Skip to main content
TrustRadius
Cyral

Cyral

Overview

What is Cyral?

Cyral is a cloud-native Security-as-Code solution to protect the modern data layer. It allows engineering teams to observe, secure, and manage data endpoints in a cloud via a sidecar.

Read more
Recent Reviews
Read all reviews
Return to navigation

Pricing

View all pricing

Access

$50

Cloud
per identity per month

Access & Authorization

custom pricing

Cloud
per identity per month

Access & Authorization & Assurance

custom pricing

Cloud
per identity per month

Entry-level set up fee?

  • No setup fee
For the latest information on pricing, visithttps://cyral.com/pricing

Offerings

  • Free Trial
  • Free/Freemium Version
  • Premium Consulting/Integration Services

Starting price (does not include set up fee)

  • $50 per month
Return to navigation

Product Details

What is Cyral?

Cyral's data layer sidecar intercepts requests to every database, data warehouse and data pipeline from any user, application or tool, without impacting performance or scalability. The side car defers all session state management to the data layer connections. It alerts on suspicious activity and can block known threats and disallowed accesses. Logs, metrics, traces and alerts get sent to tools of your choice.

Cyral enables visibility and control without changing applications or workflows. Sidecar deploys within your existing infrastructure, whether it be a cloud or on-prem environment as a Kubernetes service, autoscaling group, cloud function or host-based install. All the data flows and sensitive information stays inside the customer’s environment where the sidecar is deployed, creating no risk of spillage.

Users can deploy multiple sidecars in a high-availability configuration and use a SaaS-based control pane to administer them. Here integrations and provisioning can be managed centrally. Sidecar intercepts requests to data endpoints, continuously examining, normalizing, and analyzing requests for policy violations, and reacting to threats when needed.

Cyral's stateless data interception technology scales with workload and makes a sub millisecond impact on performance

Cyral Features

  • Supported: Monitoring and Policy Enforcement
  • Supported: Data Access Management
  • Supported: Data Activity Monitoring
  • Supported: Attribute-based Authorization
  • Supported: Governance and Protection
  • Supported: Data Loss Prevention
  • Supported: Unified Logs, Traces, Metrics and Alerts

Cyral Screenshots

Screenshot of Cyral is a first cloud-native Security as Code solution to protect the modern data layer.

Cyral Video

Cyral is building the first security solution for the data cloud. Companies today are embracing cloud-based data services to make data accessible by everyone. But this leaves them blind to who has access to what data? What their users and apps are doing with the data? Is someo...
 Show More

Cyral Technical Details

Deployment TypesSoftware as a Service (SaaS), Cloud, or Web-Based
Operating SystemsUnspecified
Mobile ApplicationNo

Cyral Downloadables

Return to navigation

Comparisons

View all alternatives
Return to navigation

Reviews and Ratings

(3)

Reviews

(1-1 of 1)
Companies can't remove reviews or game the system. Here's why
Luis Alcalá | TrustRadius Reviewer
Score 8 out of 10
Vetted Review
Verified User
Incentivized
We use this software to create a defense and protection of our data, with all its tools and functions, we are confident that our data is protected. It has a suspicious activity detection system that blocks access and threats and also issues an alert to warn us.
  • It has a full access management, which allows or denies access to our data, according to the roles we have configured.
  • It performs constant monitoring and supervision of our data and the activities performed, in real time, being able to have them always available.
  • It also performs the supervision and application of the policies configured in the system, so that the data and information are used correctly, according to the company's guidelines.
  • I would like the protection to be not only with our data in the cloud, but on local computers.
  • Its configuration can be cumbersome, as there is a lot of data to be provided for the system to work perfectly.
  • We had precisely problems with the software configuration and the technical service was not very helpful.
For all companies engaged in data processing and business, this is an excellent software to feel much more confident that all your data, analysis, graphics and business analysis, are in complete safety. The whole department is happy to work with the software because it is very easy to use.
  • Performs monitoring and compliance with data policies, which has been configured in the software.
  • Allows to see in real time the data and activities performed, in order to have a constant supervision.
  • Access management allows access only to authorized persons to view and work with the data.
  • Thanks to this software we can be much more relaxed about the protection of our data, as it gives us the security we need, with access controls, constant monitoring and other tools, avoiding the loss of valuable information for the company.
Return to navigation