| April, 2026 |
DataSunrise Security
Newsletter |
|
| |
Introducing DataSunrise 12.0 |
| |
Hello Edward Lorilla, We're excited to introduce DataSunrise 12.0—our most versatile release yet. This version expands our database coverage, adds powerful new audit capabilities, and introduces smart caching to boost performance. Whether you're working with graph databases, cloud-native NoSQL, or Microsoft ecosystem platforms, v12.0 helps you secure data without compromising flexibility. |
| |
|
| |
Here's what's new: |
|
| |
| |
 |
| |
Amazon Neptune Data Discovery |
| |
Now you can discover and score sensitive data in Amazon Neptune graph databases. This release adds discovery and risk scoring support specifically for Neptune, helping you catalog sensitive information stored in nodes and edges. Note: Currently supports discovery only; security and masking features for Neptune are coming soon. |
| |
| Learn More → |
| |
| |
 |
| |
Google Cloud Bigtable Support |
| |
Bigtable is now supported through our Apache Cassandra integration. Configure your Bigtable instance as a Cassandra-type database in DataSunrise to enable real-time audit, security policies, data discovery, and risk scoring. No separate instance type needed—just point to your Bigtable endpoint and go. |
| |
| Learn More → |
| |
| |
 |
| |
IBM DataStax Enterprise Support |
| |
We've added native support for IBM DataStax Enterprise 6.8+ as a dedicated database type. Get full feature parity with Cassandra—audit, security, discovery, masking—plus native log trailing via DSE's SLF4JAuditWriter. Configure DSE as its own instance type for cleaner management. |
| |
| Learn More → |
| |
| |
 |
| |
Microsoft Dataverse Support |
| |
Connect to Microsoft Dataverse through its TDS endpoint using Azure AD authentication. While Dataverse doesn't appear as a separate database type, you can secure and mask data in Dataverse tables by configuring it as a SQL Server connection. Supports audit, discovery, and dynamic masking out of the box. |
| |
| Learn More → |
| |
| |
 |
| |
See What Changed: Before/After Values in Audit |
| |
Now capture the actual data before and after UPDATE or DELETE operations. DataSunrise injects database-native clauses (RETURNING for PostgreSQL, OUTPUT for SQL Server) to grab row changes, stores them in audit trails, and keeps your app unaware. View the diffs side-by-side in Transactional Trails. |
| |
| Learn More → |
| |
| |
 |
| |
Boost Performance with Query Result Cache |
| |
Reduce database load with TTL-based caching at the proxy level. Repeated SELECT queries get served from cache instead of hitting your database every time. Configure memory limits, entry counts, cache lifetime, and even filter by table. Works with PostgreSQL, MySQL, SQL Server, Oracle, and compatible variants. |
| |
| Learn More → |
| |
|
| |
| |
Plus, under the hood: |
| |
 |
ML-powered Security Rules with active blocking |
| |
 |
Security and Dynamic Masking for Salesforce via DIS proxy
|
| |
 |
Static Masking for Azure Blob Storage (CSV, JSON, XML)
|
| |
 |
Authentication Proxy for IBM Db2 with encrypted auth support
|
| |
 |
Native Dynamic Masking via PostgreSQL, SQL Server, and Oracle built-in features
|
| |
 |
Improved overall stability and reliability across all modules
|
| |
|
| |
|
|
| |
|
|
DataSunrise Recent Analyst Content & Technical Brief |
| |
Data Masking Tools and Techniques for Amazon AthenaAmazon Athena makes it easy to run SQL over data in S3, which is exactly why teams love it and exactly why privacy problems show up so quickly. The same convenience that helps analysts answer questions fast can also expose raw email addresses, account identifiers, IP addresses, and free-text notes to notebooks, BI tools, and support workflows that were never meant to become a parade of sensitive values. Learn More → |
| |
| |
Data Obfuscation in PostgreSQLData obfuscation in PostgreSQL is a practical strategy for protecting sensitive information while preserving database usability. Modern PostgreSQL deployments often contain Personally Identifiable Information (PII), financial identifiers, HR data, and operational secrets. When this data is exposed to development teams, analytics platforms, contractors, or third-party tools without proper controls, the risk multiplies quickly. Learn More → |
| |
| |
How to Apply Dynamic Masking in Amazon OpenSearchHow to apply dynamic masking in Amazon OpenSearch becomes a real question the moment your “just logs” cluster starts holding customer emails, phone numbers, IP addresses, session identifiers, or support notes. Amazon OpenSearch is a workhorse for observability, security analytics, and incident response—exactly the kind of pipelines that accidentally ingest regulated data. Dynamic masking is the fastest way to reduce exposure without breaking dashboards, search relevance, or operational workflows. Learn More → |
| |
|
| |
|
|
| |
| |
For more information, please contact your DataSunrise representative, or visit our website |
| |
|
|
| |
Thank you for considering DataSunrise Security,
and we are looking forward to supporting you. If you do not see this newsletter, please click here |
| |
|
|
| |
| |
| Unsubscribe |
| |
© Copyright DataSunrise, Inc. 2026. All rights reserved. DataSunrise and the DataSunrise logo are trademarks or registered trademarks of DataSunrise, Inc. in the USA and other countries. All other trademarks are the property of their respective companies. Information is subject to change without notice. |
| |
|
|
|
No comments:
Post a Comment