Chakra Max

Reasonable and Advanced Information Security Solution

Chakra Max is an infrastructure-integrated security platform that organically combines each solution from database access control (DAC), system access control (SAC), and integrated account management (IAM) to provide a unified security policy and practical management system.

Chakra Max
Chakra Max integrates DAC, SAC, and IAM functions into a single interface, providing synergies that exceed expectations

Chakra Max integrates DAC, SAC, and IAM functions into a single interface, providing synergies that exceed expectations

It is a common practice in the market for each security solution required for an infrastructure security environment to consist of products from different vendors.

  • Expands security coverage to protect all paths that lead to critical assets
  • Reduces administrative costs by integrating account and permission management processes across heterogeneous devices
  • Creates a systematic security environment for internal assets by implementing a unified security policy

Simple log tracking
SIMPLE & COMPLEX

Consolidates databases, system access records, and account management history into a unified repository, organically linking each output

  • Simplifies audit history management
  • Tracks and analyzes complex logs
Simple log tracking management SIMPLE & COMPLEX

Integrating user management and authentication system

Synchronizes user information and integrates authentication system to improve work productivity Reduces administrative complexity by building a unified policy and permission management system

Integrated Configuration Flow

It manages the lifecycle of database system accounts and provides an automated system access feature in conjunction with the access control module.
Additionally, an integrated administrative manager supports centralized policy management from a single screen.

Integrated Configuration Flow

Features

1

Provides the most heterogeneous DBMS security features in Korea

Supports approximately 30 DBMS security features, including EnterpriseDB, NoSQL DB, Cloud DB, and Hadoop

2

Enhances audit log management efficiency by incorporating the self-developed PetaSQL database

  • Simplifies audit history management
  • Tracks and analyzes complex logs
3

Specializes in the management of approvals and key master data

Automates workflows and implements step-by-step verification

4

Integrates distributed infrastructure environments

Integrated management of on-premise, cloud, and virtualized environments

Supported Environments (Cloud)

Amazon Web Service Microsoft Azure NCP GCP NHN Cloud Oracle Cloud Koscom Cloud KT Cloud Kakao Cloud Gabia Cloud Cloud Z
Supported Environments (Cloud)

Supported DBMS

Oracle Microsoft SQL Server MySQL MariaDB DB2 Altibase Tibero PostgreSQL Teradata Cubrid Netezza MongoDB SunDB FirebirdDB CouchDB Influx Infomix SAP Hana DB Kairos Greenplum Vertica Symfoware Goldilocks Redshift Aurora SQreamDB Hive Impala Presto TDV Sybase ASE Sybase IQ Redis Cassandra DynamoDB PetaSQL

Supported Environments (System Protocol)

TELNET SSH FTP SFTP RLOGIN RCMD Windows Terminal Mainframe TN3270 AS/400 TN5250
  • representative phone
    +82-1660-1675

  • Implementation and
    Technology Inquiries