Easy to Use

DBSS can be purchased with one click, and its software nodes are automatically deployed. In addition, it is easy to operate and does not require changing database configurations.

Smart

DBSS supports fine-grained rights control and configurations. It uses a mechanism based on feature identification and scoring to prevent mis-reporting.

Regulation-Compliant

DBSS complies with the HIPAA, SOX, and PCI DSS II. To meet auditing requirements, it supports sensitive data discovery, dynamic data masking, and remote audit log storage.

Reliable

DBSS supports active-passive disaster recovery to ensure service continuity and availability.

Application Scenarios

  • Attack Prevention

  • Data Masking

  • Auditing

Attack Prevention

Attack Prevention

Various policies are provided to prevent database attacks.

Advantages

  • End-to-End Database Firewall

    Depending on the risk of your database, the intrusion detection or defense system can be enabled. In addition, DBSS provides capabilities such as SQL injection prevention and access control.

  • Multi-dimensional Security Policies

    DBSS provides security policies that are based on query groups, tables, or stored procedures.

  • Self-Learning

    DBSS instances can learn by themselves. After each user-defined "learning session", they generate security policies that can be accepted or rejected.

Data Masking

Data Masking

DBSS can discover and dynamically mask sensitive data in your database.

Advantages

  • Regulation Compliance

    The ability to discover sensitive data helps you comply with industrial regulations.

  • Multiple Masking Rules

    DBSS provides a wide variety of masking rules. Data can be masked in specific tables or against queries from specific IP addresses, users, or applications.

  • Powerful

    With a precise masking engine, DBSS masks sensitive data in real time without compromising service performance. Masked data will not be changed in storage.

Auditing

Auditing

DBSS provides database auditing capabilities.

Advantages

  • Regulation Compliance

    Audit logs are saved remotely, as required by regulations.

  • Multi-dimensional Auditing

    DBSS tailors audit reports for pre-event analysts, post-event analysts, common users, and administrators.

  • Anomaly Monitoring

    DBSS monitors anomalies in performance, data, and actions.

Functions

Support Various Databases

Supports SQL Server, MySQL, and PostgreSQL databases.

Protect Database Security

Provides a firewall based on queries, tables, or stored procedures, detects and defends against intrusions in real time, and notifies you about detected intrusions.

Monitor and Audit Database Activities

Monitors management and access activities at the column level, monitors and analyzes database activities separately, and sends alarms for unauthorized activities.

Discover Sensitive Data

Locates and categorizes sensitive data based on rules automatically and allows you to create masking or auditing rules easily.

Dynamically Mask Data

Dynamically masks sensitive data, removing your worries about information exposure.

Video Library

Introducing DBSS

Configuring a Log Storage Location

Creating a Protected Database

Configuring a Database Firewall Policy

Configuring a Sensitive Data Discovery Policy

Configuring a Dynamic Data Masking Policy

Configuring a Database Activity Monitoring Policy

Create an Account and Experience HUAWEI CLOUD for Free

Register Now