This tool set analyzes user actions to indicate data security issues, e.g. data search and classification, user access control, high-level rights tracking, data protection, and data leakage prevention.
- Tracks and monitors all actions on the databases using SQL Transactions
- Maintains the audit logs of database access
- Supports rule-based or heuristic-based alerts in case of security breaches
- Tracks, gathers, and links various actions from several different Database Management Systems
- Alerts administrators when an application retrieves unusual data, e.g. a high privilege user sends an SQL query that returns more than 5 lines of credit card information, database hacking, or SQL injection events
- Helps administrators inspect anomalies in data retrievals from the databases
- Organizations requiring security and inspection against data leakages
- Tracks and monitors all actions on the databases using SQL Transactions
- Maintains the audit logs of database access
- Supports rule-based or heuristic-based alerts in case of security breaches
- Tracks, gathers, and links various actions from several different Database Management Systems
- Alerts administrators when an application retrieves unusual data, e.g. a high privilege user sends an SQL query that returns more than 5 lines of credit card information, database hacking, or SQL injection events
- Helps administrators inspect anomalies in data retrievals from the databases
- Organizations requiring security and inspection against data leakages