Take a Closer Look at Chakra Max


Next Steps
Chakra Max Overview Features Technical Details Platforms & Pricing Why It's Better Resources

IRI Chakra Max™ is proven, high-performance data-centric audit and protection (DCAP) software for protecting personally identifiable information (PII) in both commercial and open source databases (DBs). Chakra Max can compliment content-aware Data Loss Prevention (DLP) solutions like IRI FieldShield, and replace slower, costlier megavendor DAM/DAP tools.

Functional Summary

  • Discover and classify sensitive data in your databases (in the free IRI Workbench GUI)

  • Control, monitor, and log all accesses and executions for 20 on-premise and cloud databases

  • Improve operational efficiency and time-to-value by minimizing or precluding impact on DB performance

  • Find and handle over-authorized or dormant users, and regularize your rights review cycle

  • Protect and audit DW-relational, ELT-appliance, and mainframe databases consistently and simultaneously

  • Spot, stop, isolate -- and send detailed alerts about -- attacks and unauthorized activities in real time

  • Speed incident responses with dashboard analytics and advanced audit log search capability

  • Customize, secure, and share activity logs and reports to revisit protection policies and verify privacy law compliance

  • Leverage high-availability gateway clustering to scale protection operations rapidly and reliably

Deeper Dives


Technical Specifications

Supported Databases

  • Oracle (including ASO and SSL)
  • Oracle Exadata
  • Microsoft SQL Server
  • IBM DB2 (on LUW, z/OS, and DB2/400)
  • IBM Informix
  • IBM Netezza
  • SAP Sybase IQ / ASE
  • Teradata
  • MySQL / MariaDB
  • PostgreSQL / Greenplum
  • Tibero
  • Altibase
  • Cubrid
  • Kairos
  • FUJITSU Symfoware
  • PetaSQL
  • SUN DB
  • Dameng DM7
  • Amazon Aurora, Redshift

Supported Systems

  • Linux
  • Unix (Telnet, Rlogin, Rcommand, (s)ftp, SSH)
  • Mainframe (TN3270, TN5250)
  • Windows Terminal

Cloud Support

  • Amazon Web Services
  • Microsoft Azure
  • IBM Softlayer

Deployment Mode

  • Network: Non-inline sniffer, transparent bridge
  • Host: Lightweight agents (local or global mode)
  • Agentless collection of 3rd party database audit logs

Performance Overhead

  • Network monitoring - Zero impact on monitored servers
  • Agent-based monitoring - 1-4% CPU resources

Centralized Management

  • Client-Server (SSL)
  • Command Line Interface (SSH/Console)

Database Audit Details

  • SQL operation (raw or parsed)
  • SQL response (raw or parsed)
  • Database, Schema, and Object
  • Username
  • Timestamp
  • Source IP, OS, application
  • Parameters used
  • Stored Procedures

Privileged Activities

  • All privileged activity, DDL and DCL
  • Schema Changes (CREATE, DROP, ALTER)
  • Creation and modification of accounts, roles, and privileges (GRANT, REVOKE)

Access to Sensitive Data

  • Successful and Failed SELECTs
  • All data changes

Security Exceptions

  • Failed logins, connection errors, SQL errors

Data Modifications

  • INSERTs, UPDATEs, DELETEs (DML activity)

Stored Procedures

  • Creation, Modification, Execution


  • Creation and Modification

Tamper-Proof Audit Trail

  • Audit trail stored in a tamper-proof repository
  • Operation encryption or digitally signing of audit data
  • Role-based Access Controls to view audit data (read-only)
  • Real-time visibility of audit data

Fraud Identification

  • Unauthorized activity on sensitive data
  • Abnormal activity hours and source
  • Unexpected user activity

Data Leak Identification

  • Requests for classified data
  • Unauthorized/abnormal data extraction

Database Security

  • Dynamic Profile (White List security)
  • Protocol Validation (SQL & protocol validation)
  • Real-time alerts
  • Dynamic data masking

Policy Updates

  • SNMP
  • Syslog
  • Email
  • Custom followed action
  • Integrated graphical reporting
  • Real-time dashboard

Server Discovery

  • Automated discovery of database servers

Data Discovery and Classification

  • Database servers
  • Financial Information
  • Credit Card Numbers
  • Personally Identifiable Information
  • Custom data types

User Rights Management
(add-on option)

  • Audit user rights over database objects
  • Validate excessive rights over sensitive data
  • Identify dormant accounts
  • Track changes to user rights

Vulnerability Assessment

  • Operating System vulnerabilities
  • Database vulnerabilities
  • Configuration flaws
  • Risk scoring & mitigation

Request More Information

Live Chat

* indicates a required field.
IRI does NOT share your information.