Easy to Use
DBSS can be purchased with one click, and its software nodes are automatically deployed. In addition, it is easy to operate and does not require changing database configurations.
DBSS supports fine-grained rights control and configurations. It uses a mechanism based on feature identification and scoring to prevent mis-reporting.
DBSS complies with the HIPAA, SOX, and PCI DSS. To meet auditing requirements, it supports sensitive data discovery, dynamic data masking, and remote audit log storage.
DBSS supports active-passive disaster recovery to ensure service continuity and availability.
DBSS provides database auditing capabilities.
Audit logs are saved remotely, as required by regulations.
DBSS tailors audit reports for pre-event analysts, post-event analysts, common users, and administrators.
DBSS monitors anomalies in performance, data, and actions.
Various policies are provided to prevent database attacks.
Depending on the risk of your database, the intrusion detection or defense system can be enabled. In addition, DBSS provides capabilities such as SQL injection prevention and access control.
DBSS provides security policies that are based on query groups, tables, or stored procedures.
DBSS instances can learn by themselves. After each user-defined "learning session", they generate security policies that can be accepted or rejected.
DBSS can discover and dynamically mask sensitive data in your database.
The ability to discover sensitive data helps you comply with industrial regulations.
DBSS provides a wide variety of masking rules. Data can be masked in specific tables or against queries from specific IP addresses, users, or applications.
With a precise masking engine, DBSS masks sensitive data in real time without compromising service performance. Masked data will not be changed in storage.
Behavior Detection and Audit
Easily monitor all users for abnormal behavior, precisely identifying sneaky users and their suspicious operations.
Get immediately notified of high-risk operations, SQL injection attempts, or abnormally high system loads.
Audit you databases from multiple angles, such as user behavior,
established sessions, and SQL statements.
Sensitive Data Protection
Use our recommended rules or define your own to mask sensitive data (such as passwords) in audit logs.
External and Internal Security
Let DBSS and its firewall protect your databases from external threats such as SQL injections. Define fine-grained policies to manage accounts and prevent privilege abuse.
Set anti-theft policies, such as what operations and how much data operated on will trigger alarms and be logged. DBSS will keep a close watch on your databases for you.
Dynamic Data Masking
Have a lot of sensitive data but little time to sort or protect them? Just name a sensitive data source, such as a table, column, IP address, user, or application, and let DBSS mask data from that source in real time. Data masking will not affect your service performance.
Sensitive Data Discovery
Create your own knowledge bases and policies, or take advantage of our resourceful compliance knowledge base to scan your databases for sensitive data. Then, simply generate masking and auditing rules in just a few clicks, and DBSS will securely handle the discovered data for you. We provide a useful knowledge base for Payment Card Industry (PCI), Healthcare Information Portability and Accountability Act (HIPAA), Sarbanes-Oxley Act (SOX), and General Data Protection Regulation (GDPR) compliance requirements.
Check the statistics of databases, tables, and columns visualized in lists or chart form, analyze activities, and receive alarms when unauthorized activities are detected.