Listing Thumbnail

    DataSunrise Database and Data Security w/ Hourly Billing

     Info
    Deployed on AWS
    DataSunrise Database & Data Security, Data Masking and Compliance
    4.3

    Overview

    DataSunrise Security secures databases and data in real-time. DataSunrise includes Database Activity Monitoring (DAM), Dynamic Data Masking, Static Data Masking, Sensitive Data Discovery, Compliance Automation and Vulnerability Assessment. DataSunrise secures all major SQL and NoSQL databases, data-warehouses and data lakes on AWS: all RDS database engines(PostgreSQL, MySQL, MariaDB, Oracle, MSSQL), Amazon Aurora, DynamoDB, Redshift, Athena, Elasticsearch, S3. DataSunrise secures other databases such as SAP HANA,Oracle, Cassandra, Impala, Heroku, DB2, Greenplum, MongoDB, Netezza, Hive, Vertica. DataSunrise enables PII and PHI data protection, auditing, discovery, compliance with privacy law,SOX, HIPAA, ISO27001, PCI or GDPR. DataSunrise gives customers full and granular control over security of sensitive data, access to data and databases and automated compliance policies. DataSunrise empowers organizations when moving their databases workload to db managed services, preserves same level of data security and data auditing. DataSunrise High-Availability, Autoscaling and Failover for AWS, all available DataSunrise instances monitored and configured from a single console. Authentication proxy, Active Directory and LDAP support. Integration with CloudWatch and IAM and SIEM.

    Highlights

    • Why Take Chances with Database Security. Ultimate Database Security isn't optional
    • Secure and mask data, and control of all activity and DAM in RDS, Redshift or other databases

    Details

    Delivery method

    Delivery option
    64-bit (x86) Amazon Machine Image (AMI)

    Latest version

    Operating system
    AmazonLinux 3.9.20251027

    Deployed on AWS
    New

    Introducing multi-product solutions

    You can now purchase comprehensive solutions tailored to use cases and industries.

    Multi-product solutions

    Features and programs

    Financing for AWS Marketplace purchases

    AWS Marketplace now accepts line of credit payments through the PNC Vendor Finance program. This program is available to select AWS customers in the US, excluding NV, NC, ND, TN, & VT.
    Financing for AWS Marketplace purchases

    Pricing

    DataSunrise Database and Data Security w/ Hourly Billing

     Info
    Pricing is based on actual usage, with charges varying according to how much you consume. Subscriptions have no end date and may be canceled any time.
    Additional AWS infrastructure costs may apply. Use the AWS Pricing Calculator  to estimate your infrastructure costs.

    Usage costs (1)

     Info
    Dimension
    Cost/unit
    Protected database instances per hour
    $1.40

    Vendor refund policy

    30 days trial

    How can we make this page better?

    We'd like to hear your feedback and ideas on how to improve this page.
    We'd like to hear your feedback and ideas on how to improve this page.

    Legal

    Vendor terms and conditions

    Upon subscribing to this product, you must acknowledge and agree to the terms and conditions outlined in the vendor's End User License Agreement (EULA) .

    Content disclaimer

    Vendors are responsible for their product descriptions and other product content. AWS does not warrant that vendors' product descriptions or other product content are accurate, complete, reliable, current, or error-free.

    Usage information

     Info

    Delivery details

    64-bit (x86) Amazon Machine Image (AMI)

    Amazon Machine Image (AMI)

    An AMI is a virtual image that provides the information required to launch an instance. Amazon EC2 (Elastic Compute Cloud) instances are virtual servers on which you can run your applications and workloads, offering varying combinations of CPU, memory, storage, and networking resources. You can launch as many instances from as many different AMIs as you need.

    Additional details

    Usage instructions

    Use your web browser to access DataSunrise GUI at https://instance_dns:11000 Use login 'admin' and 'DS-"EC2_instance_ID"' as password To connect to the operating system, use ssh client and username "ec2-user" (https://docs.aws.amazon.com/en_us/AWSEC2/latest/UserGuide/AccessingInstancesLinux.html ). Refer to DataSunrise User Guide for more options : https://www.datasunrise.com/files/DataSunriseDatabaseSecuritySuiteUserGuide.pdf 

    Support

    Vendor support

    Customer Service and Technical Support: support@datasunrise.com  Phone: +1(206) 420-6611. See our Support page for detailed information (https://www.datasunrise.com/support/ ) https://www.datasunrise.com/support/ 

    AWS infrastructure support

    AWS Support is a one-on-one, fast-response support channel that is staffed 24x7x365 with experienced and technical support engineers. The service helps customers of all sizes and technical abilities to successfully utilize the products and features provided by Amazon Web Services.

    Product comparison

     Info
    Updated weekly
    By DataSunrise Database and Data Security
    By Datasparc

    Accolades

     Info
    Top
    10
    In Masking/Tokenization
    Top
    25
    In Data Analysis
    Top
    10
    In Data Security and Governance

    Customer reviews

     Info
    Sentiment is AI generated from actual customer reviews on AWS and G2
    Reviews
    Functionality
    Ease of use
    Customer service
    Cost effectiveness
    14 reviews
    Insufficient data
    Insufficient data
    16 reviews
    Insufficient data
    Insufficient data
    Positive reviews
    Mixed reviews
    Negative reviews

    Overview

     Info
    AI generated from product descriptions
    Database Activity Monitoring
    Real-time monitoring and auditing of database activities across SQL and NoSQL databases including RDS, Aurora, DynamoDB, Redshift, Athena, Elasticsearch, and S3
    Dynamic and Static Data Masking
    Capability to apply both dynamic data masking for real-time protection and static data masking for sensitive data across databases and data warehouses
    Sensitive Data Discovery and Classification
    Automated discovery and identification of personally identifiable information (PII) and protected health information (PHI) within databases and data lakes
    Compliance Automation
    Automated compliance enforcement and policy management for regulatory standards including SOX, HIPAA, ISO27001, PCI DSS, and GDPR
    High Availability and Failover with Centralized Management
    High-availability architecture with autoscaling, failover capabilities for AWS environments, and centralized configuration management across all instances from a single console
    Fine-Grained Data Access Control
    Dynamic, fine-grained access control on AWS services including Amazon Redshift, Amazon S3, Amazon SageMaker, and Amazon EMR using de-identification, hashing, masking, and privacy enhancing technologies (PETs).
    Sensitive Data Discovery and Classification
    Automated sensitive data discovery capabilities to tag and classify sensitive data in AWS with highly accurate metadata generation for data security purposes.
    Policy Management and Enforcement
    Write data security policies once in plain language or as-code and enforce them consistently across multiple AWS data sources without copying or moving data.
    Attribute-Based Access Control
    Attribute-based access control (ABAC) implementation to simplify and streamline data security policy management across connected data sources.
    Data Activity Monitoring
    Real-time continuous monitoring of data and user query behavior to track activity, identify risky patterns, and enable proactive policy updates.
    Zero-Trust Database Access Control
    Enforces least privilege principle to restrict database access to only authorized users and applications, minimizing data breach risk across SQL, NoSQL, and cloud platforms.
    Dynamic Data Masking
    Applies dynamic data masking capabilities to protect sensitive data by obscuring or redacting information based on user permissions and access policies.
    Comprehensive Audit Logging
    Provides centralized auditing and logging of user activities with detailed insights and tracking of all database access and operations for compliance and security monitoring.
    Unified Web-Based IDE
    Offers a browser-based integrated development environment for accessing, querying, and managing multiple database types including Oracle, AWS RDS, Snowflake, and Redshift from a single interface.
    Multi-Platform Deployment Options
    Supports flexible deployment across EC2, Docker, Kubernetes, and AWS Fargate with integration capabilities for SAML, LDAP, SSO, API, and secret password vault systems.

    Contract

     Info
    Standard contract
    No
    No
    No

    Customer reviews

    Ratings and reviews

     Info
    4.3
    15 ratings
    5 star
    4 star
    3 star
    2 star
    1 star
    60%
    27%
    13%
    0%
    0%
    0 AWS reviews
    |
    15 external reviews
    External reviews are from G2  and PeerSpot .
    Alison C.

    My experience with DataSunrise platform

    Reviewed on Jul 23, 2025
    Review provided by G2
    What do you like best about the product?
    Setting up DataSunrise the very first time for our client was honestly a little intimidating. The dashboard had way more knobs and buttons than I expected. But after some trial, communication with tech support, and late-night caffeine, things started to make sense. The real breakthrough came when we set up dynamic data masking. Watching sensitive numbers instantly transform into scrambled data—unless the right person logged in—was a bit of a “wow” moment.
    What do you dislike about the product?
    Nothing’s perfect. Even though DataSunrise is flexible, it took patience to figure out the best way to set up role-based masking. Imho the User Guide was decent, but sometimes when we hit cryptic error messages, it felt like we were playing detective. However their support was available 24/7 , and helped a lot.
    What problems is the product solving and how is that benefiting you?
    I see that it solves the problem of unauthorized access and data leakage by providing a granular, real-time database Firewall.
    Miguel S.

    Excellent tool to protect and monitor your Databases

    Reviewed on May 29, 2025
    Review provided by G2
    What do you like best about the product?
    It is an excellent database security and monitoring tool that unifies features such as firewall, auditing, vulnerability scanning, and data masking.
    What do you dislike about the product?
    It requires a lot of knowledge of how to use the tool due to the large number of features and options it has that allow you to create very specific rules.
    What problems is the product solving and how is that benefiting you?
    It has allowed us to limit the access and actions that can be executed in the databases, in addition to monitoring the security events that occur in them, allowing us to receive alerts and take action in the event of any anomaly or cybersecurity incident that may arise.
    Erick W.

    I tried it and it works better than I thought.

    Reviewed on May 27, 2025
    Review provided by G2
    What do you like best about the product?
    It is easy to install or implement, its configuration is very intuitive, easy to use, its support is efficient and responds quickly. Something interesting is its integration.
    What do you dislike about the product?
    They should update the manuals and guides, but it is compensated by the support.
    What problems is the product solving and how is that benefiting you?
    Comply with banking security standards, control user access by groups and schedules, audits, all without touching the database or the need to add anything to the DB.
    reviewer2335380

    Useful for monitoring database activities but improvement is needed in distributor networks

    Reviewed on Feb 23, 2024
    Review provided by PeerSpot

    What is our primary use case?

    Most of our users, including customers, use it primarily as a Database Activity Monitor. They utilize it to track who is logging into which database and monitor their activities. This includes tasks such as restricting certain SQL commands and understanding environmental limits related to database access.

    What is most valuable?

    We have a law in Turkey similar to the GDPR in the European Union. It's almost like a replica. Complying with this law is crucial, and the service plays a significant role. Many customer inquiries revolve around not retaining their data. The service addresses this by providing functionality for masking data within the databases. So, if a user requests data deletion, we can remove any information we have on them within the database, ensuring compliance with the law.

    The discovery and masking features, encompassing both static and dynamic database masking, are incredibly useful for ensuring compliance. Most of the time, not everyone accessing the database is a developer or a database admin. Developers might need to see everything, but database admins, even though they manage the database, don't necessarily need to see all the data, especially customer data. So, using masking for database admins and not displaying data in clear text is quite helpful for compliance.

    What needs improvement?

    I believe there's room for improvement in their distributor network, especially in Turkey. This is why I was exploring alternatives to DataSunrise Database Security. However, the product itself is quite good. One suggestion for enhancement could be adding an encryption module on top of the masking features, perhaps a more permanent form of preservative encryption.

    It functions as a proxy for database access. However, this could be an area for improvement. Currently, it doesn't use agents to integrate with databases; instead, all database instances must connect through DataSunrise Database Security as a proxy. While this setup is mostly done on our Windows server, using an agent approach might sometimes be more convenient for companies compared to a proxy approach.

    What do I think about the stability of the solution?

    I rate the tool's stability a ten out of ten. I haven't encountered any issues.

    What do I think about the scalability of the solution?

    I rate the tool's scalability an eight out of ten. I find it quite agile, and it can scale up. However, the agentless and proxy approach does pose limitations on scalability. Adapting existing infrastructure to work with the proxy setup requires modifications. The largest implementation we've done involved around 150 database admins, developers, and similar roles.

    How are customer service and support?

    The distributor network in Turkey handles the support, and unfortunately, we are quite dissatisfied with them. While I believe the support team from DataSunrise Database Security itself is likely good, we don't have direct contact with them, making it challenging for me to provide an accurate judgment. However, based on our experience with the distributor, I would rate it a minus one.

    How was the initial setup?

    The tool's deployment is easy. The deployment duration depends on the size of the infrastructure we're dealing with. For a smaller setup with just a couple of database instances, it usually takes about a week at most, perhaps even a couple of days depending on the specific requirements and the process of setting up the service.

    What's my experience with pricing, setup cost, and licensing?

    The product is expensive.

    What other advice do I have?

    I rate the solution an eight out of ten.

    Financial Services

    Perfect security for database

    Reviewed on Aug 25, 2022
    Review provided by G2
    What do you like best about the product?
    It's data masking solution is the best and very helpful
    What do you dislike about the product?
    I believe there could be more solutions which would make it more helpful
    What problems is the product solving and how is that benefiting you?
    It helps in keeping our database secure and there is minimal risk with this software
    View all reviews