Listing Thumbnail

    The Platform

     Info
    Deployed on AWS
    Walacor's secure data platform that guarantees data Integrity and sovereignty through detectable immutability, unique encryption keys, and chain of custody.
    5

    Overview

    Walacor increases data protection, reduces internal fraud, and enables frictionless sharing inside and outside organizations. Built to handle all data types for any industry on cloud, on-premise, or hybrid, creating trusted data with increased security and performance. The Platform can help you secure data growth while reducing costs and increasing trust, resiliency, and security.

    Highlights

    • Establish continuous protection of sensitive data through detectable persistence, equipped with the ability to detect data compromise and maintain data integrity.
    • Ensure an accurate and trustworthy information flow, enabling security teams to detect and correct errors in real time while preventing fraudulent activity.
    • Next-generation secure database leverages industry standard APIs and protocols for immediate usability

    Details

    Delivery method

    Delivery option
    64-bit (x86) Amazon Machine Image (AMI)

    Latest version

    Operating system
    Ubuntu 24.04

    Deployed on AWS
    New

    Introducing multi-product solutions

    You can now purchase comprehensive solutions tailored to use cases and industries.

    Multi-product solutions

    Features and programs

    Financing for AWS Marketplace purchases

    AWS Marketplace now accepts line of credit payments through the PNC Vendor Finance program. This program is available to select AWS customers in the US, excluding NV, NC, ND, TN, & VT.
    Financing for AWS Marketplace purchases

    Pricing

    Pricing is based on actual usage, with charges varying according to how much you consume. Subscriptions have no end date and may be canceled any time.
    Additional AWS infrastructure costs may apply. Use the AWS Pricing Calculator  to estimate your infrastructure costs.

    Usage costs (9)

     Info
    Dimension
    Cost/hour
    m5a.large
    Recommended
    $0.086
    m5a.xlarge
    $0.172
    m5a.2xlarge
    $0.344
    t3a.medium
    $0.038
    m5a.4xlarge
    $0.688
    m5a.8xlarge
    $1.376
    t3a.2xlarge
    $0.301
    t3a.xlarge
    $0.15
    t3a.large
    $0.075

    Vendor refund policy

    Not Applicable

    How can we make this page better?

    We'd like to hear your feedback and ideas on how to improve this page.
    We'd like to hear your feedback and ideas on how to improve this page.

    Legal

    Vendor terms and conditions

    Upon subscribing to this product, you must acknowledge and agree to the terms and conditions outlined in the vendor's End User License Agreement (EULA) .

    Content disclaimer

    Vendors are responsible for their product descriptions and other product content. AWS does not warrant that vendors' product descriptions or other product content are accurate, complete, reliable, current, or error-free.

    Usage information

     Info

    Delivery details

    64-bit (x86) Amazon Machine Image (AMI)

    Amazon Machine Image (AMI)

    An AMI is a virtual image that provides the information required to launch an instance. Amazon EC2 (Elastic Compute Cloud) instances are virtual servers on which you can run your applications and workloads, offering varying combinations of CPU, memory, storage, and networking resources. You can launch as many instances from as many different AMIs as you need.

    Version release notes

    Fixes and patches to core product

    Additional details

    Usage instructions

    You can launch an EC2 instance , using the AMI: 1- Choose the correct security to open the traffic to outside. 2- Secure your environment as per your choice. 3- You can choose your own Domain names and attached it to the public IP (You can also use an Elastic IP) . 4- Our software is open for any kind of infrastructure modification in AWS and you can use multiple services available in AWS like Load Balancers, Auto Scaling , Cloud Watch etc.) 5- Use Composer to modify the Platform user configuration settings. (Please refer to Admin Documentation for better understanding) 6- After the installation process is complete you can use Admin as a Username and instance id (i-xxxxxxxxxx) as a Password to login to the webpage and for first login it will prompt you for a password change. 7- For replication you have to make a connection between master and replica i.e- both the server must be communicate with each other using 7557 port.

    Resources

    Vendor resources

    Support

    Vendor support

    AWS infrastructure support

    AWS Support is a one-on-one, fast-response support channel that is staffed 24x7x365 with experienced and technical support engineers. The service helps customers of all sizes and technical abilities to successfully utilize the products and features provided by Amazon Web Services.

    Product comparison

     Info
    Updated weekly

    Accolades

     Info
    Top
    25
    In Blockchain, Device Security
    Top
    25
    In Masking/Tokenization
    Top
    100
    In Data Governance

    Customer reviews

     Info
    Sentiment is AI generated from actual customer reviews on AWS and G2
    Reviews
    Functionality
    Ease of use
    Customer service
    Cost effectiveness
    1 reviews
    Insufficient data
    Insufficient data
    Insufficient data
    Insufficient data
    4 reviews
    Insufficient data
    Insufficient data
    Insufficient data
    2 reviews
    Insufficient data
    Insufficient data
    Insufficient data
    Insufficient data
    Positive reviews
    Mixed reviews
    Negative reviews

    Overview

     Info
    AI generated from product descriptions
    Detectable Immutability
    Detectable persistence mechanism equipped with the ability to detect data compromise and maintain data integrity through continuous protection of sensitive data.
    Encryption Key Management
    Unique encryption keys implementation for securing data across cloud, on-premise, or hybrid environments.
    Chain of Custody Tracking
    Chain of custody capability enabling accurate and trustworthy information flow with real-time detection and correction of errors.
    Multi-Data Type Support
    Support for all data types across any industry with deployment flexibility on cloud, on-premise, or hybrid infrastructure.
    Industry Standard API Integration
    Next-generation secure database leveraging industry standard APIs and protocols for immediate usability and integration.
    Centralized Key Management
    Centrally manages cryptographic keys used across different encryption types and platforms, supporting enterprise environments and major cloud providers including AWS native keys, BYOK, and HYOK.
    Data Discovery and Classification
    Inspects data systems, databases, and storage locations to identify and classify sensitive data in both structured and unstructured formats with risk-oriented assessment.
    Encryption and Tokenization
    Supports multiple encryption and tokenization use cases including file system level, database or column level, application-embedded libraries, and API gateway implementations, with options for standard encryption, tokenization, and data masking.
    Unified Policy Management
    Centralizes policies, audit reports, and control management across all encryption and protection solutions in a single platform for consistent security policy application.
    Multi-Platform Data Protection
    Protects data across on-premises infrastructure, Amazon Web Services, and other cloud providers with integrated encryption solutions.
    Sensitive Data Discovery
    Automated and centralized sensitive data discovery across entire data and analytics estate with universal coverage
    Fine-Grained Access Control
    Fine-grained access controls enforced across all cloud services with distributed policy enforcement points
    Data Masking and Encryption
    Data masking, encryption, and decryption capabilities for protecting sensitive information
    Centralized Audit and Compliance
    Comprehensive audit logging and centralized audit service with out-of-box customizable reports and dashboards for compliance purposes
    Fully-Managed Infrastructure
    Fully-managed SaaS infrastructure with automatic maintenance, upgrades, and software installations without manual user processes

    Contract

     Info
    Standard contract
    No

    Customer reviews

    Ratings and reviews

     Info
    5
    1 ratings
    5 star
    4 star
    3 star
    2 star
    1 star
    100%
    0%
    0%
    0%
    0%
    1 AWS reviews
    David M Fuerza Ai CTO

    Walacor Review

    Reviewed on Mar 04, 2023
    Review from a verified AWS customer

    At Fuerza Ai, we chose to work with Walacor because they provide the best platform on the market for storing records with data audit capabilities that go beyond traditional options.

    Fuerza Ai specializes in building sales teams for companies, and, as a result, we generate large amongst of data - including PII like phone numbers, email addresses, and opt-in information - that, for compliance reasons, needs to be stored in a secure way. To ensure we fully protected the privacy of this data, we sought a solution that could encrypt every record while also being scalable and providing a full audit trail. Our original plan was to use a vendor we’ve used in the past, but then we found Walacor. Walacor exceeded our requirements - and for a lower cost.

    Walacor gives us confidence that all of our data is failsafe and immutable, with one of the best solutions on the market to secure data with encryption on the data level. The ability to access the data audit for each record was a huge plus as well, as it allows us to track changes and constantly ensure data integrity.

    Walacor’s platform is easy to use, with a straightforward, user-friendly implementation process. We were up and running in no time thanks to their AWS option. We would highly recommend Walacor to any company looking for a top-notch secure database solution for your sensitive data.

    View all reviews