Easy to Use
DBSS can be purchased with one click, and its software nodes are automatically deployed. In addition, it is easy to operate and does not require changes to your database configurations.
DBSS supports fine-grained rights control and configurations. It uses a mechanism based on feature identification and scoring to prevent mis-reporting.
DBSS complies with the HIPAA, SOX, and PCI DSS II. To meet auditing requirements, it supports sensitive data discovery, dynamic data masking, and remote audit log storage.
DBSS supports active-passive disaster recovery to ensure service continuity and availability.
Various policies are provided to prevent database attacks.
Depending on the risk of your database, the intrusion detection or defense system can be enabled. DBSS provides a host of capabilities ranging from SQL injection prevention and access control.
DBSS provides security policies that are based on query groups, tables, or stored procedures.
DBSS instances can learn by themselves. After each user-defined "learning session", security policies are generated that can be accepted or rejected.
DBSS can discover and dynamically mask sensitive data in your database.
The ability to discover sensitive data helps you comply with industrial regulations.
DBSS provides a wide variety of masking rules. Data can be masked in specific tables or against queries from specific IP addresses, users, or applications.
With a precise masking engine, DBSS masks sensitive data in real time without compromising service performance. Masked data is not changed in storage.
DBSS provides database auditing capabilities.
Audit logs are saved remotely, as required by regulations.
DBSS tailors audit reports for pre-event analysts, post-event analysts, common users, and administrators.
DBSS monitors anomalies in performance, data, and actions.
Supports SQL Server, MySQL, and PostgreSQL databases.
Provides a firewall based on queries, tables, or stored procedures, detects and defends against intrusions in real time, and notifies you about detected intrusions.
Monitors management and access activities at the column level, monitors and analyzes database activities separately, and sends alarms for unauthorized actions.
Locates and categorizes sensitive data based on rules automatically and allows you to create masking or auditing rules easily.
Dynamically masks sensitive data, allaying your worries over exposed information.