Get unified visibility into all activity in your data infrastructure
Retain & visualize Cyral data activity logs
Retain immutable Cyral logs of all data activity in your environment with zero management overhead.
Detect threats faster
Identify abnormal user and application behavior across your data infrastructure.
Use pre-built Cyral dashboards
Use pre-built, customizable Cyral dashboards to get immediate value out of your logs

Cyral – Security Summary
View high level information regarding suspicious activity across your data infrastructure.
- Identify suspicious activity against specific repositories
- Identify the source IP or geographic location of suspicious activity
- Identify accounts being targeted with suspicious activity
Data Monitoring Activity
Monitor how users and groups are accessing data and the types of queries they are executing against the data.
- Baseline various aspects of queries such as execution time, number of bytes, and number of records.
- Identify potential outliers in group trends across data types and methods accessed.


Policy Summary
Investigate policy violations and queries that do not have policies applied.
- Identify potential outlier queries that have no policy applied.
- Identify policies that may no longer be in use
- Identify queries that have no policy applied in order to build a policy to control access to data.
- Identify users that have a high amount of policy violations.
- Identify data types that have a high amount of policy violations to further refine policies or identify suspicious activity.