Product Advantages

Guard sensitive and confidential information with DSC to reduce the risk of data loss and breaches

Product Advantages

Guard sensitive and confidential information with DSC to reduce the risk of data loss and breaches

  • Protect Your Customers and Your Brand

    Reduce the risk of damage to your brand due to harmful data loss and theft of valuable personal customer data, financial, or geolocation information.
    Reduce the risk of damage to your brand due to harmful data loss and theft of valuable personal customer data, financial, or geolocation information.
  • Better Compliance with Data Protection Regulations

    With complex data protection laws being introduced and enforced around the world, DSC adds another tool for enterprises to remain in compliance.
    With complex data protection laws being introduced and enforced around the world, DSC adds another tool for enterprises to remain in compliance.
  • Intelligent and Automated

    Using smart algorithms, preset rules, and configurable filters, quickly identify and automatically classify sensitive data that needs to be guarded.
    Using smart algorithms, preset rules, and configurable filters, quickly identify and automatically classify sensitive data that needs to be guarded.
  • Non-destructive Data Masking and Watermarking

    DSC only masks data and watermarks files if they are identified and then accessed, exported or moved out from the original data source. It does not save a copy or change the original data asset.
    DSC only masks data and watermarks files if they are identified and then accessed, exported or moved out from the original data source. It does not save a copy or change the original data asset.

Application Scenarios

DSC helps achieve strategic information security goals

  • Manage Data Security Lifecycles

  • Automatically Classify Data

  • Identify Data Security Risks

  • Exchange Data Securely

Manage Data Security Lifecycles

Better Management of Data Security

DSC provides sensitive data discovery, classification, and protection, during all phases of data lifecycle management.

Advantages

Insightful Data Security

DSC gives real-time insights into risks at every stage of data usage.

Drill-down Risk Analysis

Drill down to any risk level for a more fine-grained view of the sensitive data involved and then apply masking rules to protect it.

Transparent and Trustworthy Data Management

DSC offers a wealth of functions to ensure accountable data management. For example, DSC can safely and permanently delete user data upon verified requests from end users.

Automatically Classify Data

Smart Data Classification

DSC can automatically identify sensitive data from both structured data in RDS and unstructured data in OBS, and classify the data as high-risk, medium-risk, low-risk, or no-risk.

Advantages

Advanced File Comparison

File comparison based on data fingerprinting can find minor file changes three times faster than data matching based on character strings or hash values.

Automatic Detection of Assets

DSC automatically detects databases that are not frequently accessed based on the characteristics of the running processes.

Identify Data Security Risks

Track and Manage User Risks

DSC correlates operations with users to help identify any risky operations. DSC can also detect data leaks and generate an alarm so administrators can immediately take protective action.

Advantages

Real-Time User Behavior Analysis

DSC establishes a user behavior library. Any behavior not found in the library is deemed abnormal and an alarm will be generated immediately.

Visualized User Behaviors

DSC monitors and displays user behaviors to identify possible data leaks as soon as possible.

Risk Source Tracking

With correlation analysis, DSC helps to quickly identify users who have performed risky operations.

Exchange Data Securely

Safer Data Exchange

DSC uses data masking and watermarking to ensure the data security of integrations and legitimate data sharing.

Advantages

Data Leak Prevention

Mask sensitive data or high-risk data in DSC to prevent accidental or deliberate data leaks.

Copyright Protection

Add watermarks to add an imprint to files, and prove the rightful ownership of valuable data assets.

Data Leak Tracing

Use custom watermarks to trace data leaks back to specific individuals.

Functions

Intelligent data security protection features across two editions: Standard and Professional

Functions

Intelligent data security protection features across two editions: Standard and Professional

  • Actionable Data Security Insights

    DSC displays high, medium, and low risks for data collection, transmission, storage, exchange, usage and deletion. Quickly locate risks and take immediate action to ensure data security.
    DSC displays high, medium, and low risks for data collection, transmission, storage, exchange, usage and deletion. Quickly locate risks and take immediate action to ensure data security.
  • Connect to a Wide Range of Data Sources

    DSC handles both structured and unstructured data from a wide range of sources, such as relational databases in Relational Database Service (RDS), images and files in Object Storage Service (OBS), and other big data sources.
    DSC handles both structured and unstructured data from a wide range of sources, such as relational databases in Relational Database Service (RDS), images and files in Object Storage Service (OBS), and other big data sources.
  • Smart Identification of Sensitive Data

    DSC accurately identifies sensitive data in sources based on Natural Language Processing and Optical Character Recognition.
    DSC accurately identifies sensitive data in sources based on Natural Language Processing and Optical Character Recognition.
  • Flexible Data Masking

    DSC leverages preset and user-defined masking algorithms to limit exposure of sensitive data, restricting unauthorized access to sensitive data.
    DSC leverages preset and user-defined masking algorithms to limit exposure of sensitive data, restricting unauthorized access to sensitive data.

Documentation

Learn more about Data Security Center

Documentation

Learn more about Data Security Center

Register with HUAWEI CLOUD to get free services

Register Now