Product Advantages

  • Easy to Use

    DBSS can be purchased with one click, and its software nodes are automatically deployed. In addition, it is easy to operate and does not require changes to your database configurations.
    DBSS can be purchased with one click, and its software nodes are automatically deployed. In addition, it is easy to operate and does not require changes to your database configurations.
  • Smart

    DBSS supports fine-grained rights control and configurations. It uses a mechanism based on feature identification and scoring to prevent mis-reporting.
    DBSS supports fine-grained rights control and configurations. It uses a mechanism based on feature identification and scoring to prevent mis-reporting.
  • Regulation-Compliant

    DBSS complies with the HIPAA, SOX, and PCI DSS. To meet auditing requirements, it supports sensitive data discovery, dynamic data masking, and remote audit log storage.
    DBSS complies with the HIPAA, SOX, and PCI DSS. To meet auditing requirements, it supports sensitive data discovery, dynamic data masking, and remote audit log storage.
  • Reliable

    DBSS supports active-passive disaster recovery to ensure service continuity and availability.
    DBSS supports active-passive disaster recovery to ensure service continuity and availability.

Application Scenarios

  • Attack Prevention

  • Data Masking

  • Auditing

Attack Prevention

Attack Prevention

Various policies are provided to prevent database attacks.

Advantages

End-to-End Database Firewall
Intrusion detection and defense utilities can be tailored to the particulars of your database. DBSS provides a host of capabilities ranging from SQL injection prevention to access control.
Multi-dimensional Security Policies
DBSS provides security policies that are based on query groups, tables, or stored procedures.
Self-Learning
DBSS instances can learn by themselves. After each user-defined "learning session", security policy recommendations that can be accepted or rejected are generated.
Data Masking

Data Masking

DBSS can discover and dynamically mask sensitive data in your database.

Advantages

Regulatory Compliance
The ability to discover sensitive data helps you keep your organization in compliance.
Multiple Masking Rules
DBSS provides a wide variety of masking rules. Data can be masked in specific tables or against queries from specific IP addresses, users, or applications.
Powerful
With a precise masking engine, DBSS masks sensitive data in real time without compromising service performance nor changing masked data in storage.
Auditing

Auditing

DBSS provides database auditing capabilities.

Advantages

Regulatory Compliance
Audit logs are saved remotely, as required by regulations.
Multi-dimensional Auditing
DBSS tailors audit reports for pre-event analysts, post-event analysts, common users, and administrators.
Anomaly Monitoring
DBSS monitors anomalies in performance, data, and actions.

Functions

  • Various Databases Supported

    Supports SQL Server, MySQL, and PostgreSQL databases.
  • Database Protection

    Provides a firewall based on queries, tables, or stored procedures, detects and defends against intrusions in real time, and notifies you about detected intrusions.
  • Database Activity Monitoring and Auditing

    Monitors management and access activities at the column level, monitors and analyzes database activities separately, and sends alarms when unauthorized actions are attempted.

Provides Scalable, On-demand Computing Resources

Learn More