Audit & Monitoring​

It is difficult to setup, maintain and extract value from data access logs. Satori centralizes all your data access logs in one place, adding additional metadata, such as detailed identity and security policies, helping you meet and exceed your compliance and security requirements.

The Satori data access audit provides you with identity information of the data consumers, even when they are using a generic BI user.

The data access audit provides you with all locations which were accessed in the query.

The data access audit specifies the country from which the user was connected. You can also apply security policies based on the users’ IP origin.

To give you more context, we list the identity provider groups, as well as Satori user directory groups relevant to the data access.

The “Actions” section lists all security policies that were triggered on this query.

For each query, Satori provides the query (with sensitive data redacted), and in case the query was modified by Satori (for example, to enforce row-level security), you can view the re-written query as well.

For each query, Satori provides the full list of result columns, as well as the data types for each column.

The Satori data access audit provides you with identity information of the data consumers, even when they are using a generic BI user.

The data access audit provides you with all locations which were accessed in the query.

The data access audit specifies the country from which the user was connected. You can also apply security policies based on the users’ IP origin.

To give you more context, we list the identity provider groups, as well as Satori user directory groups relevant to the data access.

The “Actions” section lists all security policies that were triggered on this query.

For each query, Satori provides the query (with sensitive data redacted), and in case the query was modified by Satori (for example, to enforce row-level security), you can view the re-written query as well.

For each query, Satori provides the full list of result columns, as well as the data types for each column.

Universal Data Access Audit

Maintaining data access logs across multiple data stores can be painful, especially when it involves different databases, data warehouses and data lakes.

Satori enables you to view, analyze, and report on your data access audit logs in a single location without any cumbersome setups.

Play Video

Understanding the Context of Data Access

There are many challenges when trying to understand data access for analytics, compliance and incident response. One of the main challenges is enriching the basic metadata with contextual identity and security information.

Satori provides centralized enriched metadata about access to all data stores. This includes identity data, the types of sensitive data accessed and any applied security policies.

Analyze Enriched Audit Data at Scale

When investigating specific audit entries is not enough, a larger data analytics scale is required to generate custom reports, identify behavior anomalies, and use data access information in dashboards.

Satori enables you to consume all data access logs into platforms like Splunk, Snowflake or Elastic, and apply analytics directly on your data access metadata.

Product Capabilities