Listing Thumbnail

    DataSunrise Database and Data Security w/ Hourly Billing

     Info
    Deployed on AWS
    DataSunrise Database & Data Security, Data Masking and Compliance

    Overview

    DataSunrise Security secures databases and data in real-time. DataSunrise includes Database Activity Monitoring (DAM), Dynamic Data Masking, Static Data Masking, Sensitive Data Discovery, Compliance Automation and Vulnerability Assessment. DataSunrise secures all major SQL and NoSQL databases, data-warehouses and data lakes on AWS: all RDS database engines(PostgreSQL, MySQL, MariaDB, Oracle, MSSQL), Amazon Aurora, DynamoDB, Redshift, Athena, Elasticsearch, S3. DataSunrise secures other databases such as SAP HANA,Oracle, Cassandra, Impala, Heroku, DB2, Greenplum, MongoDB, Netezza, Hive, Vertica. DataSunrise enables PII and PHI data protection, auditing, discovery, compliance with privacy law,SOX, HIPAA, ISO27001, PCI or GDPR. DataSunrise gives customers full and granular control over security of sensitive data, access to data and databases and automated compliance policies. DataSunrise empowers organizations when moving their databases workload to db managed services, preserves same level of data security and data auditing. DataSunrise High-Availability, Autoscaling and Failover for AWS, all available DataSunrise instances monitored and configured from a single console. Authentication proxy, Active Directory and LDAP support. Integration with CloudWatch and IAM and SIEM.

    Highlights

    • Why Take Chances with Database Security. Ultimate Database Security isn't optional
    • Secure and mask data, and control of all activity and DAM in RDS, Redshift or other databases

    Details

    Delivery method

    Delivery option
    64-bit (x86) Amazon Machine Image (AMI)

    Latest version

    Operating system
    AmazonLinux 2023.4.20240513.1

    Deployed on AWS

    Unlock automation with AI agent solutions

    Fast-track AI initiatives with agents, tools, and solutions from AWS Partners.
    AI Agents

    Features and programs

    Financing for AWS Marketplace purchases

    AWS Marketplace now accepts line of credit payments through the PNC Vendor Finance program. This program is available to select AWS customers in the US, excluding NV, NC, ND, TN, & VT.
    Financing for AWS Marketplace purchases

    Pricing

    DataSunrise Database and Data Security w/ Hourly Billing

     Info
    Pricing is based on actual usage, with charges varying according to how much you consume. Subscriptions have no end date and may be canceled any time.
    Additional AWS infrastructure costs may apply. Use the AWS Pricing Calculator  to estimate your infrastructure costs.

    Usage costs (1)

     Info
    Dimension
    Cost/unit
    Protected database instances per hour
    $1.40

    Vendor refund policy

    30 days trial

    How can we make this page better?

    We'd like to hear your feedback and ideas on how to improve this page.
    We'd like to hear your feedback and ideas on how to improve this page.

    Legal

    Vendor terms and conditions

    Upon subscribing to this product, you must acknowledge and agree to the terms and conditions outlined in the vendor's End User License Agreement (EULA) .

    Content disclaimer

    Vendors are responsible for their product descriptions and other product content. AWS does not warrant that vendors' product descriptions or other product content are accurate, complete, reliable, current, or error-free.

    Usage information

     Info

    Delivery details

    64-bit (x86) Amazon Machine Image (AMI)

    Amazon Machine Image (AMI)

    An AMI is a virtual image that provides the information required to launch an instance. Amazon EC2 (Elastic Compute Cloud) instances are virtual servers on which you can run your applications and workloads, offering varying combinations of CPU, memory, storage, and networking resources. You can launch as many instances from as many different AMIs as you need.

    Additional details

    Usage instructions

    Use your web browser to access DataSunrise GUI at https://instance_dns:11000 Use login 'admin' and 'DS-"EC2_instance_ID"' as password To connect to the operating system, use ssh client and username "ec2-user" (https://docs.aws.amazon.com/en_us/AWSEC2/latest/UserGuide/AccessingInstancesLinux.html ). Refer to DataSunrise User Guide for more options : https://www.datasunrise.com/files/DataSunriseDatabaseSecuritySuiteUserGuide.pdf 

    Support

    Vendor support

    Customer Service and Technical Support: support@datasunrise.com  Phone: +1(206) 420-6611. See our Support page for detailed information (https://www.datasunrise.com/support/ ) https://www.datasunrise.com/support/ 

    AWS infrastructure support

    AWS Support is a one-on-one, fast-response support channel that is staffed 24x7x365 with experienced and technical support engineers. The service helps customers of all sizes and technical abilities to successfully utilize the products and features provided by Amazon Web Services.

    Product comparison

     Info
    Updated weekly
    By DataSunrise Database and Data Security
    By Datasparc

    Accolades

     Info
    Top
    10
    In Masking/Tokenization
    Top
    25
    In Data Analysis
    Top
    10
    In Data Security and Governance

    Customer reviews

     Info
    Sentiment is AI generated from actual customer reviews on AWS and G2
    Reviews
    Functionality
    Ease of use
    Customer service
    Cost effectiveness
    13 reviews
    Insufficient data
    Insufficient data
    15 reviews
    Insufficient data
    Insufficient data
    Positive reviews
    Mixed reviews
    Negative reviews

    Overview

     Info
    AI generated from product descriptions
    Database Activity Monitoring
    Real-time monitoring and tracking of database activities across multiple SQL and NoSQL database platforms
    Data Masking Capabilities
    Dynamic and static data masking techniques for protecting sensitive information and personally identifiable data
    Compliance Automation
    Automated compliance support for multiple regulatory standards including SOX, HIPAA, ISO27001, PCI, and GDPR
    Multi-Database Security
    Comprehensive security coverage for major database platforms including RDS, Aurora, DynamoDB, Redshift, Athena, and various enterprise databases
    Authentication and Access Control
    Advanced authentication proxy with Active Directory and LDAP integration, providing granular access control and security management
    Data Access Control
    Dynamically enforces fine-grained data access control on AWS services using advanced privacy enhancing technologies
    Policy Management
    Enables writing data security policies in plain language or as-code, enforcing them consistently across multiple data sources
    Sensitive Data Discovery
    Provides capabilities to tag and classify sensitive data, creating accurate metadata for data security purposes
    User Activity Monitoring
    Continuously tracks user query behavior in real-time, providing insights into potential risky data access activities
    Attribute-Based Access Control
    Implements attribute-based access control (ABAC) mechanism to simplify and enhance data security policy management
    Access Control
    Granular access control with least privilege principle for minimizing data breach risks
    Data Masking
    Dynamic data masking capabilities for protecting sensitive information across different database platforms
    Multi-Platform Support
    Comprehensive database access support for SQL, NoSQL, and cloud database platforms including Oracle, AWS RDS, and Snowflake
    Authentication Integration
    Seamless integration with multiple authentication protocols including SAML, LDAP, SSO, and Secret Passwords Vault
    Deployment Flexibility
    Supports multiple deployment options including EC2, Docker, Kubernetes, and AWS Fargate containerization platforms

    Contract

     Info
    Standard contract
    No
    No
    No

    Customer reviews

    Ratings and reviews

     Info
    0 ratings
    5 star
    4 star
    3 star
    2 star
    1 star
    0%
    0%
    0%
    0%
    0%
    0 AWS reviews
    |
    14 external reviews
    Star ratings include only reviews from verified AWS customers. External reviews can also include a star rating, but star ratings from external reviews are not averaged in with the AWS customer star ratings.
    Miguel S.

    Excellent tool to protect and monitor your Databases

    Reviewed on May 29, 2025
    Review provided by G2
    What do you like best about the product?
    It is an excellent database security and monitoring tool that unifies features such as firewall, auditing, vulnerability scanning, and data masking.
    What do you dislike about the product?
    It requires a lot of knowledge of how to use the tool due to the large number of features and options it has that allow you to create very specific rules.
    What problems is the product solving and how is that benefiting you?
    It has allowed us to limit the access and actions that can be executed in the databases, in addition to monitoring the security events that occur in them, allowing us to receive alerts and take action in the event of any anomaly or cybersecurity incident that may arise.
    Erick W.

    I tried it and it works better than I thought.

    Reviewed on May 27, 2025
    Review provided by G2
    What do you like best about the product?
    It is easy to install or implement, its configuration is very intuitive, easy to use, its support is efficient and responds quickly. Something interesting is its integration.
    What do you dislike about the product?
    They should update the manuals and guides, but it is compensated by the support.
    What problems is the product solving and how is that benefiting you?
    Comply with banking security regulations, control user access by groups and schedules, audits, all without touching the database or the need to add anything to the DB.
    reviewer2335380

    Useful for monitoring database activities but improvement is needed in distributor networks

    Reviewed on Feb 23, 2024
    Review provided by PeerSpot

    What is our primary use case?

    Most of our users, including customers, use it primarily as a Database Activity Monitor. They utilize it to track who is logging into which database and monitor their activities. This includes tasks such as restricting certain SQL commands and understanding environmental limits related to database access.

    What is most valuable?

    We have a law in Turkey similar to the GDPR in the European Union. It's almost like a replica. Complying with this law is crucial, and the service plays a significant role. Many customer inquiries revolve around not retaining their data. The service addresses this by providing functionality for masking data within the databases. So, if a user requests data deletion, we can remove any information we have on them within the database, ensuring compliance with the law.

    The discovery and masking features, encompassing both static and dynamic database masking, are incredibly useful for ensuring compliance. Most of the time, not everyone accessing the database is a developer or a database admin. Developers might need to see everything, but database admins, even though they manage the database, don't necessarily need to see all the data, especially customer data. So, using masking for database admins and not displaying data in clear text is quite helpful for compliance.

    What needs improvement?

    I believe there's room for improvement in their distributor network, especially in Turkey. This is why I was exploring alternatives to DataSunrise Database Security. However, the product itself is quite good. One suggestion for enhancement could be adding an encryption module on top of the masking features, perhaps a more permanent form of preservative encryption.

    It functions as a proxy for database access. However, this could be an area for improvement. Currently, it doesn't use agents to integrate with databases; instead, all database instances must connect through DataSunrise Database Security as a proxy. While this setup is mostly done on our Windows server, using an agent approach might sometimes be more convenient for companies compared to a proxy approach.

    What do I think about the stability of the solution?

    I rate the tool's stability a ten out of ten. I haven't encountered any issues. 

    What do I think about the scalability of the solution?

    I rate the tool's scalability an eight out of ten. I find it quite agile, and it can scale up. However, the agentless and proxy approach does pose limitations on scalability. Adapting existing infrastructure to work with the proxy setup requires modifications. The largest implementation we've done involved around 150 database admins, developers, and similar roles.

    How are customer service and support?

    The distributor network in Turkey handles the support, and unfortunately, we are quite dissatisfied with them. While I believe the support team from DataSunrise Database Security itself is likely good, we don't have direct contact with them, making it challenging for me to provide an accurate judgment. However, based on our experience with the distributor, I would rate it a minus one.

    How was the initial setup?

    The tool's deployment is easy. The deployment duration depends on the size of the infrastructure we're dealing with. For a smaller setup with just a couple of database instances, it usually takes about a week at most, perhaps even a couple of days depending on the specific requirements and the process of setting up the service.

    What's my experience with pricing, setup cost, and licensing?

    The product is expensive. 

    What other advice do I have?

    I rate the solution an eight out of ten. 

    Financial Services

    Perfect security for database

    Reviewed on Aug 25, 2022
    Review provided by G2
    What do you like best about the product?
    It's data masking solution is the best and very helpful
    What do you dislike about the product?
    I believe there could be more solutions which would make it more helpful
    What problems is the product solving and how is that benefiting you?
    It helps in keeping our database secure and there is minimal risk with this software
    Yugal G.

    Good and convenient Data Masking tool

    Reviewed on Aug 24, 2022
    Review provided by G2
    What do you like best about the product?
    This tool has acted as guard to protect sensitive data to avoid exposure to the outside world. The platform masks sensitive data with encryption code which makes it very secure and makes the supply of data intact. This process is done on a real-time basis and keeps on changing the encryption.
    What do you dislike about the product?
    There are multiple options but the production team can add vulnerability options also so that the overall protection can be improved. Also the user interface can be improved so that the user does not feels bored while working on this.
    What problems is the product solving and how is that benefiting you?
    It has helped to secure our database which was quite exposed to the outside world earlier. We had several cyber attacks as well earlier but after we have started using this there is not a single instance of a data breach.
    View all reviews