Overview
DataSunrise Security secures databases and data in real-time. DataSunrise includes Database Activity Monitoring (DAM), Dynamic Data Masking, Static Data Masking, Sensitive Data Discovery, Compliance Automation and Vulnerability Assessment. DataSunrise secures all major SQL and NoSQL databases, data-warehouses and data lakes on AWS: all RDS database engines(PostgreSQL, MySQL, MariaDB, Oracle, MSSQL), Amazon Aurora, DynamoDB, Redshift, Athena, Elasticsearch, S3. DataSunrise secures other databases such as SAP HANA,Oracle, Cassandra, Impala, Heroku, DB2, Greenplum, MongoDB, Netezza, Hive, Vertica. DataSunrise enables PII and PHI data protection, auditing, discovery, compliance with privacy law,SOX, HIPAA, ISO27001, PCI or GDPR. DataSunrise gives customers full and granular control over security of sensitive data, access to data and databases and automated compliance policies. DataSunrise empowers organizations when moving their databases workload to db managed services, preserves same level of data security and data auditing. DataSunrise High-Availability, Autoscaling and Failover for AWS, all available DataSunrise instances monitored and configured from a single console. Authentication proxy, Active Directory and LDAP support. Integration with CloudWatch and IAM and SIEM.
Highlights
- Why Take Chances with Database Security. Ultimate Database Security isn't optional
- Secure and mask data, and control of all activity and DAM in RDS, Redshift or other databases
Details
Unlock automation with AI agent solutions

Features and programs
Financing for AWS Marketplace purchases
Pricing
Dimension | Description | Cost/unit |
---|---|---|
Protected database instances per hour | - | $1.40 |
Vendor refund policy
30 days trial
How can we make this page better?
Legal
Vendor terms and conditions
Content disclaimer
Delivery details
Product deployment
- Amazon ECS
Container image
Containers are lightweight, portable execution environments that wrap server application software in a filesystem that includes everything it needs to run. Container applications run on supported container runtimes and orchestration services, such as Amazon Elastic Container Service (Amazon ECS) or Amazon Elastic Kubernetes Service (Amazon EKS). Both eliminate the need for you to install and operate your own container orchestration software by managing and scheduling containers on a scalable cluster of virtual machines.
Version release notes
Additional details
Usage instructions
Use your web browser to access the DataSunrise GUI at:
https://<LoadBalancerDNS>:11000
Replace <LoadBalancerDNS> with the value shown in the Outputs tab of your CloudFormation stack.
Username: admin
Password: The value of the AdminPassword parameter used during stack creation
Notes:
- The Web Console may take 5 to 10 minutes to become available after the stack is created.
- Make sure TCP port 11000 is open in your Security Group.
- Confirm that your IP address is allowed in the UserLocationCIDR parameter.
TLS Certificate Requirement: This product requires a valid TLS certificate issued by AWS Certificate Manager (ACM) in the same AWS region where the CloudFormation stack is deployed.
You must request or import a public certificate via ACM, validate domain ownership, and provide its ARN as the value of the Certificate parameter during stack creation.
For detailed instructions, see: https://docs.aws.amazon.com/acm/latest/userguide/acm-public-certificates.html