Evaluate your SIEM
Get the guideCyral App for Sumo Logic
Get unified visibility into all activity in your data infrastructure
Get unified visibility into all activity in your data infrastructure
Retain immutable Cyral logs of all data activity in your environment with zero management overhead.
Identify abnormal user and application behavior across your data infrastructure.
Use pre-built, customizable Cyral dashboards to get immediate value out of your logs
View high level information regarding suspicious activity across your data infrastructure.
Identify suspicious activity against specific repositories
Identify the source IP or geographic location of suspicious activity
Identify accounts being targeted with suspicious activity
Monitor how users and groups are accessing data and the types of queries they are executing against the data.
Identify potential outliers in group trends across data types and methods accessed.
Baseline various aspects of queries such as execution time, number of bytes, and number of records.
Investigate policy violations and queries that do not have policies applied.
Identify policies that may no longer be in use
Identify queries that have no policy applied in order to build a policy to control access to data.
Identify users that have a high amount of policy violations.
Identify data types that have a high amount of policy violations to further refine policies or identify suspicious activity.
Identify potential outlier queries that have no policy applied.