Sonrai Security’s Sonrai Dig

Promote this Nomination

Additional Info

Company (that provides the nominated product / solution / service)Sonrai Security
Websitehttp://www.sonraisecurity.com
Company size (employees)50 to 99
Type of solutionCloud/SaaS

In 3 bullets, summarize why this product or service is different from the competition and deserves recognition:

*Eliminates all identity risks -- Sonrai Dig uncovers all identity and data relationships between people and non-people identities (admins, roles, compute instances, serverless functions, and containers) across multi-cloud accounts and third-party data stores. Sonrai Dig, our identity and data security platform, graphs all access paths to enforce Least Privilege, and workflow enables certification of identities.

*Discovers, Locks Down, and Monitors “Crown-Jewel” Data --Inside Sonrai Dig, our Crown Jewel Monitoring capabilities relentlessly monitors critical data sitting inside object stores (e.g. AWS S3, Azure Blob) and database services (e.g. CosmosDB, DynamoDB, RDS). Suspicious access activity or undesirable changes in access rights are immediately flagged.

*Governance Automation Engine --Sonrai Dig’s Governance Automation Engine helps companies shift left and integrate teams via organized analysis, alerts, and actions that align with how organizations use public cloud. The platform allows customized monitoring and views for development, staging, or production workloads and an API architecture that can be integrated into a CI/CD process.

Brief Overview

Identity and data access complexity are exploding in your public cloud. Tens of thousands of pieces of compute, thousands of roles, and a dizzying array of interdependencies and inheritances. First-generation security tools miss this as evidenced by so many breaches. Sonrai Dig de-risks your cloud by finding these holes, helping you fix them, and preventing those problems from occurring in the first place.

Sonrai Dig is built on a sophisticated graph that continuously identifies and monitors every possible relationship between identities and data that exists inside your AWS, Azure, and GCP cloud environments. Dig’s Governance Automation Engine automates workflow, remediation, and prevention capabilities across cloud and security teams to ensure end-to-end security.

Powered by a cloud identity graph, Sonrai Dig combines Cloud Security Posture Management (CSPM), Cloud Infrastructure Entitlements Management (CIEM), and data security in one platform. This enables enterprise companies to enforce compliance, achieve and maintain least privilege, enforce separation of duties, and lockdown critical data: all ways to minimize exposure to threats in the cloud. Best practices, workflow, advisors, and automation supports cross-team cloud security operations.