Product Advantages

Product Advantages

  • Easy to Use

    Purchase and get started with DBSS quickly without the need to manually install the service or adapt your database configurations.
    Purchase and get started with DBSS quickly without the need to manually install the service or adapt your database configurations.
  • Smart

    Take advantage of algorithm models to detect SQL injection and abnormal behaviors, fast and accurate.
    Take advantage of algorithm models to detect SQL injection and abnormal behaviors, fast and accurate.
  • Regulation-Compliant

    DBSS complies with the HIPAA, SOX, and PCI DSS, meeting your auditing requirements.
    DBSS complies with the HIPAA, SOX, and PCI DSS, meeting your auditing requirements.
  • Reliable

    DBSS works in bypass mode, having zero impact on your business.
    DBSS works in bypass mode, having zero impact on your business.

Application Scenarios

Database Auditing

A wide range of policies are available to help you detect SQL injection and audit database behaviors.

Advantages

Monitoring

Monitor databases and detect anomalies in performance, data, and user actions.

Multi-dimensional Auditing

Audit reports are customized for different scenarios (pre-event and post-event) and roles (common users and administrators).

Compliance

Perform comprehensive database audit to comply with laws and regulation.

Functions

Functions

  • Behavior Detection and Audit

    Easily monitor all users for abnormal behavior, precisely identifying sneaky users and their suspicious operations.
    Easily monitor all users for abnormal behavior, precisely identifying sneaky users and their suspicious operations.
  • Multi-dimensional Analysis

    Audit you databases from multiple angles, such as user behavior, established sessions, and SQL statements.
    Audit you databases from multiple angles, such as user behavior, established sessions, and SQL statements.
  • Real-time Alarms

    Get immediately notified of high-risk operations, SQL injection attempts, or abnormally high system loads.
    Get immediately notified of high-risk operations, SQL injection attempts, or abnormally high system loads.
  • Fine-grained Reports

    Learn your data security status from our analysis reports on client and database sessions, risk distribution, and compliance with data security standards (for example, Sarbanes-Oxley Act).
    Learn your data security status from our analysis reports on client and database sessions, risk distribution, and compliance with data security standards (for example, Sarbanes-Oxley Act).
  • Sensitive Data Protection

    Use our recommended rules or define your own to mask sensitive data (such as passwords) in audit logs.
    Use our recommended rules or define your own to mask sensitive data (such as passwords) in audit logs.
  • Audit Log Backup

    Back up audit logs to OBS buckets and restore them for high availability or disaster recovery purposes in case of a fault or data loss.
    Back up audit logs to OBS buckets and restore them for high availability or disaster recovery purposes in case of a fault or data loss.
Usage Guides

Register to Try Popular Products for Free

Register Now