Easy to Use
DBSS can be purchased with one click, and its software nodes are automatically deployed. In addition, it is easy to operate and does not require changes to your database configurations.
DBSS supports fine-grained rights control and configurations. It uses a mechanism based on feature identification and scoring to prevent mis-reporting.
DBSS complies with the HIPAA, SOX, and PCI DSS. To meet auditing requirements, it supports sensitive data discovery, dynamic data masking, and remote audit log storage.
DBSS supports active-passive disaster recovery to ensure service continuity and availability.
Various policies are provided to prevent database attacks.
Intrusion detection and defense utilities can be tailored to the particulars of your database. DBSS provides a host of capabilities ranging from SQL injection prevention and access control.
DBSS provides security policies that are based on query groups, tables, or stored procedures.
DBSS instances can learn by themselves. After each user-defined "learning session", security policy recommendations that can be accepted or rejected are generated.
DBSS can discover and dynamically mask sensitive data in your database.
The ability to discover sensitive data helps you keep your organization in compliance.
DBSS provides a wide variety of masking rules. Data can be masked in specific tables or against queries from specific IP addresses, users, or applications.
With a precise masking engine, DBSS masks sensitive data in real time without compromising service performance. Masked data is not changed in storage.
DBSS provides database auditing capabilities.
Audit logs are saved remotely, as required by regulations.
DBSS tailors audit reports for pre-event analysts, post-event analysts, common users, and administrators.
DBSS monitors anomalies in performance, data, and actions.
Supports SQL Server, MySQL, and PostgreSQL databases.
Provides a firewall based on queries, tables, or stored procedures, detects and defends against intrusions in real time, and notifies you about detected intrusions.
Monitors management and access activities at the column level, monitors and analyzes database activities separately, and sends alarms when unauthorized actions are attempted.