TrustRadius: an HG Insights company

Cyral

Score8 out of 10

3 Reviews and Ratings

What is Cyral?

Cyral is a cloud-native Security-as-Code solution to protect the modern data layer. It allows engineering teams to observe, secure, and manage data endpoints in a cloud via a sidecar.

Media

Screenshot of Cyral is a first cloud-native Security as Code solution to protect the modern data layer.

Screenshot of Cyral is a first cloud-native Security as Code solution to protect the modern data layer.

With Cyral our data is safe

Use Cases and Deployment Scope

We use this software to create a defense and protection of our data, with all its tools and functions, we are confident that our data is protected. It has a suspicious activity detection system that blocks access and threats and also issues an alert to warn us.

Pros

  • It has a full access management, which allows or denies access to our data, according to the roles we have configured.
  • It performs constant monitoring and supervision of our data and the activities performed, in real time, being able to have them always available.
  • It also performs the supervision and application of the policies configured in the system, so that the data and information are used correctly, according to the company's guidelines.

Cons

  • I would like the protection to be not only with our data in the cloud, but on local computers.
  • Its configuration can be cumbersome, as there is a lot of data to be provided for the system to work perfectly.
  • We had precisely problems with the software configuration and the technical service was not very helpful.

Most Important Features

  • Performs monitoring and compliance with data policies, which has been configured in the software.
  • Allows to see in real time the data and activities performed, in order to have a constant supervision.
  • Access management allows access only to authorized persons to view and work with the data.

Return on Investment

  • Thanks to this software we can be much more relaxed about the protection of our data, as it gives us the security we need, with access controls, constant monitoring and other tools, avoiding the loss of valuable information for the company.