Easy to Use

DBSS can be purchased with one click, and its software nodes are automatically deployed. In addition, it is easy to operate and does not require changes to your database configurations.


DBSS supports fine-grained rights control and configurations. It uses a mechanism based on feature identification and scoring to prevent mis-reporting.


DBSS complies with the HIPAA, SOX, and PCI DSS II. To meet auditing requirements, it supports sensitive data discovery, dynamic data masking, and remote audit log storage.


DBSS supports active-passive disaster recovery to ensure service continuity and availability.

Application Scenarios

  • Attack Prevention

  • Data Masking

  • Auditing

Attack Prevention

Attack Prevention

Various policies are provided to prevent database attacks.


  • End-to-End Database Firewall

    Depending on the risk of your database, the intrusion detection or defense system can be enabled. DBSS provides a host of capabilities ranging from SQL injection prevention and access control.

  • Multi-dimensional Security Policies

    DBSS provides security policies that are based on query groups, tables, or stored procedures.

  • Self-Learning

    DBSS instances can learn by themselves. After each user-defined "learning session", security policies are generated that can be accepted or rejected.

Data Masking

Data Masking

DBSS can discover and dynamically mask sensitive data in your database.


  • Regulatory Compliance

    The ability to discover sensitive data helps you comply with industrial regulations.

  • Multiple Masking Rules

    DBSS provides a wide variety of masking rules. Data can be masked in specific tables or against queries from specific IP addresses, users, or applications.

  • Powerful

    With a precise masking engine, DBSS masks sensitive data in real time without compromising service performance. Masked data is not changed in storage.



DBSS provides database auditing capabilities.


  • Regulatory Compliance

    Audit logs are saved remotely, as required by regulations.

  • Multi-dimensional Auditing

    DBSS tailors audit reports for pre-event analysts, post-event analysts, common users, and administrators.

  • Anomaly Monitoring

    DBSS monitors anomalies in performance, data, and actions.


Support Various Databases

Supports SQL Server, MySQL, and PostgreSQL databases.

Protect Databases

Provides a firewall based on queries, tables, or stored procedures, detects and defends against intrusions in real time, and notifies you about detected intrusions.

Monitor and Audit Database Activities

Monitors management and access activities at the column level, monitors and analyzes database activities separately, and sends alarms for unauthorized actions.

Discover Sensitive Data

Locates and categorizes sensitive data based on rules automatically and allows you to create masking or auditing rules easily.

Dynamically Mask Data

Dynamically masks sensitive data, allaying your worries over exposed information.