This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.
Mantra is a passive, network-based appliance that provides real-time analytics to do things including detect patterns in user activity that signal malicious activity.
Tizor, Maynard, MA, recently unveiled its Mantra activity-auditing appliance for policy-driven, real-time insight into mission critical applications and data in multi-vendor environments.
Supporting Oracle, Sybase, SQL Server and Windows File Servers, Mantra is managed centrally from the Tizor Management Console via a web-based interface and monitors what individual users are doing with mission critical applications and data.
Mantra is a passive, network-based appliance offering real-time analytics capabilities such as behavioral fingerprinting, which detects patterns in user activity that signal malicious activity, including information theft. It allows enterprises to check their compliance posture at any moment and receive alerts of noncompliance risks as they happen, according to Tizor.
The device comes with Mantra Compliance Policy Templates for key regulations including Sarbanes-Oxley, The Payment Card Industry Data Security Standard, CA 1386/1950 and HIPAA. English-like policy language allows for the easy creation of custom policies, the company said.
The web-based Tizor Management Center console enables provisioning, policy management, audit reporting, analytics and data management archiving.
"Activity Auditing is the only solution that can connect user activity to the integrity and security of data," said Tizor CEO and founder Prat Moghe, in a prepared statement. "With the ability to monitor a multi-vendor data center environment in real-time, Mantra fills an unmet need to provide the functionality and performance enterprises need to comply with regulatory mandates, reduce the risk of large volume information theft and better manage business processes."
We welcome your comments on this topic on our social media channels, or [contact us directly] with questions about the site.
The State of IT & Cybersecurity Operations 2020Download this report from InformationWeek, in partnership with Dark Reading, to learn more about how today's IT operations teams work with cybersecurity operations, what technologies they are using, and how they communicate and share responsibility--or create risk by failing to do so. Get it now!