Product Advantages
Easy to Use

Easy to Use

DBSS can be purchased with one click, and its software nodes are automatically deployed. In addition, it is easy to operate and does not require changing database configurations.


DBSS supports fine-grained rights control and configurations. It uses a mechanism based on feature identification and scoring to prevent mis-reporting.


DBSS complies with the HIPAA, SOX, and PCI DSS. To meet auditing requirements, it supports sensitive data discovery, dynamic data masking, and remote audit log storage.


DBSS supports active-passive disaster recovery to ensure service continuity and availability.

Application Scenarios
  • Auditing

  • Attack Prevention

  • Data Masking



DBSS provides database auditing capabilities.


Regulation Compliance

Audit logs are saved remotely, as required by regulations.

Multi-dimensional Auditing

DBSS tailors audit reports for pre-event analysts, post-event analysts, common users, and administrators.

Anomaly Monitoring

DBSS monitors anomalies in performance, data, and actions.

Attack Prevention

Attack Prevention

Various policies are provided to prevent database attacks.


End-to-End Database Firewall

Depending on the risk of your database, the intrusion detection or defense system can be enabled. In addition, DBSS provides capabilities such as SQL injection prevention and access control.

Multi-dimensional Security Policies

DBSS provides security policies that are based on query groups, tables, or stored procedures.


DBSS instances can learn by themselves. After each user-defined "learning session", they generate security policies that can be accepted or rejected.

Data Masking

Data Masking

DBSS can discover and dynamically mask sensitive data in your database.


Regulation Compliance

The ability to discover sensitive data helps you comply with industrial regulations.

Multiple Masking Rules

DBSS provides a wide variety of masking rules. Data can be masked in specific tables or against queries from specific IP addresses, users, or applications.


With a precise masking engine, DBSS masks sensitive data in real time without compromising service performance. Masked data will not be changed in storage.


  • Database Audit

  • Database Protection

Database Audit

  • Behavior Detection and Audit

    Easily monitor all users for abnormal behavior, precisely identifying sneaky users and their suspicious operations.

  • Real-time Alarms

    Get immediately notified of high-risk operations, SQL injection attempts, or abnormally high system loads.

  • Multi-dimensional Analysis

    Audit you databases from multiple angles, such as user behavior,
    established sessions, and SQL statements.

  • Sensitive Data Protection

    Use our recommended rules or define your own to mask sensitive data (such as passwords) in audit logs.

Database Protection

  • External and Internal Security

    Let DBSS and its firewall protect your databases from external threats such as SQL injections. Define fine-grained policies to manage accounts and prevent privilege abuse.

  • Data Security

    Set anti-theft policies, such as what operations and how much data operated on will trigger alarms and be logged. DBSS will keep a close watch on your databases for you.

  • Dynamic Data Masking

    Have a lot of sensitive data but little time to sort or protect them? Just name a sensitive data source, such as a table, column, IP address, user, or application, and let DBSS mask data from that source in real time. Data masking will not affect your service performance.

  • Sensitive Data Discovery

    Create your own knowledge bases and policies, or take advantage of our resourceful compliance knowledge base to scan your databases for sensitive data. Then, simply generate masking and auditing rules in just a few clicks, and DBSS will securely handle the discovered data for you. We provide a useful knowledge base for Payment Card Industry (PCI), Healthcare Information Portability and Accountability Act (HIPAA), Sarbanes-Oxley Act (SOX), and General Data Protection Regulation (GDPR) compliance requirements.

  • Activity Monitoring

    Check the statistics of databases, tables, and columns visualized in lists or chart form, analyze activities, and receive alarms when unauthorized activities are detected.

Create an Account and Experience HUAWEI CLOUD for Free

Register Now