Risk Protection

Protect your data with a platform that moves as fast as the modern cloud. With Divebell’s data risk intelligence you can craft policies to automatically protect your most important assets and help every data owner be a part of the solution.

Risk Sonar

Clearly understand your compliance and security risks with a prioritized and actionable heatmap.

  • Dynamic risk scoring
  • Risk view with full context: location, access, quantity, purpose, sensitivity
  • Data owner delegation and remediation
  • Integration with ticketing and SIEMs

Risk Sonar tracks a prioritized set of risks that Divebell has discovered. Here’s how it works: Using rules about data specified in your policy, Risk Sonar will create a risk to track. Each risk then receives a risk score based on data sensitivity, quantity, access, and customizable business context. Risk Sonar then tracks the activity of this risk over time. Any data owner can access clear actions for remediation, where necessary.

Product screen section showing open risks
Headshot of Grant Barrett, Privacy Director, Ethos Privacy

“By identifying your most important and sensitive data, Divebell’s unique technology allows you to prioritize what to defend — a critical capability, given the vast attack-surface of most enterprises.”

— Joan Pepin,
CEO ZeroWall, former CSO Auth0, BISO Nike

Headshot of Grant Barrett, Privacy Director, Ethos Privacy

“By identifying your most important and sensitive data, Divebell’s unique technology allows you to prioritize what to defend — a critical capability, given the vast attack-surface of most enterprises.

— Joan Pepin, CEO ZeroWall, former CSO Auth0, BISO Nike

Product screen section showing policy-driven finding

Policy Engine

Easily specify what needs to be protected and how to protect it, using an advanced rule system built for the privacy era.

  • Specify rules for data element, subject, location, and access
  • Use conditions on business context and purpose
  • Configure actions to protect data

Divebell’s policy rule engine automatically flags risks to enforce compliance and give you an  early warning when the data is at risk. This content, subject, and context-aware system allows you to create as many policies as you need to enforce organizational compliance and honor the privacy choices of your customers. Our powerful, easy-to-use library of conditions allows you to target not just data elements, but their full context.

Protection Actions

Prevent data breaches, compliance violations, and data misuse with actions that enhance your security and governance leverage whether you are cloud-native or embarking on a digital transformation.

  • Apply masking or tags
  • Limit access
  • Control retention
  • Notify security responders

Protection actions allow you to automate risk remediation. These actions can apply protections native to various data platforms such as dynamic masking policies, column, and row-level access controls as well as tagging and quarantining. We can also delegate remediation by triggering other systems — for example encryption or de-identification solutions — to protect data or by notifying the security operations center. You can specify the exact conditions for when an action should be taken to ensure correct, targeted results.

Product screen section showing policy and action settings

Get a personalized tour