Billions of details.

Risk Assessment

Organizations managing sensitive data need to drive business decisions through risk metrics and risk assessments.


Generate compliance report to evaluate the current posture of your security controls, such as: PCI, HIPAA, SOX, GLBA, Data Protection Act, ISO, and SOC2.


Investigative tool to analyze access patterns and content rules during an incident or a possible data breach.

Threat Intelligence

Behavior analysis and threat modeling to determine the potential threats to sensitive data, due to vulnerable access points or increasing threat vectors.

What capabilities other tools are missing?
Data Context.


Works for known exploits only. Produces false positives and is limited by signature libraries. No context to the data activity.


Policy-based rules & system logs. If a policy is not set, you will not see the alert. Lengthy batch process for incidence response or auditing. No context to the data activity.


Correlates events from other devices. No view to data content and transactions. Overwhelms users with millions of incomplete events. No context to the data activity.

Threat Detection

Real-time audit and forensic capabilities of end-to-end data transactions. Extracts and indexes DatiDNA to alert on any change in access behaviors. Full data relationship: context and content.



Small or global deployment.

Datiphy Enterprise

Datiphy Enterprise

The Brains. Datiphy Enterprise is deployed on an industry server or VM. It is capable of being a standalone device for a simple deployment or the aggregator for a workforce of Network and Host Agents in a complex enterprise.

Network Agent

Network Agent

The Brawn. Network Agent is deployed on an industry server or VM. We’ve offloaded the heavy lifting to our Network Agent for high performance and maximum scalability. Each Network Agent provides visibility to billions of data transactions per day.

Host Agent

Host Agent

The Small but Mighty. Host Agent is deployed directly on the database server. Host Agent functions similarly as Network Agent, but its focus is unique to each database server for an up close and personal look into data transactions.

DMC (Datiphy Management Center)


The Central Command. DMC (Datiphy Management Center) is deployed on an industry server or VM and is required in multi-domain deployments. DMC is also used to aggregate many Datiphy Enterprise Engines in a complex or high volume environment for a single point of management.

Security posture.

Policy and behavior tools are usually configured by gut feel, educated guess and rule of thumb methods which lead to a noisy solution riddled with false alarms. Because Datiphy is auditing every data transaction, accuracy is provided by the scientific certainty of analyzing the entire pool. Analytics can be exported as feeds to other security tools; ensuring their policies are based upon facts and not methods that produce false alarms. Relationships & behaviors among assets are visualized with the same level of accuracy.