Product Advantages

  • Easy to Use

    Purchase and get started with DBSS quickly without the need to manually install the service or adapt your database configurations.

    Purchase and get started with DBSS quickly without the need to manually install the service or adapt your database configurations.

  • Smart

    Take advantage of algorithm models to detect SQL injection and abnormal behaviors, fast and accurate.

    Take advantage of algorithm models to detect SQL injection and abnormal behaviors, fast and accurate.

  • Regulation-Compliant

    DBSS complies with the HIPAA, SOX, and PCI DSS, meeting your auditing requirements.

    DBSS complies with the HIPAA, SOX, and PCI DSS, meeting your auditing requirements.

  • Reliable

    DBSS works in out-of-path mode, having zero impact on your business.

    DBSS works in out-of-path mode, having zero impact on your business.

Application Scenarios

Database Auditing

A wide range of policies are available to help you detect SQL injection and audit database behaviors.


Advantages

  • Monitoring

    Monitor databases and detect anomalies in performance, data, and user actions.

  • Multi-dimensional Auditing

    Audit reports are customized for different scenarios (pre-event and post-event) and roles (common users and administrators).

  • Compliance

    Perform comprehensive database audit to comply with laws and regulations.

Functions

  • Behavior Detection and Audit

    Easily detect abnormal behaviors, precisely identifying sneaky users and their suspicious operations.

    Easily detect abnormal behaviors, precisely identifying sneaky users and their suspicious operations.

  • Multi-dimensional Analysis

    Audit your databases from multiple angles, such as user behaviors, established sessions, and SQL statements.

    Audit your databases from multiple angles, such as user behaviors, established sessions, and SQL statements.

  • Real-time Alarms

    Get immediately notified of high-risk operations, SQL injection attempts, or abnormally high system loads.

    Get immediately notified of high-risk operations, SQL injection attempts, or abnormally high system loads.

  • Fine-grained Reports

    Learn your data security status from our analysis reports on client and database sessions, risk distribution, and compliance with data security standards (for example, Sarbanes-Oxley Act).

    Learn your data security status from our analysis reports on client and database sessions, risk distribution, and compliance with data security standards (for example, Sarbanes-Oxley Act).

  • Sensitive Data Protection

    Use our recommended rules or define your own to mask sensitive data (such as passwords) in audit logs.

    Use our recommended rules or define your own to mask sensitive data (such as passwords) in audit logs.

  • Audit Log Backup

    Back up audit logs to OBS buckets and restore them for high availability or disaster recovery purposes in case of a fault or data loss.

    Back up audit logs to OBS buckets and restore them for high availability or disaster recovery purposes in case of a fault or data loss.

Sign up and start an amazing cloud journey

Try Free