and others.
Reporting
Offers reporting functionality.
Management (5)
Business Glossary
Lets users build a glossary of business terms, vocabulary and definitions across multiple tools.
Data Discovery
Provides a built-in integrated data catalog that allows users to easily locate data across multiple sources.
Data Profililng
Monitors and cleanses data with the help of business rules and analytical algorithms.
Reporting and Visualization
Visualize data flows and lineage that demonstrates compliance with reports and dashboards through a single console.
Data Lineage
Provides an automated data lineage functionality which provides visibility over the entire data movement journey from data origination to destination.
Security (3)
Access Control
Authenticates and authorizes individuals to access the data they are allowed to see and use.
Roles Management
Helps identify and manage the roles of owners and stewards of data.
Compliance Management
Helps adhere to data privacy regulations and norms.
Maintainence (2)
Data Quality Management
Defines, validates, and monitors business rules to safeguard master data readiness.
Policy Management
Allows users to create and review data policies to make them consistent across the organization.
Generative AI (2)
AI Text Generation
Allows users to generate text based on a text prompt.
AI Text Summarization
Condenses long documents or text into a brief summary.
Agentic AI - Sensitive Data Discovery (4)
Autonomous Task Execution
Capability to perform complex tasks without constant human input
Multi-step Planning
Ability to break down and plan multi-step processes
Cross-system Integration
Works across multiple software systems or databases
Proactive Assistance
Anticipates needs and offers suggestions without prompting
Agentic AI - Data Governance (6)
Autonomous Task Execution
Capability to perform complex tasks without constant human input
Multi-step Planning
Ability to break down and plan multi-step processes
Cross-system Integration
Works across multiple software systems or databases
Adaptive Learning
Improves performance based on feedback and experience
Natural Language Interaction
Engages in human-like conversation for task delegation
Decision Making
Makes informed choices based on available data and objectives



