MONITOR

[et_pb_section fb_built=”1″ _builder_version=”3.26.6″ background_image=”http://zero2compliance.com/wp-content/uploads/2019/08/monitor.jpg” background_size=”initial” custom_padding=”1px||367px|||” fb_built=”1″ _i=”0″ _address=”0″][et_pb_row _builder_version=”3.26.6″ transform_scale_last_edited=”on|desktop” transform_translate=”0px|151px” transform_translate_last_edited=”on|phone” transform_translate_linked=”off” transform_rotate_last_edited=”on|desktop” transform_skew_last_edited=”on|desktop” transform_origin_last_edited=”on|desktop” transform_styles_last_edited=”on|phone” _i=”0″ _address=”0.0″][et_pb_column type=”4_4″ _builder_version=”3.26.6″ _i=”0″ _address=”0.0.0″][et_pb_text _builder_version=”3.27.4″ text_text_color=”#ffffff” header_text_color=”#ffffff” _i=”0″ _address=”0.0.0.0″]

Monitor Continuously

[/et_pb_text][et_pb_text _builder_version=”3.27.4″ text_text_color=”#ffffff” text_font_size=”22px” _i=”1″ _address=”0.0.0.1″]

Do you know who is connecting to your Production database, from where, and what they are doing there?

[/et_pb_text][/et_pb_column][/et_pb_row][et_pb_row column_structure=”1_2,1_2″ _builder_version=”3.26.6″ transform_translate=”0px|151px” transform_translate_linked=”off” _i=”1″ _address=”0.1″][et_pb_column type=”1_2″ _builder_version=”3.26.6″ _i=”0″ _address=”0.1.0″][et_pb_button button_url=”@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6IjM0OCJ9fQ==@” button_text=”LIVE DEMO” button_alignment=”center” _builder_version=”3.27.3″ _dynamic_attributes=”button_url” custom_button=”on” button_text_size=”18px” button_text_color=”#ffffff” button_bg_color=”#4bb76f” button_border_width=”0px” button_border_color=”rgba(0,0,0,0)” button_border_radius=”6px” button_letter_spacing=”0px” button_font=”fun city level 2||||||||” box_shadow_style=”preset2″ saved_tabs=”all” _i=”0″ _address=”0.1.0.0″][/et_pb_button][/et_pb_column][et_pb_column type=”1_2″ _builder_version=”3.26.6″ _i=”1″ _address=”0.1.1″][et_pb_button button_url=”@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6IjE0NjAifX0=@” button_text=”DATASHEET” button_alignment=”center” _builder_version=”3.27.4″ _dynamic_attributes=”button_url” custom_button=”on” button_text_size=”18px” button_text_color=”#ffffff” button_bg_color=”#4bb76f” button_border_width=”0px” button_border_color=”rgba(0,0,0,0)” button_border_radius=”6px” button_letter_spacing=”0px” button_font=”fun city level 2||||||||” box_shadow_style=”preset2″ saved_tabs=”all” _i=”0″ _address=”0.1.1.0″][/et_pb_button][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section fb_built=”1″ _builder_version=”3.26.6″ background_color=”#787878″ fb_built=”1″ _i=”1″ _address=”1″][et_pb_row _builder_version=”3.26.6″ _i=”0″ _address=”1.0″][et_pb_column type=”4_4″ _builder_version=”3.26.6″ _i=”0″ _address=”1.0.0″][et_pb_text _builder_version=”3.27.4″ header_text_color=”#ffffff” _i=”0″ _address=”1.0.0.0″]

traditional methods have challenges

[/et_pb_text][/et_pb_column][/et_pb_row][et_pb_row column_structure=”1_3,1_3,1_3″ _builder_version=”3.26.6″ _i=”1″ _address=”1.1″][et_pb_column type=”1_3″ _builder_version=”3.26.6″ _i=”0″ _address=”1.1.0″][et_pb_text _builder_version=”3.27.4″ text_text_color=”#ffffff” header_text_color=”#ffffff” header_font_size=”27px” header_2_text_align=”center” header_2_text_color=”#ffffff” header_2_font_size=”20px” header_5_font=”Avenir||||||||” header_5_font_size=”18px” custom_margin=”||8px|||” _i=”0″ _address=”1.1.0.0″]

SPECIAL SOLUTIONS

[/et_pb_text][et_pb_text _builder_version=”3.27.4″ text_text_color=”#ffffff” text_font_size=”16px” custom_padding=”||0px|||” _i=”1″ _address=”1.1.0.1″]

Requires special solutions, hardware appliances to monitor that has performance impact

[/et_pb_text][/et_pb_column][et_pb_column type=”1_3″ _builder_version=”3.26.6″ _i=”1″ _address=”1.1.1″][et_pb_text _builder_version=”3.27.4″ header_text_color=”#ffffff” header_font_size=”27px” header_2_text_align=”center” header_2_text_color=”#ffffff” header_2_font_size=”20px” header_5_font=”Avenir||||||||” header_5_font_size=”18px” custom_margin=”||8px|||” _i=”0″ _address=”1.1.1.0″]

ROBUSTNESS

[/et_pb_text][et_pb_text _builder_version=”3.27.4″ text_text_color=”#ffffff” text_font_size=”16px” _i=”1″ _address=”1.1.1.1″]

Not miss out on any access without any monitoring downtime

[/et_pb_text][/et_pb_column][et_pb_column type=”1_3″ _builder_version=”3.26.6″ _i=”2″ _address=”1.1.2″][et_pb_text _builder_version=”3.27.4″ header_font_size=”27px” header_2_text_align=”center” header_2_text_color=”#ffffff” header_2_font_size=”20px” header_5_font=”Avenir||||||||” header_5_font_size=”18px” custom_margin=”||8px|||” _i=”0″ _address=”1.1.2.0″]

INTEGRATION

[/et_pb_text][et_pb_text _builder_version=”3.27.4″ text_text_color=”#ffffff” text_font_size=”16px” _i=”1″ _address=”1.1.2.1″]

Analyze the data and integrate with third party SIEM tools

[/et_pb_text][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section fb_built=”1″ _builder_version=”3.26.6″ fb_built=”1″ _i=”2″ _address=”2″][et_pb_row _builder_version=”3.26.6″ _i=”0″ _address=”2.0″][et_pb_column type=”4_4″ _builder_version=”3.26.6″ _i=”0″ _address=”2.0.0″][et_pb_text _builder_version=”3.27.4″ _i=”0″ _address=”2.0.0.0″]

How is imonitor™ better

[/et_pb_text][/et_pb_column][/et_pb_row][et_pb_row column_structure=”1_3,1_3,1_3″ _builder_version=”3.26.6″ _i=”1″ _address=”2.1″][et_pb_column type=”1_3″ _builder_version=”3.26.6″ _i=”0″ _address=”2.1.0″][et_pb_text content_phone=”

access

” content_last_edited=”on|phone” _builder_version=”3.27.4″ header_text_align=”right” header_font_size=”15px” header_5_font=”Avenir||||||||” header_5_font_size=”18px” custom_margin=”||8px|||” _i=”0″ _address=”2.1.0.0″]

access

[/et_pb_text][et_pb_text content_phone=”

Monitors all users who are connecting to the production database and from which location

” content_last_edited=”on|phone” _builder_version=”3.27.4″ text_font_size=”16px” text_orientation=”right” text_text_align=”right” _i=”1″ _address=”2.1.0.1″]

Monitors all users who are connecting to the production database and from which location

 

[/et_pb_text][et_pb_text content_phone=”

ACTIVITY

” content_last_edited=”on|phone” _builder_version=”3.27.4″ header_text_align=”right” header_font_size=”15px” header_5_font=”Avenir||||||||” header_5_font_size=”18px” custom_margin=”||8px|||” _i=”2″ _address=”2.1.0.2″]

ACTIVITY

[/et_pb_text][et_pb_text content_phone=”

Monitors all user activity – All statements executed on the database and application

” content_last_edited=”on|phone” _builder_version=”3.27.4″ text_font_size=”16px” text_orientation=”right” text_text_align=”right” _i=”3″ _address=”2.1.0.3″]

Monitors all user activity – All statements executed on the database and application

 

[/et_pb_text][/et_pb_column][et_pb_column type=”1_3″ _builder_version=”3.26.6″ _i=”1″ _address=”2.1.1″][et_pb_image src=”http://zero2compliance.com/wp-content/uploads/2019/08/fingerprint_2018-1.png” _builder_version=”3.26.6″ _i=”0″ _address=”2.1.1.0″][/et_pb_image][/et_pb_column][et_pb_column type=”1_3″ _builder_version=”3.26.6″ _i=”2″ _address=”2.1.2″][et_pb_text content_phone=”

Protect

” content_last_edited=”on|phone” _builder_version=”3.27.4″ header_text_align=”right” header_font_size=”15px” header_5_font=”Avenir||||||||” header_5_font_size=”18px” custom_margin=”||8px|||” _i=”0″ _address=”2.1.2.0″]

Protect

[/et_pb_text][et_pb_text content_phone=”

Combines with iProtect to block unauthorized access

” content_last_edited=”on|phone” _builder_version=”3.27.4″ text_font_size=”16px” text_orientation=”right” text_text_align=”right” _i=”1″ _address=”2.1.2.1″]

Combines with iProtect to block unauthorized access

[/et_pb_text][et_pb_text content_phone=”

Code

” content_last_edited=”on|phone” _builder_version=”3.27.4″ header_text_align=”right” header_font_size=”15px” header_5_font=”Avenir||||||||” header_5_font_size=”18px” custom_margin=”||8px|||” _i=”2″ _address=”2.1.2.2″]

Code

[/et_pb_text][et_pb_text content_phone=”

Identify changes to sensitive data access when modifications are made to application and database programs

” content_last_edited=”on|phone” _builder_version=”3.27.4″ text_font_size=”16px” text_orientation=”right” text_text_align=”right” _i=”3″ _address=”2.1.2.3″]

Identify changes to sensitive data access when modifications are made to application and database programs

 

[/et_pb_text][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section fb_built=”1″ _builder_version=”3.26.6″ background_image=”http://zero2compliance.com/wp-content/uploads/2019/08/sample-64_0.jpg” fb_built=”1″ _i=”3″ _address=”3″][et_pb_row _builder_version=”3.26.6″ _i=”0″ _address=”3.0″][et_pb_column type=”4_4″ _builder_version=”3.26.6″ _i=”0″ _address=”3.0.0″][et_pb_text _builder_version=”3.27.4″ text_text_color=”#ffffff” header_text_color=”#ffffff” _i=”0″ _address=”3.0.0.0″]

mentis advantages

[/et_pb_text][/et_pb_column][/et_pb_row][et_pb_row column_structure=”1_3,1_3,1_3″ _builder_version=”3.26.6″ _i=”1″ _address=”3.1″][et_pb_column type=”1_3″ _builder_version=”3.26.6″ _i=”0″ _address=”3.1.0″][et_pb_text _builder_version=”3.27.4″ header_text_color=”#ffffff” header_font_size=”29px” _i=”0″ _address=”3.1.0.0″]

REPORTS AND ALERTS

[/et_pb_text][et_pb_text _builder_version=”3.27.4″ text_text_color=”#ffffff” text_font_size=”16px” _i=”1″ _address=”3.1.0.1″]

Log reports and alerts for production data access and code changes for compliance reporting

[/et_pb_text][/et_pb_column][et_pb_column type=”1_3″ _builder_version=”3.26.6″ _i=”1″ _address=”3.1.1″][et_pb_text _builder_version=”3.27.4″ header_text_color=”#ffffff” _i=”0″ _address=”3.1.1.0″]

FLEXIBILITY

[/et_pb_text][et_pb_text _builder_version=”3.27.4″ text_text_color=”#ffffff” text_font_size=”16px” _i=”1″ _address=”3.1.1.1″]

Monitor based on User/Location/Time/Statements

[/et_pb_text][/et_pb_column][et_pb_column type=”1_3″ _builder_version=”3.26.6″ _i=”2″ _address=”3.1.2″][et_pb_text _builder_version=”3.27.4″ header_text_color=”#ffffff” _i=”0″ _address=”3.1.2.0″]

AUTOMATED AND COST EFFECTIVE

[/et_pb_text][et_pb_text _builder_version=”3.27.4″ text_text_color=”#ffffff” text_font_size=”16px” _i=”1″ _address=”3.1.2.1″]

Near real-time monitoring adds minimal latency to access

[/et_pb_text][/et_pb_column][/et_pb_row][et_pb_row column_structure=”1_3,1_3,1_3″ _builder_version=”3.26.6″ _i=”2″ _address=”3.2″][et_pb_column type=”1_3″ _builder_version=”3.26.6″ _i=”0″ _address=”3.2.0″][et_pb_text _builder_version=”3.27.4″ header_text_color=”#ffffff” header_font_size=”29px” _i=”0″ _address=”3.2.0.0″]

ENTERPRISE WIDE

[/et_pb_text][et_pb_text _builder_version=”3.27.4″ text_text_color=”#ffffff” text_font_size=”16px” header_text_color=”#ffffff” _i=”1″ _address=”3.2.0.1″]

Common and Consistent discovery methods to find all sensitive data across structured, un-structured, cloud and big data sources

[/et_pb_text][/et_pb_column][et_pb_column type=”1_3″ _builder_version=”3.26.6″ _i=”1″ _address=”3.2.1″][/et_pb_column][et_pb_column type=”1_3″ _builder_version=”3.26.6″ _i=”2″ _address=”3.2.2″][et_pb_text _builder_version=”3.27.4″ text_text_color=”#ffffff” header_text_color=”#ffffff” _i=”0″ _address=”3.2.2.0″]

compliance

[/et_pb_text][et_pb_text _builder_version=”3.27.4″ text_text_color=”#ffffff” text_font_size=”16px” _i=”1″ _address=”3.2.2.1″]

Reports generated for compliance requirements and Privacy Impact Assessment

[/et_pb_text][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section fb_built=”1″ _builder_version=”3.26.6″ background_color=”#787878″ fb_built=”1″ _i=”4″ _address=”4″][et_pb_row _builder_version=”3.26.6″ _i=”0″ _address=”4.0″][et_pb_column type=”4_4″ _builder_version=”3.26.6″ _i=”0″ _address=”4.0.0″][et_pb_text _builder_version=”3.27.4″ header_text_color=”#ffffff” _i=”0″ _address=”4.0.0.0″]

accolades

[/et_pb_text][/et_pb_column][/et_pb_row][et_pb_row _builder_version=”3.26.6″ _i=”1″ _address=”4.1″][et_pb_column type=”4_4″ _builder_version=”3.26.6″ _i=”0″ _address=”4.1.0″][et_pb_slider _builder_version=”3.26.6″ custom_padding=”50px||51px|||” _i=”0″ _address=”4.1.0.0″][et_pb_slide heading=”philip howard” image=”http://zero2compliance.com/wp-content/uploads/2019/08/BLOOR-LOGO-RGB-.png” _builder_version=”3.27.3″ header_text_align=”center” body_text_align=”justify” background_color=”rgba(0,0,0,0)” background_enable_color=”on” child_filter_saturate=”98%” child_filter_brightness=”150%” child_filter_contrast=”115%” child_mix_blend_mode=”screen” hover_enabled=”0″ _i=”0″ _address=”4.1.0.0.0″]

…iMonitor uses active monitoring, combined with its decision and alert engine, to integrate with iDiscover and proactively detect and alert sensitive data.

[/et_pb_slide][et_pb_slide heading=”philip howard” image=”http://zero2compliance.com/wp-content/uploads/2019/08/BLOOR-LOGO-RGB-.png” _builder_version=”3.27.3″ header_text_align=”center” body_text_align=”justify” background_color=”rgba(0,0,0,0)” background_enable_color=”on” child_filter_saturate=”98%” child_filter_brightness=”150%” child_filter_contrast=”115%” child_mix_blend_mode=”screen” hover_enabled=”0″ _i=”1″ _address=”4.1.0.0.1″]

As with iMask and iScramble, monitoring is done inside the database. Monitoring is always post-transaction, and any performance overhead is offloaded to the MENTIS engine.

[/et_pb_slide][et_pb_slide heading=”We went through a rigorous process to select the sensitive data discovery and monitoring solution. We liked the data-centric approach by MENTIS. Their discovery solution is the best around and we realized that we can achieve a truly comprehensive risk-based monitoring program using the intelligence generated by the Discovery solution. What we also liked was that MENTIS was flexible enough to offer their solution as a service” _builder_version=”3.26.6″ header_font=”Avenir||||||||” header_text_align=”center” header_font_size=”21px” body_font=”fun city level 2||||||||” body_line_height=”2em” background_color=”rgba(0,0,0,0)” background_enable_color=”on” custom_padding=”||||false|false” _i=”2″ _address=”4.1.0.0.2″]

LEADING FINANCIAL INSTITUTION

[/et_pb_slide][/et_pb_slider][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section fb_built=”1″ _builder_version=”3.26.6″ fb_built=”1″ _i=”5″ _address=”5″][et_pb_row _builder_version=”3.26.6″ _i=”0″ _address=”5.0″][et_pb_column type=”4_4″ _builder_version=”3.26.6″ _i=”0″ _address=”5.0.0″][et_pb_text _builder_version=”3.27.4″ _i=”0″ _address=”5.0.0.0″]

resources

[/et_pb_text][/et_pb_column][/et_pb_row][et_pb_row column_structure=”1_3,1_3,1_3″ _builder_version=”3.27.4″ _i=”1″ _address=”5.1″][et_pb_column type=”1_3″ _builder_version=”3.27.4″ _i=”0″ _address=”5.1.0″][et_pb_text _builder_version=”3.27.4″ text_font_size=”15px” header_text_align=”center” header_font_size=”18px” box_shadow_style=”preset1″ min_height=”245px” custom_margin=”|0px|10px|0px|false|false” custom_padding=”|10px|42px|10px|false|false” _i=”0″ _address=”5.1.0.0″]

iMonitor™ – Monitor Continuously data sheet

Access, Activity, and Code. Which of these are you monitoring?

[/et_pb_text][et_pb_button button_url=”@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6IjE0NjAifX0=@” button_text=”DOWNLOAD” button_alignment=”center” _builder_version=”3.27.4″ _dynamic_attributes=”button_url” custom_button=”on” button_text_size=”18px” button_text_color=”#ffffff” button_bg_color=”#4bb76f” button_border_width=”0px” button_border_color=”rgba(0,0,0,0)” button_border_radius=”6px” button_letter_spacing=”0px” button_font=”fun city level 2||||||||” box_shadow_style=”preset2″ saved_tabs=”all” _i=”1″ _address=”5.1.0.1″][/et_pb_button][/et_pb_column][et_pb_column type=”1_3″ _builder_version=”3.27.4″ _i=”1″ _address=”5.1.1″][et_pb_text _builder_version=”3.27.4″ text_font_size=”15px” header_text_align=”center” header_font_size=”18px” box_shadow_style=”preset1″ min_height=”245px” custom_margin=”|0px|10px|0px|false|false” custom_padding=”|10px|42px|10px|false|false” _i=”0″ _address=”5.1.1.0″]

GDPR and the MENTIS Data and Application Security Platform

A single integrated solution for GDPR compliance. 

[/et_pb_text][et_pb_button button_url=”@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6IjE1MjUifX0=@” button_text=”DOWNLOAD” button_alignment=”center” _builder_version=”3.27.4″ _dynamic_attributes=”button_url” custom_button=”on” button_text_size=”18px” button_text_color=”#ffffff” button_bg_color=”#4bb76f” button_border_width=”0px” button_border_color=”rgba(0,0,0,0)” button_border_radius=”6px” button_letter_spacing=”0px” button_font=”fun city level 2||||||||” box_shadow_style=”preset2″ saved_tabs=”all” _i=”1″ _address=”5.1.1.1″][/et_pb_button][/et_pb_column][et_pb_column type=”1_3″ _builder_version=”3.27.4″ _i=”2″ _address=”5.1.2″][et_pb_text _builder_version=”3.27.4″ text_font_size=”15px” header_text_align=”center” header_font_size=”18px” box_shadow_style=”preset1″ min_height=”245px” custom_margin=”|0px|10px|0px|false|false” custom_padding=”|10px|42px|10px|false|false” _i=”0″ _address=”5.1.2.0″]

Monitoring client data for Sox Compliance

Sox Compliance for One of the Largest Utility Providers

[/et_pb_text][et_pb_button button_url=”@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6IjE0MzUifX0=@” button_text=”DOWNLOAD” button_alignment=”center” _builder_version=”3.27.4″ _dynamic_attributes=”button_url” custom_button=”on” button_text_size=”18px” button_text_color=”#ffffff” button_bg_color=”#4bb76f” button_border_width=”0px” button_border_color=”rgba(0,0,0,0)” button_border_radius=”6px” button_letter_spacing=”0px” button_font=”fun city level 2||||||||” box_shadow_style=”preset2″ saved_tabs=”all” _i=”1″ _address=”5.1.2.1″][/et_pb_button][/et_pb_column][/et_pb_row][et_pb_row column_structure=”1_3,1_3,1_3″ _builder_version=”3.27.4″ _i=”2″ _address=”5.2″][et_pb_column type=”1_3″ _builder_version=”3.27.4″ _i=”0″ _address=”5.2.0″][et_pb_text _builder_version=”3.27.4″ text_font_size=”15px” header_text_align=”center” header_font_size=”18px” box_shadow_style=”preset1″ min_height=”245px” custom_margin=”|0px|10px|0px|false|false” custom_padding=”|10px|42px|10px|false|false” _i=”0″ _address=”5.2.0.0″]

A fully Compliant Solution for a Top Swiss Bank

Sensitive data assessment for cloud migration, cross border sharing and compliance.

[/et_pb_text][et_pb_button button_url=”@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6IjE1MzAifX0=@” button_text=”DOWNLOAD” button_alignment=”center” _builder_version=”3.27.4″ _dynamic_attributes=”button_url” custom_button=”on” button_text_size=”18px” button_text_color=”#ffffff” button_bg_color=”#4bb76f” button_border_width=”0px” button_border_color=”rgba(0,0,0,0)” button_border_radius=”6px” button_letter_spacing=”0px” button_font=”fun city level 2||||||||” box_shadow_style=”preset2″ saved_tabs=”all” _i=”1″ _address=”5.2.0.1″][/et_pb_button][/et_pb_column][et_pb_column type=”1_3″ _builder_version=”3.27.4″ _i=”1″ _address=”5.2.1″][et_pb_text _builder_version=”3.27.4″ text_font_size=”15px” header_text_align=”center” header_font_size=”18px” box_shadow_style=”preset1″ min_height=”245px” custom_margin=”|0px|10px|0px|false|false” custom_padding=”|10px|42px|10px|false|false” _i=”0″ _address=”5.2.1.0″]

Highly Integrated Data Security Solution

Highly Integrated Data Security Solution for a Subsidiary of World’s Largest Re-insurer

[/et_pb_text][et_pb_button button_url=”@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6IjE0ODcifX0=@” button_text=”DOWNLOAD” button_alignment=”center” _builder_version=”3.27.4″ _dynamic_attributes=”button_url” custom_button=”on” button_text_size=”18px” button_text_color=”#ffffff” button_bg_color=”#4bb76f” button_border_width=”0px” button_border_color=”rgba(0,0,0,0)” button_border_radius=”6px” button_letter_spacing=”0px” button_font=”fun city level 2||||||||” box_shadow_style=”preset2″ saved_tabs=”all” _i=”1″ _address=”5.2.1.1″][/et_pb_button][/et_pb_column][et_pb_column type=”1_3″ _builder_version=”3.27.4″ _i=”2″ _address=”5.2.2″][et_pb_text _builder_version=”3.27.4″ text_font_size=”15px” header_text_align=”center” header_font_size=”18px” box_shadow_style=”preset1″ custom_margin=”|0px|10px|0px|false|false” custom_padding=”|10px|42px|10px|false|false” inline_fonts=”fun city level 2″ _i=”0″ _address=”5.2.2.0″]

Banco Popular Dominicano – Sensitive Data Discovery & iScramble

MENTIS helped the largest private bank in Dominican Republic to find all sensitive data in DB2 and Oracle databases

[/et_pb_text][et_pb_button button_url=”@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6IjE1MTIifX0=@” button_text=”DOWNLOAD” button_alignment=”center” _builder_version=”3.27.4″ _dynamic_attributes=”button_url” custom_button=”on” button_text_size=”18px” button_text_color=”#ffffff” button_bg_color=”#4bb76f” button_border_width=”0px” button_border_color=”rgba(0,0,0,0)” button_border_radius=”6px” button_letter_spacing=”0px” button_font=”fun city level 2||||||||” box_shadow_style=”preset2″ saved_tabs=”all” _i=”1″ _address=”5.2.2.1″][/et_pb_button][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section fb_built=”1″ _builder_version=”3.26.6″ background_color=”#191919″ custom_padding=”8px||0px|||” saved_tabs=”all” fb_built=”1″ _i=”0″ _address=”0″ global_module=”1638″][et_pb_row column_structure=”1_5,1_5,1_5,1_5,1_5″ _builder_version=”3.27.4″ max_width=”1116px” _i=”0″ _address=”0.0″][et_pb_column type=”1_5″ _builder_version=”3.26.6″ _i=”0″ _address=”0.0.0″][et_pb_image src=”http://zero2compliance.com/wp-content/uploads/2019/08/mentis_w__138.png” _builder_version=”3.26.6″ _i=”0″ _address=”0.0.0.0″][/et_pb_image][et_pb_text _builder_version=”3.26.6″ text_text_color=”#ffffff” text_font_size=”15px” text_font_size_last_edited=”on|desktop” text_text_align=”left” _i=”1″ _address=”0.0.0.1″]

Headquarters
3 Columbus Circle 15th Floor
New York
NY 10019.
Telephone : +1 212 203 4365
E-mail: info@mentisinc.com

India
5 Sarojini Street
T Nagar
Chennai India 600017.
Telephone : 0091 44 4210 3594

[/et_pb_text][/et_pb_column][et_pb_column type=”1_5″ _builder_version=”3.26.6″ _i=”1″ _address=”0.0.1″][et_pb_text _builder_version=”3.26.6″ text_font=”fun city level 2||||||||” text_text_color=”#ffffff” text_font_size=”16px” header_font_size=”31px” text_text_align=”left” _i=”0″ _address=”0.0.1.0″]

PRODUCTS

[/et_pb_text][et_pb_text _builder_version=”3.27.4″ text_font=”fun city level 2||||||||” text_text_color=”#ffffff” text_font_size=”12px” width=”100%” _i=”1″ _address=”0.0.1.1″]

[/et_pb_text][/et_pb_column][et_pb_column type=”1_5″ _builder_version=”3.26.6″ _i=”2″ _address=”0.0.2″][et_pb_text _builder_version=”3.26.6″ text_font=”fun city level 2||||||||” text_text_color=”#ffffff” text_font_size=”16px” header_font_size=”31px” text_text_align=”left” _i=”0″ _address=”0.0.2.0″]

SOLUTIONS

[/et_pb_text][et_pb_text _builder_version=”3.27.4″ text_font=”fun city level 2||||||||” text_text_color=”#ffffff” text_font_size=”12px” width=”100%” custom_margin=”|-5px||||” custom_padding=”|0px||||” text_text_color_last_edited=”on|desktop” _i=”1″ _address=”0.0.2.1″]

[/et_pb_text][/et_pb_column][et_pb_column type=”1_5″ _builder_version=”3.26.6″ _i=”3″ _address=”0.0.3″][et_pb_text _builder_version=”3.27.4″ text_font=”fun city level 2||||||||” text_text_color=”#ffffff” text_font_size=”16px” _i=”0″ _address=”0.0.3.0″]

SERVICES

[/et_pb_text][et_pb_text _builder_version=”3.27.4″ text_font=”fun city level 2||||||||” text_text_color=”#ffffff” text_font_size=”12px” _i=”1″ _address=”0.0.3.1″]

[/et_pb_text][/et_pb_column][et_pb_column type=”1_5″ _builder_version=”3.26.6″ _i=”4″ _address=”0.0.4″][et_pb_text _builder_version=”3.26.6″ text_font=”fun city level 2||||||||” text_text_color=”#ffffff” text_font_size=”16px” header_font_size=”31px” text_text_align=”left” _i=”0″ _address=”0.0.4.0″]

ABOUT US

[/et_pb_text][et_pb_text _builder_version=”3.27.4″ text_font=”fun city level 2||||||||” text_text_color=”#ffffff” text_font_size=”12px” _i=”1″ _address=”0.0.4.1″]

[/et_pb_text][/et_pb_column][/et_pb_row][/et_pb_section]