This is a solution to help an enterprise to monitor their key/sensitive data. It is composed of seven major components: k-data modeling, k-data capture, k-data store, k-data watcher, k-data metrics, k-data view and k-data action.

Project Activity

See All Activity >

Categories

Enterprise

License

GNU Library or Lesser General Public License version 2.0 (LGPLv2)

Follow De Key Data Monitor

De Key Data Monitor Web Site

Other Useful Business Software
Level Up Your Cyber Defense with External Threat Management Icon
Level Up Your Cyber Defense with External Threat Management

See every risk before it hits. From exposed data to dark web chatter. All in one unified view.

Move beyond alerts. Gain full visibility, context, and control over your external attack surface to stay ahead of every threat.
Try for Free
Rate This Project
Login To Rate This Project

User Ratings

★★★★★
★★★★
★★★
★★
1
0
0
0
0
ease 1 of 5 2 of 5 3 of 5 4 of 5 5 of 5 0 / 5
features 1 of 5 2 of 5 3 of 5 4 of 5 5 of 5 0 / 5
design 1 of 5 2 of 5 3 of 5 4 of 5 5 of 5 0 / 5
support 1 of 5 2 of 5 3 of 5 4 of 5 5 of 5 0 / 5

User Reviews

  • This is gonna to be a good solution for the big enterprises.
Read more reviews >

Additional Project Details

Languages

Chinese (Simplified), English

Intended Audience

Developers, Management, System Administrators

User Interface

Eclipse, Web-based

Programming Language

Groovy, Java

Database Environment

XML-based

Related Categories

Groovy Enterprise Software, Java Enterprise Software

Registered

2011-12-10