• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
self service tool claims to execute cloud based data access in five

Self-service tool claims to execute cloud-based data access in five minutes

You are here: Home / General Cyber Security News / Self-service tool claims to execute cloud-based data access in five minutes
June 3, 2021

DevSecOps corporation Satori on Thursday declared a self-service data obtain ability that it claims cuts down cloud-centered data obtain from a manual, a few-7 days procedure. (“Cloud computing” by Damien Pollet is certified below CC BY-SA 2.)

DevSecOps business Satori on Thursday introduced a self-support knowledge access capacity that it states cuts down cloud-primarily based data access from a handbook, a few-week approach that needs databases directors to a 5-moment endeavor that any business enterprise person can do.p[

Today, enterprise data access requires workers and managers who need data to create an IT work-order and wait for busy database administrators and engineers, explained Eldad Chai, co-founder and CEO of Satori. Chai said data access takes a long time because it requires code and ad-hoc configurations, such as database views, complex user and role permissions, and various infrastructure changes.

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


“The entire process is lengthy, manual, risky and difficult to manage,” said Chai. “Today, people go server by server, database by database and table by table to configure database access. Our service automates it and takes the human element out of the process.”

With the new self-service data access from Satori, Chai said database administrators can implement self-service data access workflows that define which users can access which datasets and put data access control in the hands of data stewards (business users) who control data access through a user interface and notifications-based workflows. He added that administrators can implement these changes without changing existing infrastructure or authentication schemes.

Chai added that people should think of the service as “zero trust” for database access, where access and authentication are done automatically versus having to do it manually.


Some sections of this write-up are sourced from:
www.scmagazine.com

Previous Post: «‘battle for the galaxy’ mobile game leaks 6m gamer profiles ‘Battle for the Galaxy’ Mobile Game Leaks 6M Gamer Profiles
Next Post: Supreme Court narrows interpretation of CFAA, to the relief of ethical hackers supreme court narrows interpretation of cfaa, to the relief of»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Zero-Click Agentic Browser Attack Can Delete Entire Google Drive Using Crafted Emails
  • Critical XXE Bug CVE-2025-66516 (CVSS 10.0) Hits Apache Tika, Requires Urgent Patch
  • Chinese Hackers Have Started Exploiting the Newly Disclosed React2Shell Vulnerability
  • Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery
  • “Getting to Yes”: An Anti-Sales Guide for MSPs
  • CISA Reports PRC Hackers Using BRICKSTORM for Long-Term Access in U.S. Systems
  • JPCERT Confirms Active Command Injection Attacks on Array AG Gateways
  • Silver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in China
  • ThreatsDay Bulletin: Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts— and 15 More Stories
  • 5 Threats That Reshaped Web Security This Year [2025]

Copyright © TheCyberSecurity.News, All Rights Reserved.